DEV Community

Aditya Pratap Bhuyan profile picture

Aditya Pratap Bhuyan

Aditya Pratap Bhuyan is an experienced IT professional with over 20 years in enterprise and cloud applications. With more than 40 industry certifications, he specializes in DevOps, cloud computing.

Location Bangalore, India Joined Joined on  Personal website https://cloudnativeblogs.in github website

Pronouns

He/Him

Work

Cloud Native Journey

Advantages of Asymmetric Encryption with Random Public and Symmetric Private Keys

Advantages of Asymmetric Encryption with Random Public and Symmetric Private Keys

Comments
6 min read
How Test-Driven Development (TDD) Enhances Code Refactoring and Maintains Software Quality

How Test-Driven Development (TDD) Enhances Code Refactoring and Maintains Software Quality

Comments
5 min read
Will GitHub Copilot Replace Software Developers?

Will GitHub Copilot Replace Software Developers?

Comments
4 min read
How Automation in DevOps Minimizes Human Errors and Boosts Efficiency

How Automation in DevOps Minimizes Human Errors and Boosts Efficiency

1
Comments
4 min read
Continuous Monitoring: Enhancing IT Services Through Proactive Management

Continuous Monitoring: Enhancing IT Services Through Proactive Management

Comments
5 min read
Why System Software is the Backbone of Modern Computing

Why System Software is the Backbone of Modern Computing

Comments
4 min read
Exploring Alternative Paths in Critical Path Method (CPM)

Exploring Alternative Paths in Critical Path Method (CPM)

Comments
5 min read
Understanding ConvertML: Simplifying Machine Learning for Everyone

Understanding ConvertML: Simplifying Machine Learning for Everyone

Comments
5 min read
Understanding Program Budgeting: A Strategic Approach to Financial Planning

Understanding Program Budgeting: A Strategic Approach to Financial Planning

Comments
6 min read
Functional vs Non-Functional Testing: Key Differences and Their Impact on Software Quality

Functional vs Non-Functional Testing: Key Differences and Their Impact on Software Quality

Comments
5 min read
Understanding Software Technical Debt: Identification, Management, and Best Practices

Understanding Software Technical Debt: Identification, Management, and Best Practices

Comments
6 min read
Cybersecurity in the Digital Age: Safeguarding Data in an Interconnected World

Cybersecurity in the Digital Age: Safeguarding Data in an Interconnected World

Comments
5 min read
Metadata, Data Dictionary, and Catalog in a DBMS: Understanding the Differences and Their Roles

Metadata, Data Dictionary, and Catalog in a DBMS: Understanding the Differences and Their Roles

Comments
4 min read
Harnessing the Power of Object-Oriented and Functional Programming Paradigms in Software Development

Harnessing the Power of Object-Oriented and Functional Programming Paradigms in Software Development

Comments
5 min read
Understanding Public Key, Private Key, and Shared Secret in Cryptology

Understanding Public Key, Private Key, and Shared Secret in Cryptology

Comments
6 min read
Transforming Leadership: Embracing Bottom-Up Problem-Solving for Organizational Success

Transforming Leadership: Embracing Bottom-Up Problem-Solving for Organizational Success

Comments
5 min read
How CI/CD Helps Minimize Technical Debt in Software Projects

How CI/CD Helps Minimize Technical Debt in Software Projects

Comments
5 min read
How to Transfer Data Between Tables Without Deleting Original Information

How to Transfer Data Between Tables Without Deleting Original Information

Comments
4 min read
Key Steps to Create a Dimensional Model for a Database

Key Steps to Create a Dimensional Model for a Database

Comments
7 min read
Key Reasons for Software Development Project Failures and How to Avoid Them

Key Reasons for Software Development Project Failures and How to Avoid Them

Comments
6 min read
How Scrum Empowers Teams to Take Ownership and Make Decisive Decisions

How Scrum Empowers Teams to Take Ownership and Make Decisive Decisions

Comments
6 min read
Understanding Commodore Operating Systems

Understanding Commodore Operating Systems

Comments
6 min read
Understanding Image Data Representation in Computer Systems

Understanding Image Data Representation in Computer Systems

Comments
7 min read
How Cloud-Based Solutions Enhance Data Security and Scalability for Enterprises

How Cloud-Based Solutions Enhance Data Security and Scalability for Enterprises

Comments
7 min read
Sorting Algorithms That Use Hash Tables

Sorting Algorithms That Use Hash Tables

8
Comments
8 min read
Mastering Dependency Injection in Android Development

Mastering Dependency Injection in Android Development

Comments
5 min read
Best Practices for Developing and Integrating REST APIs into Web Applications

Best Practices for Developing and Integrating REST APIs into Web Applications

Comments 1
7 min read
Understanding Node.js: Advantages, Disadvantages, and Its Comparison with Traditional Web Servers (Apache, Nginx)

Understanding Node.js: Advantages, Disadvantages, and Its Comparison with Traditional Web Servers (Apache, Nginx)

1
Comments
6 min read
How Oracle Cloud Infrastructure Enhances Security and Scalability for Businesses

How Oracle Cloud Infrastructure Enhances Security and Scalability for Businesses

Comments
7 min read
GitOps vs Traditional DevOps: Understanding the Key Differences and Benefits

GitOps vs Traditional DevOps: Understanding the Key Differences and Benefits

Comments
6 min read
How Java Solves the Diamond Problem?

How Java Solves the Diamond Problem?

4
Comments
5 min read
How to Generate Your Own Public and Secret Keys for PGP Encryption

How to Generate Your Own Public and Secret Keys for PGP Encryption

7
Comments
6 min read
Understanding the Core Components of an Operating System and How They Work

Understanding the Core Components of an Operating System and How They Work

1
Comments
7 min read
Effective Strategies for Optimizing Database Queries

Effective Strategies for Optimizing Database Queries

Comments
7 min read
Effective Strategies for Refactoring a Large Codebase: Best Practices and Approaches

Effective Strategies for Refactoring a Large Codebase: Best Practices and Approaches

Comments
8 min read
Can You Use Windows on Hyper-V?

Can You Use Windows on Hyper-V?

Comments
6 min read
How Java Development Services Ensure Scalability and Performance in Modern Applications

How Java Development Services Ensure Scalability and Performance in Modern Applications

Comments
7 min read
How Java Development Services Ensure Robust Security for Enterprise-Level Applications

How Java Development Services Ensure Robust Security for Enterprise-Level Applications

Comments
7 min read
A Comprehensive Guide to Memory Mapping with Virtual Memory in Modern Computing

A Comprehensive Guide to Memory Mapping with Virtual Memory in Modern Computing

Comments
7 min read
Threads Overhauls Its Search Feature to Improve User Experience and Engagement

Threads Overhauls Its Search Feature to Improve User Experience and Engagement

Comments
7 min read
MD4 vs MD5: Understanding Hash Function Collisions and Their Impact on Security

MD4 vs MD5: Understanding Hash Function Collisions and Their Impact on Security

2
Comments
6 min read
How to Prevent NTP Reflection Attacks?

How to Prevent NTP Reflection Attacks?

2
Comments 1
6 min read
Understanding Application-Oriented Distributed Operating Systems: Architecture, Benefits, and Use Cases

Understanding Application-Oriented Distributed Operating Systems: Architecture, Benefits, and Use Cases

Comments
6 min read
The Comprehensive Guide to Databases and Their Major Uses in Application Software

The Comprehensive Guide to Databases and Their Major Uses in Application Software

Comments
7 min read
Why Some Programming Languages Support Parallelism and Others Don't

Why Some Programming Languages Support Parallelism and Others Don't

Comments
6 min read
The Importance of Planning in the Software Development Life Cycle (SDLC)

The Importance of Planning in the Software Development Life Cycle (SDLC)

Comments
7 min read
Best Practices for Using GROUP BY in MySQL for Converting Vertical Data to JSON

Best Practices for Using GROUP BY in MySQL for Converting Vertical Data to JSON

Comments
5 min read
Effective Methods for Troubleshooting Deadlocks in SQL Server

Effective Methods for Troubleshooting Deadlocks in SQL Server

Comments
7 min read
How Edge Computing is Revolutionizing Data Processing and IoT Applications

How Edge Computing is Revolutionizing Data Processing and IoT Applications

Comments
7 min read
How to Design a CPU from Scratch

How to Design a CPU from Scratch

2
Comments
11 min read
The Ultimate Guide to Design Patterns in Software Engineering

The Ultimate Guide to Design Patterns in Software Engineering

1
Comments
5 min read
How EDI Communication Protocols Streamline Business Data Exchange

How EDI Communication Protocols Streamline Business Data Exchange

Comments
5 min read
Best Practices in Software Architecture for Scalable, Secure, and Maintainable Systems

Best Practices in Software Architecture for Scalable, Secure, and Maintainable Systems

Comments
8 min read
Understanding the Key Stages of the Software Development Life Cycle (SDLC)

Understanding the Key Stages of the Software Development Life Cycle (SDLC)

Comments
7 min read
The Most Common Types of Databases in IT Today

The Most Common Types of Databases in IT Today

Comments
8 min read
How a Database Management System (DBMS) Works

How a Database Management System (DBMS) Works

1
Comments
6 min read
The Concept of Digital Fort: Protecting the Virtual World in the Age of Cybersecurity

The Concept of Digital Fort: Protecting the Virtual World in the Age of Cybersecurity

1
Comments
6 min read
Django vs Rails for API Development: Performance, Productivity, and Scalability Comparison

Django vs Rails for API Development: Performance, Productivity, and Scalability Comparison

1
Comments
7 min read
Cerbos Review: A Developer's Perspective on Modern Access Control

Cerbos Review: A Developer's Perspective on Modern Access Control

19
Comments 1
5 min read
Will ARM Processors Surpass x86 in Performance?

Will ARM Processors Surpass x86 in Performance?

1
Comments
8 min read
loading...