Complete list of 578 AWS service principals, auto-updated from AWS Policy Generator. Includes trust policy examples, regional variations, confused deputy protection, and documentation links.
AWS CDK vs Terraform: The Complete 2026 Comparison
Compare AWS CDK vs Terraform with decision framework, migration paths, and honest trade-offs. Choose your IaC tool with confidence.
Case Study: Reducing Complexity By Migrating from K8S to ECS Fargate for NetworkLessons
Case study on how NetworkLessons simplified and improved their Operations and reduced their time spend on maintenance by replacing their Kubernetes cluster with AWS ECS Fargate combined with a fully automated AWS CDK environment.
AWS Control Tower vs AWS Organizations: One Builds on the Other
Control Tower requires Organizations to function. They’re layers, not alternatives. Learn the hierarchy, the clickops tradeoff, and when to use IaC instead.
AWS Control Tower Alternatives: From Console to Code
Compare 3 AWS Control Tower alternatives: CDK Landing Zone (recommended), OrgFormation, LZA. Honest IaC flexibility assessment.
AWS Multi-Account Best Practices: Build a Scalable, Secure Foundation
Learn best practices for AWS Organizations, Service Control Policies, and using landing zones to scale from 1 to 100+ accounts.
AWS Account Best Practices: Security Foundations Every Team Needs
Master AWS account security: root user protection, IAM best practices, logging, cost management, and single vs. multi-account decision framework.
Goodbye 3G (A UK Perspective)
It’s the early 2000s. Voice calls and text messages (SMS) make up the major reason a phone contract is chosen, with mobile phones being mainly that – a mobile version of a phone. But coming around the corner is a potential game changer in the 3rd generation of mobile networks, 3G. Phone Networks Mobile phone networks […]
TCP/IP Model
In this blog post the TCP/IP Model is looked at to give an overview of how it operates and how data moves through it. Examples are given of each layer of the TCP/IP Model. TCP/IP Model The TCP/IP model is made up of layers: Application Transport Internet Link Data is encoded and decoded at Application […]
Networking Protocols
Communication requires protocols (rules) so that those involved in the communication understand how to interact. In the world of technology this could be communication between two or more computers which means for example they may need to understand: Protocols for use over the Internet are generally published as RFCs (Request for Comments) by standards setting […]
