Tech With Htunn
  • Blog Content
  • ๐Ÿค–Artificial Intelligence
    • ๐Ÿง Building an Intelligent Agent with Local LLMs and Azure OpenAI
    • ๐Ÿ“ŠRevolutionizing IoT Monitoring: My Personal Journey with LLM-Powered Observability
  • ๐Ÿ“˜Core Concepts
    • ๐Ÿ”„Understanding DevSecOps
    • โฌ…๏ธShifting Left in DevSecOps
    • ๐Ÿ“ฆUnderstanding Containerization
    • โš™๏ธWhat is Site Reliability Engineering?
    • โฑ๏ธUnderstanding Toil in SRE
    • ๐Ÿ”What is Identity and Access Management?
    • ๐Ÿ“ŠMicrosoft Graph API: An Overview
    • ๐Ÿ”„Understanding Identity Brokers
  • ๐Ÿ”ŽSecurity Testing
    • ๐Ÿ”SAST vs DAST: Understanding the Differences
    • ๐ŸงฉSoftware Composition Analysis (SCA)
    • ๐Ÿ“‹Software Bill of Materials (SBOM)
    • ๐ŸงชDependency Scanning in DevSecOps
    • ๐ŸณContainer Scanning in DevSecOps
  • ๐Ÿ”„CI/CD Pipeline
    • ๐Ÿ”My Journey with Continuous Integration in DevOps
    • ๐Ÿš€My Journey with Continuous Delivery and Deployment in DevOps
  • ๐ŸงฎFundamentals
    • ๐Ÿ’พWhat is Data Engineering?
    • ๐Ÿ”„Understanding DataOps
    • ๐Ÿ‘ทThe Role of a Cloud Architect
    • ๐Ÿ›๏ธCloud Native Architecture
    • ๐Ÿ’ปCloud Native Applications
  • ๐Ÿ›๏ธArchitecture & Patterns
    • ๐Ÿ…Medallion Architecture in Data Engineering
    • ๐Ÿ”„ETL vs ELT Pipeline: Understanding the Differences
  • ๐Ÿ”’Authentication & Authorization
    • ๐Ÿ”‘OAuth 2.0 vs OIDC: Key Differences
    • ๐Ÿ”Understanding PKCE in OAuth 2.0
    • ๐Ÿ”„Service Provider vs Identity Provider Initiated SAML Flows
  • ๐Ÿ“‹Provisioning Standards
    • ๐Ÿ“ŠSCIM in Identity and Access Management
    • ๐Ÿ“กUnderstanding SCIM Streaming
  • ๐Ÿ—๏ธDesign Patterns
    • โšกEvent-Driven Architecture
    • ๐Ÿ”’Web Application Firewalls
  • ๐Ÿ“ŠReliability Metrics
    • ๐Ÿ’ฐError Budgets in SRE
    • ๐Ÿ“SLA vs SLO vs SLI: Understanding the Differences
    • โฑ๏ธMean Time to Recovery (MTTR)
Powered by GitBook
On this page
  • My Areas of Focus
  • Artificial Intelligence: Beyond the Hype
  • DevSecOps: Security as Code, Not Afterthought
  • Data Engineering: Architecting for Insight
  • Multi-Cloud Architecture: Strategic Flexibility
  • Identity and Access Management: The New Security Perimeter
  • Site Reliability Engineering: Stability Through Automation
  • Why I Created This Resource

Blog Content

After spending over a decade at the intersection of cloud computing, security, and data engineering, I've created this knowledge repository to share insights from my professional journey. This collection represents my experience with technologies that are transforming how we build and maintain modern systems.

My Areas of Focus

Artificial Intelligence: Beyond the Hype

Throughout my career, I've witnessed AI evolve from academic research to practical business applications. My focus has been implementing solutions that leverage machine learning, natural language processing, and computer vision to solve real problems. I've learned that successful AI adoption isn't just about algorithmsโ€”it requires thoughtful data governance, ethical considerations, and seamless integration with existing systems. In this section, I'll share frameworks and approaches that have helped me deliver AI solutions that provide genuine business value.

DevSecOps: Security as Code, Not Afterthought

My journey with DevSecOps began when I experienced firsthand the limitations of traditional security approaches. I've since developed methodologies that truly "shift security left," embedding protection at every stage of the development lifecycle. I'll share practical implementations of automated security testing in CI/CD pipelines, vulnerability management strategies, and approaches to foster collaboration between development and security teams that have reduced our mean-time-to-remediation by over 60%.

Data Engineering: Architecting for Insight

Data without architecture is just noise. Through my work with organizations across industries, I've designed and implemented data pipelines that transform raw information into actionable insights. In these articles, I explore modern data engineering practices including robust ETL processes, data quality frameworks, and scalable architectures for processing petabyte-scale datasets. You'll find practical examples from my projects showing how proper data engineering becomes the foundation for all data-driven decision making.

Multi-Cloud Architecture: Strategic Flexibility

Having led cloud migrations and designed multi-cloud environments for enterprise systems, I've developed a pragmatic approach to leveraging different cloud providers. I'll discuss strategies for maintaining flexibility while minimizing complexity, optimizing cost models across providers, and implementing effective orchestration that prevents vendor lock-in. My architecture patterns have helped organizations achieve both technical resilience and business agility in an increasingly complex cloud landscape.

Identity and Access Management: The New Security Perimeter

As traditional network boundaries dissolve, identity has become the new perimeter. Drawing from my experiences implementing IAM solutions for global organizations, I'll share approaches to modern identity governance, authentication innovations beyond passwords, and access management strategies that balance security with user experience. These articles reflect lessons learned securing complex systems while providing friction-free access to legitimate users.

Site Reliability Engineering: Stability Through Automation

My SRE practice began when I transitioned from traditional operations to an engineering-focused approach to reliability. I've implemented SLOs, error budgets, and automated reliability testing that transformed how my teams measure and improve system performance. I'll share practical techniques for applying software engineering principles to operations challenges, creating observable systems, and building a culture where reliability becomes a feature, not a firefighting exercise.

Why I Created This Resource

This knowledge base represents what I wish I had when navigating these complex domains. My goal is to provide practical, experience-based guidance beyond theoretical conceptsโ€”real approaches that have succeeded (and sometimes failed) in production environments.

Each section contains both foundational knowledge and advanced techniques. Whether you're expanding your technical expertise or seeking solutions to specific challenges, I hope my experiences provide valuable insights for your own journey.

I regularly update this content with new lessons learned and emerging practices. Connect with me if you have questions or want to discuss any of these topics in more depth.

โ€”A passionate practitioner sharing the path through modern technology landscapes

NextBuilding an Intelligent Agent with Local LLMs and Azure OpenAI

Last updated 1 day ago

Page cover image