Note: cloud environment is charging by second / hour When exploring the relevant AWS services, if one wants to employ an IT architecture that is fit for purpose and fit for use, inevitably a solution architect tries different alternatives until the final solution architecture is found for the given business goal. For example, when dimensioningContinue reading “Amazon Web Services – why to set a budget thresold and how”
Category Archives: IT Consulting services
Amazon Web Services – don’t do API keys input into an EC2 instance
API keys = API Key + API Secret Key Never enter your IAM API keys into your EC2 instance. Unless you are the single user in that EC2 instance. If not, it’s like not doing yourself a favor, on the contrary. Some words briefly about the definition of what is an EC2 instance: EC2 instanceContinue reading “Amazon Web Services – don’t do API keys input into an EC2 instance”
Python code to place trades with Liquid.com (a Japan) exchange – Part 3
In the present article I am continuing the construction of a trading bot in Python that I am suggesting is able to work 24/7 and to bring a positive result consistently. The goal is to implement no manual trades placed with the crypto-exchange Liquid.com (eventually manual trades will be only on exceptional basis i.e. justContinue reading “Python code to place trades with Liquid.com (a Japan) exchange – Part 3”
Python code to place trades with Liquid.com (a Japan) exchange – Part 2
In this article (continued from this one) I am going to play with Python a little bit. So, I will check whether a Python library installed previously (ccxt) is fit for purpose. I need to make some GET requests to Liquid.com’s API in order to retrieve some data and send some POST requests to placeContinue reading “Python code to place trades with Liquid.com (a Japan) exchange – Part 2”
Python code to place trades with Liquid.com (a Japan) exchange
I wanted to start a trading experience using automation in Python, just for fun and to see if I suck at trading or I gain something. Normally, trading in cryptocurrencies is a high risk activity, but I have decided I can throw a couple thousands EURO in this experiment. Who knows, maybe I am goodContinue reading “Python code to place trades with Liquid.com (a Japan) exchange”
Information Security Monitoring for companies rendering essential services is going to be closely watched by Romanian State
Deadline to submit the file to Romanian relevant authority is 17 December 2020. It’s for companies in the industries offering essential services (mainly energy utilities, banking, payments services, etc) Legal background: Law 362/2018 Why deadline is 17 December 2020? Because all related legal acts / governmental orders and so on have been culminated with HGContinue reading “Information Security Monitoring for companies rendering essential services is going to be closely watched by Romanian State”
Web scraping. Get products prices of competition from their website. How to achieve the goal using a trendy programming language (i.e. Python) in 20 lines of code (part 1)
Web scraping is when one wants to copy the content of a web page (or targeted parts of an entire site) and this is done automatically by a programmed robot (or a pre-programmed application). I use Python (and an open source library) to achieve successfully potentially any web scraping task. An interesting use of webContinue reading “Web scraping. Get products prices of competition from their website. How to achieve the goal using a trendy programming language (i.e. Python) in 20 lines of code (part 1)”
Customer Revenue Optimisation platform
Use-case: CenturyLink (this company is a member of the S&P 500 index and the Fortune 500) An interesting use of AI (Artifical Intelligence) for increase revenue due to a better use of available data. Due to a long history of mergers and acquisitions, CenturyLink (a telecom company now offering a bunch of digital services suchContinue reading “Customer Revenue Optimisation platform”
VPNs and Work From Home: Security under scrutiny in times of COVID-19
VPNs secures communication between company servers and employees’ devices, but end user devices are exposed if not secured enough. Also, other compensating measures need to be in place. Courtesy of The Cyber Security Hub™ (TCSH), I would like to depict a link that TCSH had pointing to, citing that Work From Home(WFH) using VPN isContinue reading “VPNs and Work From Home: Security under scrutiny in times of COVID-19”
Ransomware mitigation with backups. It might work well for small or medium companies that cannot afford huge budgets for securing their systems
Provided that certain conditions are met In a previous page I wrote about the balance that always has to be reached between costs in risks, including cyberattacks. So, I have expressed the opinion that there is no point in spending too much on some fancy security tool that covers a risk that, if occurred, itContinue reading “Ransomware mitigation with backups. It might work well for small or medium companies that cannot afford huge budgets for securing their systems”