What are the top 10 biggest lessons you have learned from the corporate world?

What are the top 10 biggest lessons you have learned from the corporate world?

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

What are the top 10 biggest lessons you have learned from the corporate world?

According to Wikipedia, Corporate America is  an informal (and sometimes derogatory) phrase describing the world of corporations and big business within the United States and Canada.

Below are the Top 10 potential lessons that might be learned from working in a corporate environment:

  1. The importance of teamwork and collaboration: Working in a corporate environment often requires you to work as part of a team and to collaborate with others to achieve common goals.
  2. The value of communication: Effective communication is essential in the corporate world, both when interacting with colleagues and when dealing with clients or customers.
  3. The need for adaptability: The corporate world is constantly changing, and it is important to be able to adapt to new situations and challenges as they arise.
  4. The importance of professionalism: Maintaining a professional demeanor and following appropriate workplace protocols is crucial in the corporate world.
  5. The need for time management and organization: In a corporate environment, it is important to be able to manage your time and resources effectively and to stay organized.
  6. The importance of developing strong problem-solving skills: Working in a corporate environment often requires you to solve complex problems and make decisions under pressure.
  7. The value of networking: Building strong professional relationships and networking with others in your industry can be beneficial for your career development.
  8. The importance of learning and development: Continuing to learn and grow as a professional is important in the corporate world, both for your own development and for the success of your organization.
  9. The need for conflict resolution skills: Conflicts and misunderstandings are a normal part of working in a corporate environment, and it is important to have the skills to resolve these conflicts effectively.
  10. Maintain a positive attitude: A positive attitude can help you stay motivated and focused, and can also influence the people around you in a positive way.
  11. Develop strong communication skills: Being able to clearly articulate your thoughts and ideas, listen effectively to others, and communicate with people from different backgrounds is crucial in the corporate world.
  12. Build a strong network: Building strong relationships with colleagues, clients, and industry professionals can help you advance your career and open up new opportunities.
  13. Take ownership of your work: Taking responsibility for your work and delivering high-quality results is essential for success in the corporate world.
  14. Continuously learn and grow: Staying up-to-date with industry trends and continuously learning new skills will help you stay competitive and adapt to change.
  15. Be proactive and take initiative: Don’t wait for someone else to tell you what to do – take the initiative to identify problems and find solutions.
  16. Be adaptable and flexible: The corporate world is constantly changing, so being able to adapt to new situations and approaches is key to success.
  17. Manage your time effectively: Being able to prioritize tasks and manage your time effectively will help you meet deadlines and achieve your goals.
  18. Set clear goals and objectives: Setting clear goals and objectives will help you stay focused and motivated, and will also make it easier to measure your progress.
  19. Be willing to take risks: Success often requires stepping outside your comfort zone and taking calculated risks.


A job or career in corporate America is usually the best entry to true middle class or even upper middle class for managers,  but it comes with baggages.


1- Every single day, there is someone whose job is to figure out how to get rid of you without impacting the business. Make choice that are good for you and your family only. If you leave, no one will care. Everybody is replaceable.


2- No emotion, nobody cares for you. The occasional smiles are 95% fake. Never forget that.

Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet)  Business Plan (AMERICAS) with  the following codes:  C37HCAQRVR7JTFK Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)

Active Anti-Aging Eye Gel, Reduces Dark Circles, Puffy Eyes, Crow's Feet and Fine Lines & Wrinkles, Packed with Hyaluronic Acid & Age Defying Botanicals


3- Always figure out a way to be good and be needed, because at the second they realize they can do it without you with minimal effect to the team or business, you will be gone.


4- Always improve yourself and keep your eyes open on the market. Never get too comfortable. Be nice to recruiters, always reply nicely to their email even if you are not available. The tide can turn very quickly. Always keep a pulse on the job market. At least twice a year apply for jobs in your industry to get a sense on what your skills trade for in the open market and to sharpen your interviewing skills. It is also a great habit to be in the orbit of recruiters because they operate within a tight-knit ecosystem, network with, and know one another. If you’re not a great fit for one role, and they like you, they’ll refer you to a friend or colleague looking to fill another role as a courtesy.


5- If you are very technical , the best outcome for you is to open your own business or become an independent consultant or contractor or freelancer while working in corporate. Once your own business pick up, quit your corporate job and discover real freedom.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Bard, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

Read this thread on Reddit for successful freelance stories from people who are sick and tired of Corporate America:

Read this excellent answer from Quora

6- Be very wise and knowledgeable about the business, but stay humble at the same time: Be friendly without making friends. Being too cold can prevent colleagues from sharing gossips with you and those gossips can be helpful sometimes.

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

7- Stay away from people who complain too much, they slow productivity and can drag you with them and expose you.

8- HR is not your friend. Their jobs is to protect the big bosses and their own job. Think twice before reporting racists, sexists, bullies, …or you will be gone. If you are victim of any of that as a minority, look for a new job and report it anonymously, otherwise your career will be over. All the following characteristics are overlooked by most HR departments:

Compassion

Sympathy

Empathy

Kindness

Gratitude

Humility

Patience

Self awareness

Djamgatech: Build the skills that’ll drive your career into six figures: Get Djamgatech.

The ability to be the “bigger person”

Sincerity

9- Become a subject matter in at least one topic or area within your department of team to make yourself indispensable. Be result oriented and not effort oriented. Result matter more than effort. Focus on getting things done instead of on working hard. They are more than often not the same thing.

10- Volunteer to headline new projects and gain visibility from leadership. It might help during tough times when cuts are needed.

11- Be kind, especially to nerds, they will probably own a company one day and will remember you. Be authentic, work hard and be wise and kind, especially to the awkward and silent ones. Introverts, extroverts, flashy dressers, frumpy dressers, are sometime gifted with supreme execution and succeed in business, which proves one thing: Success doesn’t care how you show up; just that you show up.

12- Never waste your weekend or holidays for office work. Your company is not going to take care of your family. You will regret later when the time will start taking your loved ones back, every product of nature has expiry date. This is harsh truth.

13- Emotional and professional are opposite words in corporate culture. Don’t share your emotional stories with your colleagues, surely one day, they are gonna make fun of your emotions and use it against you.

14- Keep your spirit and self respect up and never let anyone harm your image. They selected you because you were better than others and you add value to the company.

15- Never make a relationship in the office, a single mistake will destroy your personal and professional life.

Ace the Microsoft Azure Fundamentals AZ-900 Certification Exam: Pass the Azure Fundamentals Exam with Ease

Other Corporate America stories:

What are the unwritten rules and dark truth of corporate America?


What are your best tips to survive corporate America?

Disclaimer: The content of this post doesn’t describe or target any company I worked with in particular, it is based on research and discussion with friends working with several companies within Corporate America.

Financing Black Businesses in Canada and USA: Challenges and Opportunities

Examining the Fragmented Data on Black Entrepreneurship in North America

How does using a VPN or Proxy or TOR or private browsing protects your online activity?

Google PageRank

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

How does using a VPN or Proxy or TOR or private browsing protects your online activity?

There are several ways that using a virtual private network (VPN), proxy, TOR, or private browsing can protect your online activity:

  1. VPN: A VPN encrypts your internet connection and routes your traffic through a secure server, making it harder for others to track your online activity. This can protect you from hackers, government surveillance, and other types of online threats.
  2. Proxy: A proxy acts as an intermediary between your device and the internet. When you use a proxy, your internet traffic is routed through the proxy server, which can mask your IP address and make it harder for others to track your online activity.
  3. TOR: The TOR network is a decentralized network of servers that routes your internet traffic through multiple servers to obscure your IP address and location. This can make it more difficult for others to track your online activity.
  4. Private browsing: Private browsing mode, also known as “incognito mode,” is a feature that is available in most modern web browsers. When you use private browsing, your web browser does not store any information about your browsing activity, including cookies, history, or cache. This can make it harder for others to track your online activity.

Overall, using a VPN, proxy, TOR, or private browsing can help protect your online activity by making it harder for others to track your internet usage and by providing an additional layer of security. However, it is important to note that these tools are not foolproof and cannot completely guarantee your online privacy. It is always a good idea to be aware of your online activity and take steps to protect your personal information.

VPNs are used to provide remote corporate employees, gig economy freelance workers and business travelers with access to software applications hosted on proprietary networks. To gain access to a restricted resource through a VPN, the user must be authorized to use the VPN app and provide one or more authentication factors, such as a password, security token or biometric data.

How does using a VPN or Proxy or TOR or private browsing protects your online activity?

A VPN extends a private network across a public network, and enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network. Applications running on a computing device, e.g. a laptop, desktop, smartphone, across a VPN may therefore benefit from the functionality, security, and management of the private network. Encryption is a common though not an inherent part of a VPN connection.

Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet)  Business Plan (AMERICAS) with  the following codes:  C37HCAQRVR7JTFK Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)

Active Anti-Aging Eye Gel, Reduces Dark Circles, Puffy Eyes, Crow's Feet and Fine Lines & Wrinkles, Packed with Hyaluronic Acid & Age Defying Botanicals

To ensure security, the private network connection is established using an encrypted layered tunneling protocol and VPN users use authentication methods, including passwords or certificates, to gain access to the VPN. In other applications, Internet users may secure their connections with a VPN, to circumvent geo restrictions and censorship, or to connect to proxy servers to protect personal identity and location to stay anonymous on the Internet. However, some websites block access to known VPN technology to prevent the circumvention of their geo-restrictions, and many VPN providers have been developing strategies to get around these roadblocks.

Private browsing on incognito window or inPrivate window a privacy feature in some web browsers (Chrome, Firefox, Explorer, Edge). When operating in such a mode, the browser creates a temporary session that is isolated from the browser’s main session and user data. Browsing history is not saved, and local data associated with the session, such as cookies, are cleared when the session is closed.

These modes are designed primarily to prevent data and history associated with a particular browsing session from persisting on the device, or being discovered by another user of the same device. Private browsing modes do not necessarily protect users from being tracked by other websites or their internet service provider (ISP). Furthermore, there is a possibility that identifiable traces of activity could be leaked from private browsing sessions by means of the operating system, security flaws in the browser, or via malicious browser extensions, and it has been found that certain HTML5APIs can be used to detect the presence of private browsing modes due to differences in behaviour.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Bard, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

The question is:

How does using a VPN or Proxy or TOR or private browsing protects your online activity?

What are the pros and cons of VPN vs Proxy?

How can VPN, Proxy, TOR, private browsing, incognito windows How does using a VPN, Proxy, TOR, private browsing, incognito windows protects your online activity? protects your online activity?

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

  • VPN masks your real IP address by hiding it with one of its servers. As a result, no third party will be able to link your online activity to your physical location. To top it off, you avoid annoying ads and stay off the marketer’s radars.
  • VPN encrypts your internet traffic in order to make it impossible for anybody to decode your sensitive information and steal your identity. You can also learn more what a development team tells about how they protect their users against data theft.

If your VPN doesn’t protect your online activities, it means there are some problems with the aforementioned protection measures. This could be:

  1. VPN connection disruption. Unfortunately, a sudden disruption of your connection can deanonymize you, if at this moment your device is sending or receiving IP-related requests. In order to avoid such a situation, the kill switch option should be always ON.
  2. DNS/IP address leakage. This problem can be caused by various reasons from configuration mistakes to a conflict between the app under discussion and some other installed software. Regardless of the reason, you will end up with otherwise perfectly working security app, which, in fact, is leaking your IP address.
  3. Outdated protocol. In a nutshell, it is the technology that manages the сreation of your secured connection. If your current protocol becomes obsolete, the app will not work perfectly.
  4. Free apps. This is about free software that makes money on your privacy. The actions of such applications are also considered as unethical and illegal. Stealing your private data and selling of it to third parties is one of them.
  5. User carelessness. For instance, turn on your virtual private network when you visit any website or enter your credentials. Don’t use the app sporadically.

How is a VPN different from a proxy server?

On top of serving as a proxy server, VPN provides encryption. A proxy server only hides your IP address.

Proxies are good for the low-stakes task like: watching regionally restricted videos on YouTube, creating another Gmail account when your IP limit ran out, accessing region restricted websites, bypassing content filters, request restrictions on IP.

On the other hand, proxies are not so great for the high-stakes task. As we know, proxies only act as a middleman in our Internet traffic, they only serve a webpage which we are requesting them to serve.

Just like the proxy service, a VPN makes your traffic to have appeared from the remote IP address that is not yours. But, that’s when all the similarities end.

Unlike a proxy, VPN is set at the operating system level, it captures all the traffic coming from the device it is set up on. Whether it is your web traffic, BitTorrent client, game, or a Windows Update, it captures traffic from all the applications from your device.

Another difference between proxy and VPN is – VPN tunnels all your traffic through heavily encrypted and secure connection to the VPN server.

This makes VPN an ideal solution high-stakes tasks where security and privacy are of paramount of importance. With VPN, neither your ISP, Government, or a guy snooping over open Wi-Fi connection can access your traffic.

What are daily use of VPN for?

There are many uses of Virtual Private Network (VPN) for normal users and company employees. Here are the list of the most common usages:

Accessing Business Networks From Any Places in the World :

Djamgatech: Build the skills that’ll drive your career into six figures: Get Djamgatech.

This is one of the best use of VPN. It is very much helpful when you are travelling and have to complete some work. You can connect any computer to your business network from anywhere and set up your work easily. Local resources need some security so they have to be kept in VPN-only to ensure their safety.

To Hide Your Browsing Data From ISP & Local Users :

All Internet Service Providers (ISP) will log the data of your IP address. If you use the VPN then they can only see the connection of your VPN. It won’t let anyone spy on your website history.

Moreover, it secures your connection when you use a public Wi-Fi network. As you may or may not know, users on these networks can spy on your browsing history, even if you are surfing HTTPS websites. Virtual Private Networks protect your privacy on public unsecured Wi-Fi connection.

To Access Geographically Blocked Sites :

Have you ever faced a problem like “This content is not available in your country”? VPNs are the best solution to bypass these restrictions.

Some videos on YouTube will also show this restriction. VPNs are a quick fix for all these restrictions.

What about TOR and VPN? What are the Pros and Cons?

The Tor network is similar to a VPN. Messages to and from your computer pass through the Tor network rather than connecting directly to resources on the Internet. But where VPNs provide privacy, Tor provides anonymity.

Tor is free and open-source software for enabling anonymous communication. The name is derived from an acronym for the original software project name “The Onion Router”. Tor directs Internet traffic through a free, worldwide, volunteer overlay network consisting of more than seven thousand relays to conceal a user’s location and usage from anyone conducting network surveillance or traffic analysis. Using Tor makes it more difficult to trace Internet activity to the user: this includes “visits to Web sites, online posts, instant messages, and other communication forms”.[ Tor’s intended use is to protect the personal privacy of its users, as well as their freedom and ability to conduct confidential communication by keeping their Internet activities from being monitored.

Tor does not prevent an online service from determining when it is being accessed through Tor. Tor protects a user’s privacy, but does not hide the fact that someone is using Tor. Some websites restrict allowances through Tor. For example, Wikipedia blocks attempts by Tor users to edit articles unless special permission is sought. Although a VPN is generally faster than Tor, using them together will slow down your internet connection and should be avoided. More is not necessarily better in this situation.

Is VPN necessary when using the deep web?

Ace the Microsoft Azure Fundamentals AZ-900 Certification Exam: Pass the Azure Fundamentals Exam with Ease

The deep web is the part of the web that can not be indexed by search machines: internal company login pages, or a school portal (the internal portal) private google sites or government pages.

The dark web is the more sinister form of the Deep Web. The dark web is more associated with illegal activity (i.e child pornography, drug dealing, hitmen etc).
VPN is not necessary when connecting to the DEEP WEB. Please do not confuse the DEEP WEB with the DARK WEB.

Are there any good free VPN services?

It is not recommended to use free VPN for following reasons:

1- Security: Free VPNs don’t necessarily have to ensure your privacy is protected.

2- Tracking – Free VPNs have no obligation to keep your details safe, so at any point, your details could be passed on.

3- Speed / bandwidth – Some free VPN services are capped at a lower bandwidth that is you will receive less browsing or download speed to that of paid VPN.

4- Protocols supported – A free VPN may not support all necessary protocols. PPTP, OpenVPN and L2TP are generally provided only on paid VPN services.

If you are ok with the risks of using Free VPN, here are some you can try:

  1. TunnelBear: Secure VPN Service
  2. Hide.me VPN
  3. SurfEasy | Ultra fast, no-log private network VPN for Android, iOS, Mac & Windows
  4. CyberGhost Fast and Secure VPN Service
  5. Windscibe Free VPN and Ad Block
  6. OpenVPN – Open Source VPN
  7. SoftEther VPN Open Source
  8. Zenmate
  9. HotSpot Shield

Paid VPNs are better and give you:

  • great customer support
  • lighting internet speed
  • user friendly design
  • minimum 256-bit security
  • advanced features such as P2P, double encryption, VPN over Onion etc.

Below are the top paid VPNs:

1- NordVPN – cost-effective, provides Netflix in 5 countries (US, CAN, UK, JP, NL) and does not log your info.

2- ExpressVPN – nearly 3x NordVPN’s price but guarantees Netflix in the US. Excellent customer service and claims to not log your info.

3- Private Internet Access – a U.S. based VPN that has proven its no log policy in the court of law. This is a unique selling point that 99.99% VPNs don’t have.

4- OpenVPN provides flexible VPN solutions to secure your data communications, whether it’s for Internet privacy, remote access for employees, securing IoT, or for networking Cloud data centers. 

Other Questions about VPN and security:

Why might certain web sites not load with VPN?

For security, some corporations like Banks often block IP addresses used by major VPN companies, because it is thought to improve security.

Can a VPN bypass being flagged as a suspicious log-in on Facebook & Instagram?

You probably need a VPN that allow you to use dedicated IP address, otherwise the server ips are constantly switching every time you reconnect to your vpn and shared ip usually raised as suspicious logins due to many people logging in from the same ip address (which make the site thinks it might be bots or mass-hacked accounts).

How is a hacker traced when server logs show his or her IP is from a VPN?

  • Start looking for IP address leaks. Even hackers are terrible at not leaking their IPs.
  • Look for times the attacker forgot to enable their VPN. It happens all the time.
  • Look at other things related to the attcke like domains for example. They might have registered a domain using something you can trace or they left a string in the malware that can help identify them.
  • Silently take control of the command and control server legally.

What is the most secure VPN protocol?

  • OpenVPN technology uses the highest levels (military standards) of encryption algorithms i.e. 256bit keys to secure your data transfers.
  • OpenVPN is also known to have the fastest speeds even in the case of long distance connections that have latency. The protocol is highly recommended for streaming, downloading files and watching live TV. In addition to speeds, the protocol is stable and known to have fewer disconnections compared to its many counterparts.
  • OpenVPN comes equipped with solid military grade encryption and is way better, security wise, than PPTP, L2TP/IPSec and SSTP.

What are some alternatives for VPN?

  • Tor network, it is anonymous, free and well, rather slow, certainly fast enough to access your private email, but not fast enough to stream a movie.
  • Proxies are remote computers that individuals or organizations use to restrict Internet access, filter content, and make Internet browsing more secure. It acts as a middleman between the end user and the web server, since all connection requests pass through it. It filters the request first then sends it to the web server. Once the web server responds, the proxy filters the response then sends it to the end user.
  • IPSec (Cisco, Netgear, etc.): secure network protocol suite that authenticates and encrypts the packets of data sent over an Internet Protocol network.
  • SSL (Full) like OpenVPN
  • SSL (Partial) like SSL-Explorer and most appliances
  • SSH Tunneling is a method of transporting arbitrary networking data over an encrypted SSH connection. It can be used to add encryption to legacy applications. It also provides a way to secure the data traffic of any given application using port forwarding, basically tunneling any TCP/IP port over SSH.
  • PPTP
  • L2TP (old Cisco, pre IPSec)
  • DirectAccess 
  • Hamachi
  • You can create you own VPN as well using any encryption or simple tunneling technology.


How does private browsing or incognito window work?

When you are in private browsing mode, your browser doesn’t store any of this information at all. It functions as a completely isolated browser session.

For most web browsers, their optional private mode, often also called InPrivate or incognito, is like normal browsing except for a few things.

  1. it uses separate temporary cookies that are deleted once the browser is closed (leaving your existing cookies unaffected)
  2. no private activity is logged to the browser’s history
  3. it often uses a separate temporary cache

What are the advantages of Google Chrome’s private browsing?

  • simultaneously log into a website using different account names
  • access websites without extensions (all extensions are disabled by default when in Incognito)
  • Shield you from being tracked by Google, Facebook and other online advertising companies
  • Allow you to be anonymous visitor to a website, or see how a personalized webpage will look like from a third-party perspective

Firefox private browsing or chrome incognito?

Mozilla doesn’t really have an incentive to spy on their users. It’s not really going to get them anything because they’re not a data broker and don’t sell ads. Couple this with the fact that Firefox is open-source and I would argue that Firefox is the clear winner here.

Chrome now prevents sites from checking for private browsing mode

Mozilla Private Network VPN gives Firefox another privacy boost

Adding a VPN to Firefox is clever because it means the privacy protection is integrated into one application rather than being spread across different services. That integration probably makes it more likely to be used by people who wouldn’t otherwise use one.

Pros and Cons of Adding VPN to browsers like Firefox and Opera:

Turning on the VPN will give users a secure connection to a trusted server when using a device connected to public Wi-Fi (and running the gamut of rogue Wi-Fi hotspots and unknown intermediaries). Many travellers use subscription VPNs when away from a home network – the Mozilla Private Network is just a simpler, zero-cost alternative.

However, like Opera’s offering, it’s not a true VPN – that is, it only encrypts traffic while using one browser, Firefox.  Traffic from all other applications on the same computer won’t be secured in the same way.

As with any VPN, it won’t keep you completely anonymous. Websites you visit will see a Cloudflare IP address instead of your own, but you will still get advertising cookies and if you log in to a website your identity will be known to that site.

Additional reading:

Resources:

1- Wikipedia

2- Quora

3- SearchExpress

4- Reddit

5- VPN’s for Remote Workers: A Beginners Guide for 2019

What is the programming model and best language for Hadoop and Spark? Python or Java?

Google PageRank

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

Hadoop is an open-source software framework for storing data and running applications on clusters of commodity hardware. It provides massive storage for any kind of data, enormous processing power and the ability to handle virtually limitless concurrent tasks or jobs. Apache Hadoop is used mainly for Data Analysis

Apache Spark is an open-source distributed general-purpose cluster-computing framework. Spark provides an interface for programming entire clusters with implicit data parallelism and fault tolerance

The question is Which programming language is good to drive Hadoop and Spark?

The programming model for developing hadoop based applications is the map reduce. In other words, MapReduce is the processing layer of Hadoop.
MapReduce programming model is designed for processing large volumes of data in parallel by dividing the work into a set of independent tasks. Hadoop MapReduce is a software framework for easily writing an application that processes the vast amount of structured and unstructured data stored in the Hadoop Distributed FileSystem (HDFS). The biggest advantage of map reduce is to make data processing on multiple computing nodes easy. Under the Map reduce model, data processing primitives are called Mapper and Reducers.

Spark is written in Scala and Hadoop is written in Java.

Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet)  Business Plan (AMERICAS) with  the following codes:  C37HCAQRVR7JTFK Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)

Active Anti-Aging Eye Gel, Reduces Dark Circles, Puffy Eyes, Crow's Feet and Fine Lines & Wrinkles, Packed with Hyaluronic Acid & Age Defying Botanicals

The key difference between Hadoop MapReduce and Spark lies in the approach to processing: Spark can do it in-memory, while Hadoop MapReduce has to read from and write to a disk. As a result, the speed of processing differs significantly – Spark may be up to 100 times faster.

In-memory processing is faster when compared to Hadoop, as there is no time spent in moving data/processes in and out of the disk. Spark is 100 times faster than MapReduce as everything is done here in memory.

Spark’s hardware is more expensive than Hadoop MapReduce because it’s hardware needs a lot of RAM.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Bard, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

Hadoop runs on Linux, it means that you must have knowldge of linux.

Java is important for hadoop because:

  • There are some advanced features that are only available via the Java API.
  • The ability to go deep into the Hadoop coding and figure out what’s going wrong.

In both these situations, Java becomes very important.
As a developer, you can enjoy many advanced features of Spark and Hadoop if you start with their native languages (Java and Scala).

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

What Python Offers for Hadoop and Spark?

  • Simple syntax– Python offers simple syntax which shows it is more user friendly than other two languages.
  • Easy to learn – Python syntax are like English languages. So, it much more easier to learn it and master it.
  • Large community support – Unlike Scala, Python has huge community (active), which we will help you to solve your queries.
  • Offers Libraries, frameworks and packages – Python has huge number of Scientific packages, libraries and framework, which are helping you to work in any environment of Hadoop and Spark.
  • Python Compatibility with Hadoop – A package called PyDoop offers access to the HDFS API for Hadoop and hence it allows to write Hadoop MapReduce program and application.

  • Hadoop is based off of Java (then so e.g. non-Hadoop yet still a Big-Data technology like the ElasticSearch engine, too – even though it processes JSON REST requests)
  • Spark is created off of Scala although pySpark (the lovechild of Python and Spark technologies of course) has gained a lot of momentum as of late.


If you are planning for Hadoop Data Analyst, Python is preferable given that it has many libraries to perform advanced analytics and also you can use Spark to perform advanced analytics and implement machine learning techniques using pyspark API.


The key Value pair is the record entity that MapReduce job receives for execution. In MapReduce process, before passing the data to the mapper, data should be first converted into key-value pairs as mapper only understands key-value pairs of data.
key-value pairs in Hadoop MapReduce is generated as follows:

Resources:

1- Quora

2- Wikipedia

3- Data Flair

What is the best app for finding people to join group activity in USA and Canada for free?

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

In this blog, I will help answer this question that i get frequently: What is the best app for finding people to join group activity ?

1- The meetup app is the best. You can join as a member or as an organizer or both. I run multiple meetup groups and organize drop in soccer/football games. I post and also allow members to post all kind of games and people join and play together. It is a lot of fun. Check out my Show Up And Play meetups app at https://meetup.com/ShowUpAndPlaySports

2- Facebook Groups or pages

Look for established Facebook group or pages for your specific activity or create a new group of your own for free and grow it organically.

3- Kijiji activity and groups under community section in Canada

Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet)  Business Plan (AMERICAS) with  the following codes:  C37HCAQRVR7JTFK Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)

Active Anti-Aging Eye Gel, Reduces Dark Circles, Puffy Eyes, Crow's Feet and Fine Lines & Wrinkles, Packed with Hyaluronic Acid & Age Defying Botanicals

You can find teams looking for players or players looking for teams on this section. You can also post your own ad and you will get a lot of answers.

4- Craigslist Community-activity section of your city in USA or Canada


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Bard, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

Same as kijiji: You can find teams looking for players or players looking for teams on this section. You can also post your own ad and you will get a lot of answers.

5- WhatsApp Groups for your activity in your city

One can send messages and media individually as well as in groups through WhatsApp. Yes, I know you all are familiar with these things and even better than me. If you really wish to send you messages to a large number of people having a common identity, we make use of groups. We create groups so that every message is delivered with great accuracy. Additionally, these groups created will help business owners and organizations to promote and set up their business.

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

Moreover, all the WhatsApp group resembles our social connection. It has now become an ineluctable part of our personal lives. Spreading information to a big crowd has now become an easy job with aid of WhatsApp groups. You can easily make a personal connection with your old school and college mates. Also, Whatsapp groups help people to get connected with relatives living on the other part of the world.

Search online for WhatsApp group for soccer in your city for example. Unfortunately most WhatsApp groups are private to avoid being spammed and the best way is to know someone part of a specific WhatsApp group and request to be added. For example, to join Calgary and Edmonton Soccer WhatsApp group, you must contact the Admin at 4zero3695SevenThree0Four to be added.

Top 10 legal side business that can make you $1000-$2000 a week?

IT Engineering Finance Login

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

Below are the Top 10 legal side business that can make you $1000-$2000 a week. This list is based on my own experience and research. I have tried most of them and it takes dedication and passion to get there. Do your due diligence and make sure you have enough passion and patience to make it work.

Here are 10 legal side businesses that have the potential to make you $1000-$2000 a week in 2023:

  1. Freelance writing or editing: If you have strong writing or editing skills, you could offer your services as a freelance writer or editor. You could write blog posts, articles, marketing materials, or other types of content for clients.
  2. Graphic design: If you have experience with graphic design, you could offer your services to create logos, brochures, business cards, or other types of marketing materials for clients.
  3. Virtual assistance: As a virtual assistant, you could provide administrative, technical, or creative support to clients remotely.
  4. Social media management: If you have experience with social media marketing, you could offer your services to manage the social media accounts of businesses or individuals.
  5. Website design or development: If you have experience with website design or development, you could offer your services to create or update websites for clients.
  6. Pet sitting or dog walking: If you love animals, you could offer pet sitting or dog walking services to busy pet owners.
  7. Personal training or coaching: If you have experience in fitness or coaching, you could offer personal training or coaching services to clients.
  8. Event planning: If you enjoy planning events, you could offer your services to plan weddings, parties, or other types of events for clients.
  9. Photography: If you have experience with photography, you could offer your services to take photos for events, businesses, or individuals.
  10. Tutoring or teaching: If you have expertise in a particular subject, you could offer tutoring or teaching services to students.

These are just a few examples of legal side businesses that could potentially make you $1000-$2000 per week. The key to success in any side business is to offer high-quality services and to market your business effectively to reach potential clients.

11- Referee (If you like sports)

Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet)  Business Plan (AMERICAS) with  the following codes:  C37HCAQRVR7JTFK Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)

Active Anti-Aging Eye Gel, Reduces Dark Circles, Puffy Eyes, Crow's Feet and Fine Lines & Wrinkles, Packed with Hyaluronic Acid & Age Defying Botanicals

Become an amateur team sports referee and officiate about 20 to 30 games per week. I did it myself and it works. You make extra cash and stay in shape and meet a lot of people( hot girls playing soccer or basketball included).

To become a soccer referee, you just need to take a 2 days certification that will cost you about $100 depending on your state.

Amateur soccer Referees are paid up to $50 per game and games are played everyday after 05pm and on week ends.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Bard, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

I have created a referee locator app and listed how to become a referee anywhere in US and Canada at Amateur Referees Locator – How to become a referee? – Djamga – ShowUpAndPlaySports

12- Buy and sell popular or efficient cars (Japanese makes like Corolla, Camry, Honda, etc…) on Craigslist , kijiji, facebook marketplace or any local popular online used item market site.

13- Learn web design, coding and apply for part time consulting gigs at Remote Jobs: Design, Programming, Rails, Executive, Marketing, Copywriting, and more. or any other site posting IT work remote jobs in US or Canada.

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

14- Organize sports tournaments (soccer, basketball, hockey): Rent good and inexpensive fields, convince friends to create teams, run a great campaign and organize amateur sport tournaments monthly and you can easily make $5000 after expenses if you do it right. This is not easy though, you must know local players and team captains and convince them to join.

15- Become a freelancer writer If you’re creative about how you write (hint: use speech to text and edit down into prose) you can get your hourly > $40/hour even at rates like $1/100 words.

16- Learn to play poker either online or in-person. Online, go for low-stakes and grind out your cash. Live, go for higher stakes and hunt down atrocious players (see my answer to How much can a competitive online poker player make? for more)

17- Become a tutor that focuses on students that are under-performing in the subjects you’re best at.

18- Do contract sales for companies that pay you recurring revenue. Over time, if you take care of your accounts, you won’t even need to close new ones if the retention rate is high.

19- Arbitrage mispriced items on Craigslist or kijiji

20- Arbitrage textbooks on Amazon. Time it with quarters / semesters / school years ending and hold until next quarter / semester / school year.

Bonus1- Drive 20 hours a week for Uber or https://lyft.com

Bonus2- Buy vending machines so that your cashflow for your investment is $1,000-$2,000 a week

Bonus- More opportunities here

Djamgatech: Build the skills that’ll drive your career into six figures: Get Djamgatech.

Top 10 Financial Tips for Young Adults in USA and Canada

IT Engineering Finance Login

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

This blog is geared towards young adults, particularly young first and second generation immigrants like me who don’t have any real estate and assets inherited from their parents here in Canada and USA. In this blog, I will help answer the following questions below based on my own experience and extensive research:

I- What are some financial tips for middle class people? What is the best financial advice for middle age people?

  • Work Hard first and foremost and do well at your job. If you are not working hard at your job, you will lose it and any advice below won’t matter.
  • Live a healthy lifestyle. Your health is your most important asset: Any advice below will be useless if you don’t eat healthy, exercise and have a stress free life. Get medical insurance and get a health check up done once every year
  • Live within your mean; within your budget; Don’t spend more than you earn.
  • Use your credit cards, but always pay them off at the end of the month.
  • Never miss a credit card payment: It will affect your credit negatively and cost you money.
  • Don’t buy a car unless you really really need one. If you do need a car, don’t buy old cars; You will end up spending more in the long run. Buy new cars at bargain price.
  • Take public transit or bike to work: You will save money and exercise and read a lot in the process.
  • Rent empty rooms in your apartment or house, and use that rental income to pay off your mortgage.
  • Get a side job in an area you are passionate about: If you like team sports, you can become a referee or coach and make extra money. You can help people fix their web site if you are tech savvy; You can buy and sell used items on facebook marketplace or kijiji or craigslist for a profit; you can be a tutor on week ends or evenings, etc…
  • After paying all your student loans and more importantly your credit cards debts, save money every single month automatically in your TFSA, RRSP , Roth IRA, 401K accounts.
  • Negotiate everything involving money coming in and out of your pocket. There are no rules set in stone about interest rates or pay grade; Negotiate, Research, Negotiate again until you get the best value for anything you are buying. Don’t be a jerk though and don’t come across as cheap: Learn when to stop and accept and appreciate a good value.

II- How do I improve my personal finances?

Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet)  Business Plan (AMERICAS) with  the following codes:  C37HCAQRVR7JTFK Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)

Active Anti-Aging Eye Gel, Reduces Dark Circles, Puffy Eyes, Crow's Feet and Fine Lines & Wrinkles, Packed with Hyaluronic Acid & Age Defying Botanicals

  • Work hard. The harder you work, the more likely you are to become financially independent. 
  • Diversify your income. You should never rely on one source of income, you should try and diversify your income streams. On top of your monthly salary at your main job, try to get rental income by renting empty rooms in your house or apartment. Get a side job in an area you have some expertise. Example: Tutoring, Team sport referee, Dance instructor, Handyman, Cleaner, salesman, etc…
  • Cancel recurring paying for things you don’t need (Netflix, Spotify, cable, etc…) ; They add up.
  • Save as much as possible into your TFSA and RRSP, Roth IRA Account and let them compound.
  • Don’t stress too much about anything, particularly finances; Stress is harmful.
  • Have self control: Resist the temptation of buying things that you don’t need.
  • Start investing early and focus on compounding. Always think about long term. Have your money earn money.
  • Read, read and read: Education will help you make and save a lot of money.
  • Exercise and invest on your health which is your most important asset.

III- What should I invest in as a 18-45 year old?  How do I become financially stable in my 20’s?


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Bard, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)
  • As soon as you get paid, transfer at least $100 automatically to your TFSA, or Roth IRA Account every month. Select an aggressive portfolio and forget it. You will likely get a big return after 10 years.
  • If you can afford a 5% down payment for a house, buy one and if you are still single, rent the empty rooms and make sure that your rental income can cover at least half of your mortgage payment.
  • If you have time to research about stocks market, do your due diligence and buy some good stocks. Don’t invest more than $10000 on stocks from your own pocket. Invest in stocks as if it is lost money and you might be lucky down the road.
  • Start saving money monthly in your RRSP, 401K and RESP accounts if you have kids.
  • Invest in your physical, mental and emotional health: Yes I am repeating myself. If you are not healthy, any other advice is useless and you might not even be around to enjoy the benefits of your investments.

IV- What is a financial rule you should never break? What personal finance mistakes should everyone avoid?

  • Easy to say, but hard to do: Never buy depreciating assets on credit. Cars, RVs, appliances, clothes, trips, leasing, etc. You won’t get rich that way.
  • If you’ve ever thought about buying a house, you’ve probably heard it: Don’t take out a mortgage until you’ve saved up at least 20 percent for a down payment. Otherwise, you’ll be forced to pay notorious private mortgage insurance.
  • Save 10 percent of your income.
  • Don’t rent or throw away money. Buy a house and be the landlord.
  • Investing before spending rather than investing after spending.
  • Pay all your bills and dues in time so as to never pay them with heavy interest or penalty!
  • Don’t invest in anything that you don’t understand. Yourself. Not because someone sold it to you or because others are doing it.
  • Don’t focus on the short-term, allow yourself to be unduly influenced by the financial news media, or let news about the market or the economy affect your long-term investing strategy.
  • Save and Invest early and aggressively in your 20’s. Time and a higher risk tolerance are extraordinarily valuable and everyone can make this call when they are younger—or do so for their children/family. This also sort of falls under the “rule” of paying yourself first. This is key to maximizing wealth.

V- How can you attain financial freedom by working 9 to 5 job?

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

  • Read , read, read and be curious. This will help you find and execute ideas to make some money on the side.
  • Increase your income streams: On top of your day job, try freelancing on the side for a few extra bucks. Identify where you can provide your freelancing services (Referee in team sports, Handyman, Tutor, Buy and Sell used items for a profit, art, etc..). The more sources you have, the better.
  • Start saving as early as you can.  The earlier you start, the better.
  • Make your money work. Start a business, make investments, do something that makes you more money from what you have.
  • Make money from your existing assets (rent rooms in yours house, Uber or deliver stuffs with your car or truck, etc..)
  • Never spend money on depreciating commodities that doesn’t affect your safety. What you can do with a  used $200 phone, doesn’t have to be bought at $1000 just because it is hip.
  • Don’t jeopardize your safety. If you buy old cars that  break down regularly and put you at risk on highway, all the advice above won’t matter.

VI- What is the best way to invest in real estate?

  • Whatever you are buying, put at least 20% down to avoid paying extra insurance fees and be stuck with a high interest rate for years.
  • Buy in decent neighbourhood.  It usually means better tenants who will be more likely to  pay their rents and not damage the property.
  • Buy a mix of multi family and single family homes.  It usually results in better tenants and higher equity growth over time.
  • Invest on home inspection: Make sure to use an agent who is able to point out potential problems.  Get a home inspection and don’t buy a property that requires extensive repair.  Especially on your first one and when you don’t have a ton of disposable income.
  • Build: Contact builder who build properties and buy from them, allowing you to get great discount and customize the house for extra rooms and developed basement. 
  • Become Part of a Bigger Deal:  By partnering up with others interested in investing and pooling your resources to make a larger deal happen. Do some research online on how you can do this for either a commercial or residential property, which in some cases, requires an investment as small as $1000. The good thing about these deals is that you can hedge your bets by placing multiple investments into various properties.
  • Real Estate Investment Trust: Also known as a REIT, you can invest in a publicly traded trust that uses the capital of its investors to acquire and operate properties. You can find REITs in the major Wall Street exchanges and it requires companies to shell out 90% of their taxable profits through dividends to investors in order to retain their position as an REIT.
  • Rent A Portion Of Your Existing Home via Airbnb or VRBO: I prefer those options because you it is short term and you can always stop renting when you have family visiting. This gives you a lot of flexibility.

VII- Is it worth taking out a loan to pay for a house?

 Year 1Year 10
Time to Sell
John Doe 1
Buys 1 house cash putting 20K down and invest 80K
Gets $800 per month from the $80K savings
easy life and always has plenty of cash
$96,000 in rental income
sells his one house for $200,000 and nets $100,000, so his total gain was $196,000, not bad. His $100,000 investment has nearly tripled!
John Doe 2
Borrows and Buys 4 houses with 100K putting down 20K for each
Gets $200 per house per month but spends it all towards the principal of the loan, so gets $0 per month
Must keep his full time job and has a struggle keeping up with expenses
around $24,000 in rental income
sells his 4 rentals for $200,000 each netting $100,000 each for a gain of $400,000, so his total gain is $424,000, so his investment has more than quadrupled!

Who won?

VIII-  What are some rookie mistakes of first-time house buyers?

  • Rushing to accept any financing offer because of the excitement to own your first house: Not good. Get various and competitive financing offer from different institutions and negotiate to get the lowest possible interest rate.
  • Don’t just focus on the aesthetic part of the house; Most first houses are never your dream house:  Focus on features that will make the house  easily and quickly sellable (Number of rooms, size of rooms, garage, easy to maintain, location, etc..).
  • Don’t buy an above average size and price house for your first house, go to the lower end and get a size that is proportional to your family size.
  • Using a family or friend for a realtor: Don’t do it. This is your first most important investment and don’t mix it with feelings and emotions.
  • Location, location, location: Buy where you can easily access public transit so you don’t have to spend all your savings on driving to work. In the same token, buying closer to public transit will help you get renters easily if you have empty rooms available.
  • Inspection, inspection, inspection: Get the best home inspector available. Some of them are really bad. Look for home inspectors reviews before hiring them. If the home inspection misses important defective stuffs like dry rot on the siding, you will end up spending thousands of dollars to fix them.

IX- What’s a realistic down payment percentage for a first-time home buyer?

Djamgatech: Build the skills that’ll drive your career into six figures: Get Djamgatech.

  • As a buyer, if you have  enough money for a 20% down payment and closing costs and has something left over for cash reserves, 20% is fine. But if you carry any consumer debt with rates higher than that of a mortgage, it is far better to pay those more expensive items off with available cash than to put it into a home down payment.
  • When you get a conventional mortgage with a down payment of less than 20 percent, you have to get private mortgage insurance, or PMI. The monthly cost of PMI varies, depending on your credit score, the size of the down payment and the loan amount. 

X- Resources & Definitions:

1- Quora

2- CRA

3- What is RRSP: An RRSP is a retirement savings plan that you establish, that we register, and to which you or your spouse or common-law partner contribute. Deductible RRSP contributions can be used to reduce your tax. Any income you earn in the RRSP is usually exempt from tax as long as the funds remain in the plan; you generally have to pay tax when you receive payments from the plan. (Applies to USCanadaonly)

4- What is TFSA: The Tax-Free Savings Account (TFSA) program began in 2009. It is a way for individuals who are 18 and older and who have a valid social insurance number to set money aside tax-free throughout their lifetime. Contributions to a TFSA are not deductible for income tax purposes. Any amount contributed as well as any income earned in the account (for example, investment income and capital gains) is generally tax-free, even when it is withdrawn.  Administrative or other fees in relation to TFSA and any interest or money borrowed to contribute to a TFSA are not deductible. (Applies to Canada only)

5- What is RESP: A registered education savings plan (RESP) is a contract between an individual (the subscriber) and a person or organization (the promoter). Under the contract, the subscriber names one or more beneficiaries (the future student(s)) and agrees to make contributions for them, and the promoter agrees to pay educational assistance payments (EAPs) to the beneficiaries. (Applies to Canada only)

There are two different types of RESP available: family plans and specified plans.

6- What is Roth IRA? A Roth IRA is an IRA that, except as explained below, is subject to the rules that apply to a traditional IRA. (Applies to USA only)

  • You cannot deduct contributions to a Roth IRA.
  • If you satisfy the requirements, qualified distributions are tax-free.
  • You can make contributions to your Roth IRA after you reach age 70 ½.
  • You can leave amounts in your Roth IRA as long as you live.
  • The account or annuity must be designated as a Roth IRA when it is set up.

The same combined contribution limit applies to all of your Roth and traditional IRAs. 

A traditional IRA is a way to save for retirement that gives you tax advantages (USA)

  • Contributions you make to a traditional IRA may be fully or partially deductible, depending on your circumstances, and
     
  • Generally, amounts in your traditional IRA (including earnings and gains) are not taxed until distributed.
Ace the Microsoft Azure Fundamentals AZ-900 Certification Exam: Pass the Azure Fundamentals Exam with Ease

7- 401K: A 401(k) is a feature of a qualified profit-sharing plan that allows employees to contribute a portion of their wages to individual accounts.

  • Elective salary deferrals are excluded from the employee’s taxable income (except for designated Roth deferrals).
  • Employers can contribute to employees’ accounts.
  • Distributions, including earnings, are includible in taxable income at retirement (except for qualified distributions of designated Roth accounts).

Free and Effective Internet Marketing in USA and Canada: Top 10 Tips to Sell Online at No Cost

Free and Effective Internet Marketing - Online Advertising

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

Free and Effective Internet Marketing in USA and Canada: Top 10 Tips to Sell Online at No Cost

Free and Effective online marketing with instagram
Free and Effective Internet Marketing or Online Advertising in USA and Canada

Online advertising is the process of promoting a business or brand and its products or services over the internet using tools that help drive traffic, leads, and sales. Internet Marketing, also called online marketing or Internet advertising or web advertising, is a form of marketing and advertising which uses the Internet to deliver promotional marketing messages to consumers.

Online Advertising is also known as Digital Marketing, Web Marketing, Social Media Marketing, Digital Advertising, etc…

What is the secret for Free and Effective Internet Marketing or Online Advertising in USA and Canada?

What and when to sell free of charge on kijiji in Canada and Craigslist in USA?

Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet)  Business Plan (AMERICAS) with  the following codes:  C37HCAQRVR7JTFK Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)

Active Anti-Aging Eye Gel, Reduces Dark Circles, Puffy Eyes, Crow's Feet and Fine Lines & Wrinkles, Packed with Hyaluronic Acid & Age Defying Botanicals

What and when to sell free of charge on Facebook Marketplace in USA and Canada?

What and when to sell free of charge instagram, reddit, Linkedin, WhatsApp?

How to sell new or used items online fast and at no cost?


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Bard, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

The cost of Internet Marketing can be overwhelming for every day people who want to sell new or used items, but there are ways to do it at no cost and be effective.

There are various platforms and tools available for Free and effective  Internet Marketing, but those platforms evolve and some fall behind as technology and users evolve. 

The prerequisite for an efficient internet marketing campaign is the quality of the ad. No Tools or website will help you sell if your ad doesn’t have the following basic qualities:

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

  • Clear Pictures or Videos of your products 
  • Clear and concise title
  • Clear and short description
  • Cost
  • Location
  • Category
  • Hashtags
  • Honesty 

Once those prerequisites are satisfied, you need to know your target users and the best tools to use and I will help with some pointers in this blog.

The efficiency of your internet marketing also depends on the products or services you are selling.

Below are the tools and websites to use for an efficient  internet marketing  free of charge:

  1. Utilize social media platforms: Create a presence on popular social media platforms like Facebook, Instagram, and Twitter. These platforms are free to use and can be leveraged to reach a large audience.

  2. Use influencer marketing: Partner with influencers in your niche to promote your products. Influencers have a large following and can help you reach a wider audience.

  3. Optimize your website for SEO: Optimize your website for search engines to increase visibility and drive traffic to your site.

  4. Create valuable content: Create valuable content such as blog posts, videos, and infographics to attract and engage potential customers.

  5. Use email marketing: Collect email addresses from your website visitors and use them to send promotional emails.

  6. Leverage customer reviews: Encourage your customers to leave reviews on your website and social media platforms, which can help attract new customers.

  7. Utilize Google My Business: Create a listing on Google My Business to increase your visibility in local search results.

  8. Participate in online communities: Participate in online communities related to your niche to establish yourself as an expert and attract potential customers.

  9. Utilize affiliate marketing: Partner with other businesses to promote your products and earn commissions for any sales made through your affiliate link.

  10. Utilize free online marketplaces: Sell your products on online marketplaces such as Amazon, Etsy, or Ebay without any listing fees.

It’s important to note that the effectiveness of each tip will vary based on the specific business and the product/service being sold. However, with a solid strategy and a bit of hard work, these tips can help you increase your online sales without incurring any significant cost.

I- Facebook Marketplace

In October 2016, Facebook announced a new Marketplace, citing the growth of organized “buy and sell” Facebook Groups, and gave the new version a higher prominence in the main Facebook app, taking the navigation position previously held by Facebook Messenger

Facebook and Google ad platforms use machine learning and artificial intelligence to find people more prone to making the advertiser’s desired action. To achieve this, they analyze the user’s information, like their interests, demographics, and other aspects to learn and detect the best audience for their brand.

Facebook Market place is your best best to sell the following products quickly and at no advertising cost:

  • Household items
  • Garage sale
  • Art and crafts
  • Electronics and Computers
  • Furniture
  • Kids and baby toys
  • Clothing
  • Accommodation (Room, house rental)
  • Auto parts
  • Sport Equipment

To be efficient, you must join the local facebook groups for your neighbourhood. Post your items to Facebook marketplace and share it to groups in your neighbourhood. Don’t share your ads to vague groups or city wide groups unless it is a very rare and unique item. If you share it to city wide groups, you will waste a lot of time talking to interested users who will not show up because of the distance: So it is very important to stick to groups in your neighbourhood only.

Facebook has superior technology and artificial intelligence to show your ads to targeted users who need your products and you only create your ad once and you can post, repost, share and re-share the same ad to various target groups very easily.

Djamgatech: Build the skills that’ll drive your career into six figures: Get Djamgatech.

Free and Effective Facebook Marketplace Ad
Free and Effective Facebook Marketplace Ad

II- Kijiji in Canada and Craigslist in USA

Kijiji and Craigslist used to be the best place to sell anything in USA and Canada, but they have been overtaken by facebook superior technology and artificial intelligence. Kijiji gives priority to paid ads and your ad can fall far below in a few minutes after posting it. 

When i post the same ad on facebook marketplace and kijiji at the same time, I receive better response on facebook for a ration of 10 to 1. 

Kijiji and Craigslist remain the best place for the following buy and sell products and services type of ads:

  • Cars, Autos Sales
  • local contractors (Carpenters, Basement developers, Plumbers, Electricians, etc..)
  • local non corporate Jobs and Services
  • Local Trades jobs and services
Free and Effective Contractor Ad on kijiji or craigslist
Free and Effective Contractor Ad on kijiji or craigslist

III- WhatsApp Groups

WhatsApp groups are very efficient and will soon become the best place to buy and  sell ads  and share info for free. If you are not part of a whatsApp group, i strongly suggest you join one that is closer to you and your interests. The best thing about WhatsApp group is trust. Members are usually friends or family who have met each other at least once.

WhatsApp group users share interest and people who join WhatsApp group are really motivated about the group, otherwise they will remove themselves to avoid annoying notifications on their phones.

When you are part of a whatsApp group, you always read the message posted on the group, because it pops up on your phone directly like a text message.

If you are part of a large WhatsApp group, post your items for sell there if the groups allows it and you will likely gets serious inquiries immediately. It is very important to avoid spamming. Check with the group admin privately if it is ok to post a sale ad.

What to post on WhatsApp groups?

  1. Local jobs and services
  2. Announcement
  3. Events
  4. Charity post
  5. Offering your service
Free and Efficient  Buy and sell Ad on WhatsApp Groups
Free and Efficient Buy and sell Ad on WhatsApp Groups
Ace the Microsoft Azure Fundamentals AZ-900 Certification Exam: Pass the Azure Fundamentals Exam with Ease

IV- Hashtags

hashtag is a type of metadata tag used on social networks such as Twitter and other microblogging services, allowing users to apply dynamicuser-generated tagging which makes it possible for others to easily find messages with a specific theme or content. 

Whatever you are posting online, use hashtags (Example: #HairExtension) to be found for free. Even if you don’t have a lot of followers and friends, you can post your items of your twitter, linkedin, facebook, instagram feed  and use hashtag to be found by thousands of people.

V- Instagram

Instagram (also known as IG or Insta) is a photo and video-sharing social networking service owned by Facebook, Inc.

Instagram is very powerful for the following visual products and services:

  • Beauty (Hair Salon, Nail Salon, etc..)
  • Clothing, fashion
  • Shoes
  • Aesthetician
  • Food, Restaurants
  • Fitness
Free and Effective Sell Ad on Instagram - Extensionista Hair Salon
Free and Effective Sell Ad on Instagram – Extensionista Hair Salon

VI- Facebook Pages

Efficient to promote local events with RSVP options.

Free and Efficient Internet Marketing with Facebook Page
Free and Efficient Internet Marketing with Facebook Page

VII- Reddit

Reddit is an American social news aggregation, web content rating, and discussion website. Registered members submit content to the site such as links, text posts, and images, which are then voted up or down by other members. Posts are organized by subject into user-created boards called “subreddits”, which cover a variety of topics including news, science, movies, video games, music, books, fitness, food, and image-sharing.

If you are developing a product (web app, tool, prototype, etc,) and want to have a feel for how it will be received, you can post it on Reddit as long as you are not spamming.

Reddit users are very clever and harsh and will bash whatever you post in most cases, but you can use the negative feedbacks to improve your product and make it better.

Free and Effective Internet Marketing or Online Advertising in USA and Canada - reddit
Free and Effective Internet Marketing or Online Advertising in USA and Canada

What to post or promote on Reddit?

  1. Web App
  2. Prototype of a product or service asking for feedback
  3. Link to blogs

VIII- LinkedIn

If you are looking for candidates for a job in the corporate world, if you are looking for a job in the corporate world, linkedin is your best bet if you add proper hashtags on your posts.

Linkedin is mainly used for professional networking, including employers posting jobs and job seekers posting their CVs.

Free and Effective Internet Marketing - Linkedin
Free and Effective Internet Marketing – Linkedin

IX- Twitter

According to wikipedia, Twitter  is a microblogging and social networking service on which users post and interact with messages known as “tweets”. Tweets were originally restricted to 140 characters, but on November 7, 2017, this limit was doubled to 280 for all languages except Chinese, Japanese, and Korean. Registered users can post, like, and retweet tweets, but unregistered users can only read them. Users access Twitter through its website interface, through Short Message Service (SMS) or its mobile-device application software (“app”). 

You can post ads on twitter when you want to use a large audience. Even if you don’t have a large follower base, a proper hashtag of your tweets can help your post been re-tweeted and re-shared to a large audience. Efficient ads on twitter must send users to a website for actions. 

What to sell on twitter for free ?

  • Promote a web site or blog
  • Promote an event
  • Promote a product or service from a website to a large audience
Free and Effective Internet Marketing on Twitter
Free and Effective Internet Marketing on Twitter

 

X- Google My Business

Google My Business is an Internet-based service for business owners and operated by Google. The network launched in June 2014 as a way of giving business owners more control of what shows in the search results when someone searches a given business name. Google allows business owners to verify their own business data via creating a new profile or claiming an existing auto-generated profile. The Google My Business listing appears in the Google Maps section of Google as well as the “Local Pack” for qualifying search queries.

Google My Business is Free and any small business should have it. Google has full control of the digital search market and having an account with Google My Business will give your company a boost for people looking for your products and services in your area.

Free and Effective Online Marketing with Google My Business
Free and Effective Online Marketing with Google My Business

Any small business or company with a specific location or address should have a Google My Business account to stay relevant and be found and no cost by consumers.

Google My Business allows business owners to supply information that can show up in a Google search, such as open hours, address, phone number, and photos.

Google My Business allows businesses to create a website at no cost.

Google My Business allow customers to review businesses and business owners can respond to reviews. 

Google My Business allows business owners to post updates about announcements or sales.  Business owners are able to upload pictures and videos to a company’s Google My Business page.

Posts from Google My Business show up in Google search results.

XI- Ressources:

  1. What are the best Internet Marketing Techniques
  2. Online Advertising
  3. Digital Marketing and AI

AWS Certification Preparation: AWS Ec2 Facts, Faqs and Summaries, Top 10 Questions and Answers Dump

AWS Ec2 Facts and Summaries

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

AWS Certification Preparation: AWS Ec2 Facts, Faqs and Summaries, Top 10 Questions and Answers Dump

AWS Ec2 Facts and summaries, AWS Ec2 Top 10 Questions and Answers Dump

Definition 1: Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers.

Definition 2: Amazon Elastic Compute Cloud (EC2) forms a central part of Amazon.com’s cloud-computing platform, Amazon Web Services (AWS), by allowing users to rent virtual computers on which to run their own computer applications.




AWS Ec2 Facts and summaries

  1. Can users SSH to EC2 instances using their AWS user name and password?
    No. User security credentials created with IAM are not supported for direct authentication to customer EC2 instances. Managing EC2 SSH credentials is the customer’s responsibility within the EC2 console.
  2. Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable compute capacity in the cloud. It is designed to make web-scale computing easier for developers.

  3. What is the difference between using the local instance store and Amazon Elastic Block Store (Amazon EBS) for the root device?
    When you launch your Amazon EC2 instances you have the ability to store your root device data on Amazon EBS or the local instance store. By using Amazon EBS, data on the root device will persist independently from the lifetime of the instance. This enables you to stop and restart the instance at a subsequent time, which is similar to shutting down your laptop and restarting it when you need it again.
    Alternatively, the local instance store only persists during the life of the instance. This is an inexpensive way to launch instances where data is not stored to the root device. For example, some customers use this option to run large web sites where each instance is a clone to handle web traffic.

  4. How many instances can I run in Amazon EC2?
    You are limited to running up to a total of 20 On-Demand instances across the instance family, purchasing 20 Reserved Instances, and requesting Spot Instances per your dynamic Spot limit per region.

  5. How quickly can I scale my capacity both up and down?
    Amazon EC2 provides a truly elastic computing environment. Amazon EC2 enables you to increase or decrease capacity within minutes, not hours or days. You can commission one, hundreds or even thousands of server instances simultaneously. When you need more instances, you simply call RunInstances, and Amazon EC2 will typically set up your new instances in a matter of minutes. Of course, because this is all controlled with web service APIs, your application can automatically scale itself up and down depending on its needs.
  6. When dealing with session state in EC2-based applications using Elastic load balancers which option is generally thought of as the best practice for managing user sessions?
    Having the ELB distribute traffic to all EC2 instances and then having the instance check a caching solution like ElastiCache running Redis or Memcached for session information
  7. What is one key difference between an Amazon EBS-backed and an instance-store backed instance?
    Amazon EBS-backed instances can be stopped and restarted without losing data
  8. How is the AWS Ec2 service different than a plain hosting service?
    Traditional hosting services generally provide a pre-configured resource for a fixed amount of time and at a predetermined cost. Amazon EC2 differs fundamentally in the flexibility, control and significant cost savings it offers developers, allowing them to treat Amazon EC2 as their own personal data center with the benefit of Amazon.com’s robust infrastructure.
    When computing requirements unexpectedly change (up or down), Amazon EC2 can instantly respond, meaning that developers have the ability to control how many resources are in use at any given point in time. In contrast, traditional hosting services generally provide a fixed number of resources for a fixed amount of time, meaning that users have a limited ability to easily respond when their usage is rapidly changing, unpredictable, or is known to experience large peaks at various intervals.
    Secondly, many hosting services don’t provide full control over the compute resources being provided. Using Amazon EC2, developers can choose not only to initiate or shut down instances at any time, they can completely customize the configuration of their instances to suit their needs – and change it at any time. Most hosting services cater more towards groups of users with similar system requirements, and so offer limited ability to change these.
    Finally, with Amazon EC2 developers enjoy the benefit of paying only for their actual resource consumption – and at very low rates. Most hosting services require users to pay a fixed, up-front fee irrespective of their actual computing power used, and so users risk overbuying resources to compensate for the inability to quickly scale up resources within a short time frame.

  9. What load balancing options does the Elastic Load Balancing service offer?
    Elastic Load Balancing offers two types of load balancers that both feature high availability, automatic scaling, and robust security. These include the Classic Load Balancer that routes traffic based on either application or network level information, and the Application Load Balancer that routes traffic based on advanced application level information that includes the content of the request.

  10. When should I use the Classic Load Balancer and when should I use the Application Load Balancer?
    The Classic Load Balancer is ideal for simple load balancing of traffic across multiple EC2 instances, while the Application Load Balancer is ideal for applications needing advanced routing capabilities, microservices, and container-based architectures. Please visit Elastic Load Balancing for more information.

  11. Can I get a history of all EC2 API calls made on my account for security analysis and operational troubleshooting purposes?
    Yes. To receive a history of all EC2 API calls (including VPC and EBS) made on your account, you simply turn on CloudTrail in the AWS Management Console. For more information, visit the CloudTrail home page.

  12. How to get information about Ec2 instance type?
    AWS EC2 Instance info
  13. Can I access the metrics data for a terminated Amazon EC2 instance or a deleted Elastic Load Balancer?
    Yes. Amazon CloudWatch stores metrics for terminated Amazon EC2 instances or deleted Elastic Load Balancers for 2 weeks.

Top
Reference: AWS Ec2 Faqs




Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet)  Business Plan (AMERICAS) with  the following codes:  C37HCAQRVR7JTFK Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)

Active Anti-Aging Eye Gel, Reduces Dark Circles, Puffy Eyes, Crow's Feet and Fine Lines & Wrinkles, Packed with Hyaluronic Acid & Age Defying Botanicals

AWS Ec2 Top 10 Questions and Answers Dump

Q0:
When dealing with session state in EC2-based applications using Elastic load balancers which option is generally thought of as the best practice for managing user sessions?

  • A. Having the ELB distribute traffic to all EC2 instances and then having the instance check a caching solution like ElastiCache running Redis or Memcached for session information
  • B. Permanently assigning users to specific instances and always routing their traffic to those instances
  • C. Using Application-generated cookies to tie a user session to a particular instance for the cookie duration
  • D. Using Elastic Load Balancer generated cookies to tie a user session to a particular instance


A.
Amazon ElastiCache for Memcached is a Memcached-compatible in-memory key-value store service that can be used as a cache or a data store. It delivers the performance, ease-of-use, and simplicity of Memcached. ElastiCache for Memcached is fully managed, scalable, and secure – making it an ideal candidate for use cases where frequently accessed data must be in-memory. It is a popular choice for use cases such as Web, Mobile Apps, Gaming, Ad-Tech, and E-Commerce.

Reference: Memcached


Top

Q2: You are attempting to SSH into an EC2 instance that is located in a public subnet. However, you are currently receiving a timeout error trying to connect. What could be a possible cause of this connection issue?

  • A. The security group associated with the EC2 instance has an inbound rule that allows SSH traffic, but does not have an outbound rule that allows SSH traffic.
  • B. The security group associated with the EC2 instance has an inbound rule that allows SSH traffic AND has an outbound rule that explicitly denies SSH traffic.
  • C. The security group associated with the EC2 instance has an inbound rule that allows SSH traffic AND the associated NACL has both an inbound and outbound rule that allows SSH traffic.
  • D. The security group associated with the EC2 instance does not have an inbound rule that allows SSH traffic AND the associated NACL does not have an outbound rule that allows SSH traffic.


D. Security groups are stateful, so you do NOT have to have an explicit outbound rule for return requests. However, NACLs are stateless so you MUST have an explicit outbound rule configured for return request.


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Bard, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

Reference: Comparison of Security Groups and Network ACLs

AWS Security Groups and NACL


Top

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

Q3: Which API call would best be used to describe an Amazon Machine Image?

  • A. ami-describe-image
  • B. ami-describe-images
  • C. DescribeImage
  • D. DescribeImages

Top

Q4: What is one key difference between an Amazon EBS-backed and an instance-store backed instance?

  • A. Autoscaling requires using Amazon EBS-backed instances
  • B. Virtual Private Cloud requires EBS backed instances
  • C. Amazon EBS-backed instances can be stopped and restarted without losing data
  • D. Instance-store backed instances can be stopped and restarted without losing data


C. Instance-store backed images use “ephemeral” storage (temporary). The storage is only available during the life of an instance. Rebooting an instance will allow ephemeral data stay persistent. However, stopping and starting an instance will remove all ephemeral storage.

Reference: What is the difference between EBS and Instance Store?

Top

Q15: After having created a new Linux instance on Amazon EC2, and downloaded the .pem file (called Toto.pem) you try and SSH into your IP address (54.1.132.33) using the following command.
ssh -i my_key.pem ec2-user@52.2.222.22
However you receive the following error.
@@@@@@@@ WARNING: UNPROTECTED PRIVATE KEY FILE! @ @@@@@@@@@@@@@@@@@@@
What is the most probable reason for this and how can you fix it?

  • A. You do not have root access on your terminal and need to use the sudo option for this to work.
  • B. You do not have enough permissions to perform the operation.
  • C. Your key file is encrypted. You need to use the -u option for unencrypted not the -i option.
  • D. Your key file must not be publicly viewable for SSH to work. You need to modify your .pem file to limit permissions.


D. You need to run something like: chmod 400 my_key.pem

Reference:

Top

Q5: You have an EBS root device on /dev/sda1 on one of your EC2 instances. You are having trouble with this particular instance and you need to either Stop/Start, Reboot or Terminate the instance but you do NOT want to lose any data that you have stored on /dev/sda1. However, you are unsure if changing the instance state in any of the aforementioned ways will cause you to lose data stored on the EBS volume. Which of the below statements best describes the effect each change of instance state would have on the data you have stored on /dev/sda1?

  • A. Whether you stop/start, reboot or terminate the instance it does not matter because data on an EBS volume is not ephemeral and the data will not be lost regardless of what method is used.
  • B. If you stop/start the instance the data will not be lost. However if you either terminate or reboot the instance the data will be lost.
  • C. Whether you stop/start, reboot or terminate the instance it does not matter because data on an EBS volume is ephemeral and it will be lost no matter what method is used.
  • D. The data will be lost if you terminate the instance, however the data will remain on /dev/sda1 if you reboot or stop/start the instance because data on an EBS volume is not ephemeral.


D. The question states that an EBS-backed root device is mounted at /dev/sda1, and EBS volumes maintain information regardless of the instance state. If it was instance store, this would be a different answer.

Djamgatech: Build the skills that’ll drive your career into six figures: Get Djamgatech.

Reference: AWS Root Device Storage

Top

Q6: EC2 instances are launched from Amazon Machine Images (AMIs). A given public AMI:

  • A. Can only be used to launch EC2 instances in the same AWS availability zone as the AMI is stored
  • B. Can only be used to launch EC2 instances in the same country as the AMI is stored
  • C. Can only be used to launch EC2 instances in the same AWS region as the AMI is stored
  • D. Can be used to launch EC2 instances in any AWS region


C. AMIs are only available in the region they are created. Even in the case of the AWS-provided AMIs, AWS has actually copied the AMIs for you to different regions. You cannot access an AMI from one region in another region. However, you can copy an AMI from one region to another

Reference: https://aws.amazon.com/amazon-linux-ami/

Top

Q7: Which of the following statements is true about the Elastic File System (EFS)?

  • A. EFS can scale out to meet capacity requirements and scale back down when no longer needed
  • B. EFS can be used by multiple EC2 instances simultaneously
  • C. EFS cannot be used by an instance using EBS
  • D. EFS can be configured on an instance before launch just like an IAM role or EBS volumes


A. and B.

Reference: https://aws.amazon.com/efs/

Top

Q8: You are in charge of deploying an application that will be hosted on an EC2 Instance and sit behind an Elastic Load balancer. You have been requested to monitor the incoming connections to the Elastic Load Balancer. Which of the below options can suffice this requirement?

  • A. Use AWS CloudTrail with your load balancer
  • B. Enable access logs on the load balancer
  • C. Use a CloudWatch Logs Agent
  • D. Create a custom metric CloudWatch lter on your load balancer


Answer – B
Elastic Load Balancing provides access logs that capture detailed information about requests sent to your load balancer. Each log contains information such as the time the request was received, the client’s IP address, latencies, request paths, and server responses. You can use these access logs to analyze traffic patterns and troubleshoot issues.
Reference: Access Logs for Your Application Load Balancer

Top

Q9: When deploying application code to EC2, the AppSpec file can be written in which language?

  • A. JSON
  • B. JSON or YAML
  • C. XML
  • D. YAML

Top

Q9:

  • A.
  • B.
  • C.
  • D.

Reference:


Top

Q10:

  • A.
  • B.
  • C.
  • D.

Reference:


Top




Other AWS Facts and Summaries and Questions/Answers Dump

AWS Certification Preparation: AWS IAM Facts, Faqs, Summaries and Top 10 Questions and Answers Dump

AWS IAM Facts and Summaries and Questions Answers

AI Dashboard is available on the Web, Apple, Google, and Microsoft, PRO version

AWS Certification Preparation: AWS IAM Facts, Faqs, Summaries and Top 10 Questions and Answers Dump

AWS IAM Facts and summaries, AWS IAM Top 10 Questions and Answers Dump

Definition 1:

IAM is a framework of policies and technologies for ensuring that the proper people in an enterprise have the appropriate access to technology resources. IdM systems fall under the overarching umbrella of IT security and Data Management .

Definition 2:
AWS Identity and Access Management (IAM) is a web service that helps you securely control access to AWS resources. You use IAM to control who is authenticated (signed in) and authorized (has permissions) to use resources.

Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6
Get 20% off Google Workspace (Google Meet)  Business Plan (AMERICAS) with  the following codes:  C37HCAQRVR7JTFK Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE (Email us for more codes)

Active Anti-Aging Eye Gel, Reduces Dark Circles, Puffy Eyes, Crow's Feet and Fine Lines & Wrinkles, Packed with Hyaluronic Acid & Age Defying Botanicals

AWS IAM Facts and summaries

AWS IAM Facts and summa
AWS IAM

AWS IAM best pratices
AWS IAM best practices


AI Unraveled: Demystifying Frequently Asked Questions on Artificial Intelligence (OpenAI, ChatGPT, Google Bard, Generative AI, Discriminative AI, xAI, LLMs, GPUs, Machine Learning, NLP, Promp Engineering)

AWS IAM Authentication examples
AWS IAM Authentication examples

IAM Authentication Explained
IAM Authentication Explained

IAM Authentication explained graphically
IAM Authentication explained graphically

If you are looking for an all-in-one solution to help you prepare for the AWS Cloud Practitioner Certification Exam, look no further than this AWS Cloud Practitioner CCP CLF-C02 book

    1. You can use AWS IAM to securely control individual and group access to your AWS resources. You can create and manage user identities (“IAM users”) and grant permissions for those IAM users to access your resources. You can also grant permissions for users outside of AWS ( federated users).
    2. How do users call AWS services?
      Users can make requests to AWS services using security credentials. Explicit permissions govern a user’s ability to call AWS services. By default, users have no ability to call service APIs on behalf of the account.
    3. What kinds of security credentials can IAM users have?
      IAM users can have any combination of credentials that AWS supports, such as an AWS access key, X.509 certificate, SSH key, password for web app logins, or an MFA device.
    4. What is the access level for newly created regular users in AWS?
      Default deny to all resources and actions
      By default, all new AWS users lack ANY access to AWS resources with a default deny. That default deny doesn’t prevent an explicit allow to grant them access. Keep in mind that EXPLICT denys override explicit allows.

    5. What is identity federation?
      AWS Identity and Access Management (IAM) supports identity federation for delegated access to the AWS Management Console or AWS APIs. With identity federation, external identities are granted secure access to resources in your AWS account without having to create IAM users. These external identities can come from your corporate identity provider (such as Microsoft Active Directory or from the AWS Directory Service) or from a web identity provider (such as Amazon Cognito, Login with Amazon, Facebook, Google, or any OpenID Connect-compatible provider).

    6. Does AWS IAM support SAML?
      Yes, AWS supports the Security Assertion Markup Language (SAML) 2.0.

    7. What SAML profiles does AWS support?
      The AWS single sign-on (SSO) endpoint supports the IdP-initiated HTTP-POST binding WebSSO SAML Profile. This enables a federated user to sign in to the AWS Management Console using a SAML assertion. A SAML assertion can also be used to request temporary security credentials using the AssumeRoleWithSAML API. For more information, see About SAML 2.0-Based Federation.
    8. Can a temporary security credential be revoked prior to its expiration?
      No. When requesting temporary credentials, we recommend the following:

      • When creating temporary security credentials, set the expiration to a value that is appropriate for your application.
      • Because root account permissions cannot be restricted, use an IAM user and not the root account for creating temporary security credentials. You can revoke permissions of the IAM user that issued the original call to request it. This action almost immediately revokes privileges for all temporary security credentials issued by that IAM user
    9. Can I reactivate or extend the expiration of temporary security credentials?
      No. It is a good practice to actively check the expiration and request a new temporary security credential before the old one expires. This rotation process is automatically managed for you when temporary security credentials are used in roles for EC2 instances.

    10. What does a policy look like?
      The following policy grants access to add, update, and delete objects from a specific folder, example_folder, in a specific bucket, example_bucket.
    11. What is the IAM policy simulator?
      The IAM policy simulator is a tool to help you understand, test, and validate the effects of your access control policies.
    12. What can the policy simulator be used for?
      You can use the policy simulator in several ways. You can test policy changes to ensure they have the desired effect before committing them to production. You can validate existing policies attached to users, groups, and roles to verify and troubleshoot permissions. You can also use the policy simulator to understand how IAM policies and resource-based policies work together to grant or deny access to AWS resources.
    13. Is there an authentication API to verify IAM user sign-ins?
      No. There is no programmatic way to verify user sign-ins.
    14. Can users SSH to EC2 instances using their AWS user name and password?
      No. User security credentials created with IAM are not supported for direct authentication to customer EC2 instances. Managing EC2 SSH credentials is the customer’s responsibility within the EC2 console.
    15. Are IAM actions logged for auditing purposes?
      Yes. You can log IAM actions, STS actions, and AWS Management Console sign-ins by activating AWS CloudTrail. To learn more about AWS logging, see AWS CloudTrail.
    16. What is AWS MFA?
      AWS multi-factor authentication (AWS MFA) provides an extra level of security that you can apply to your AWS environment. You can enable AWS MFA for your AWS account and for individual AWS Identity and Access Management (IAM) users you create under your account.

    17. What problems does IAM solve?
      IAM makes it easy to provide multiple users secure access to your AWS resources. IAM enables you to:
      Manage IAM users and their access: You can create users in AWS’s identity management system, assign users individual security credentials (such as access keys, passwords, multi-factor authentication devices), or request temporary security credentials to provide users access to AWS services and resources. You can specify permissions to control which operations a user can perform.
      Manage access for federated users: You can request security credentials with configurable expirations for users who you manage in your corporate directory, allowing you to provide your employees and applications secure access to resources in your AWS account without creating an IAM user account for them. You specify the permissions for these security credentials to control which operations a user can perform.
    18. What is an IAM role?
      An IAM role is an IAM entity that defines a set of permissions for making AWS service requests. IAM roles are not associated with a specific user or group. Instead, trusted entities assume roles, such as IAM users, applications, or AWS services such as EC2.
    19. What problems do IAM roles solve?
      IAM roles allow you to delegate access with defined permissions to trusted entities without having to share long-term access keys. You can use IAM roles to delegate access to IAM users managed within your account, to IAM users under a different AWS account, or to an AWS service such as EC2.

    Top
    Reference: AWS IAM Faqs

    AWS IAM Top 10 Questions and Answers Dump

    Q0: What are the main benefits of IAM groups? (Select two)

    • A. The ability to create custom permission policies.
    • B. Assigning IAM permission policies to more than one user at a time.
    • C. Easier user/policy management.
    • D. Allowing EC2 instances to gain access to S3.


    B. and C.

    An IAM group is a collection of IAM users. Groups let you specify permissions for multiple users, which can make it easier to manage the permissions for those users. For example, you could have a group called Admins and give that group the types of permissions that administrators typically need. Any user in that group automatically has the permissions that are assigned to the group. If a new user joins your organization and needs administrator privileges, you can assign the appropriate permissions by adding the user to that group. Similarly, if a person changes jobs in your organization, instead of editing that user’s permissions, you can remove him or her from the old groups and add him or her to the appropriate new groups.Reference: IAM Groups


    Top

    Q1: You would like to use STS to allow end users to authenticate from third-party providers such as Facebook, Google, and Amazon. What is this type of authentication called?

    • A. Web Identity Federation
    • B. Enterprise Identity Federation
    • C. Cross-Account Access
    • D. Commercial Federation


    A.
    AWS Identity and Access Management (IAM) supports identity federation for delegated access to the AWS Management Console or AWS APIs. With identity federation, external identities are granted secure access to resources in your AWS account without having to create IAM users. These external identities can come from your corporate identity provider (such as Microsoft Active Directory or from the AWS Directory Service) or from a web identity provider (such as Amazon Cognito, Login with Amazon, Facebook, Google, or any OpenID Connect-compatible provider).

    Reference:


    Top

    Q2:
    IAM Policies, at a minimum, contain what elements?

    • A. Id
    • B. Sid
    • C. Actions
    • D. Effects
    • E. Principals
    • F. Resources

    C. D. F.Reference: Policies and Permissions


    Top

    Q3: What are benefits of using AWS STS?

    • A. Grant access to AWS resources without having to create an IAM identity for them
    • B. Since credentials are temporary, you don’t have to rotate or revoke them
    • C. Temporary security credentials can be extended indefinitely
    • D. Temporary security credentials can be restricted to a specific region

    Top

    Q4: Your mobile application includes a photo-sharing service that is expecting tens of thousands of users at launch. You will leverage Amazon Simple Storage Service (S3) for storage of the user Images, and you must decide how to authenticate and authorize your users for access to these images. You also need to manage the storage of these images. Which two of the following approaches should you use? Choose two answers from the options below

    • A. Create an Amazon S3 bucket per user, and use your application to generate the S3 URL for the appropriate content.
    • B. Use AWS Identity and Access Management (IAM) user accounts as your application-level user database, and offload the burden of authentication from your application code.
    • C. Authenticate your users at the application level, and use AWS Security Token Service (STS)to grant token-based authorization to S3 objects.
    • D. Authenticate your users at the application level, and send an SMS token message to the user. Create an Amazon S3 bucket with the same name as the SMS message token, and move the user’s objects to that bucket.


    Answer- C
    The AWS Security Token Service (STS) is a web service that enables you to request temporary, limited-privilege credentials for AWS Identity and Access Management (IAM) users or for users that you authenticate (federated users). The token can then be used to grant access to the objects in S3.
    You can then provides access to the objects based on the key values generated via the user id.

    Reference: The AWS Security Token Service (STS)


    Top

    Q5: You’ve developed a Lambda function and are now in the process of debugging it. You add the necessary print statements in the code to assist in the debugging. You go to Cloudwatch logs , but you see no logs for the lambda function. Which of the following could be the underlying issue for this?

    • A. You’ve not enabled versioning for the Lambda function
    • B. The IAM Role assigned to the Lambda function does not have the necessary permission to create Logs
    • C. There is not enough memory assigned to the function
    • D. There is not enough time assigned to the function


    Answer: B
    “If your Lambda function code is executing, but you don’t see any log data being generated after several minutes, this could mean your execution role for the Lambda function did not grant permissions to write log data to CloudWatch Logs. For information about how to make sure that you have set up the execution role correctly to grant these permissions, see Manage Permissions: Using an IAM Role (Execution Role)”.

    Reference: Using Amazon CloudWatch

    Top

    Q6: Your application must write to an SQS queue. Your corporate security policies require that AWS credentials are always encrypted and are rotated at least once a week.
    How can you securely provide credentials that allow your application to write to the queue?

    • A. Have the application fetch an access key from an Amazon S3 bucket at run time.
    • B. Launch the application’s Amazon EC2 instance with an IAM role.
    • C. Encrypt an access key in the application source code.
    • D. Enroll the instance in an Active Directory domain and use AD authentication.

    Answer: B.
    IAM roles are based on temporary security tokens, so they are rotated automatically. Keys in the source code cannot be rotated (and are a very bad idea). It’s impossible to retrieve credentials from an S3 bucket if you don’t already have credentials for that bucket. Active Directory authorization will not grant access to AWS resources.
    Reference: AWS IAM FAQs

    Top

    Q65: A corporate web application is deployed within an Amazon VPC, and is connected to the corporate data center via IPSec VPN. The application must authenticate against the on-premise LDAP server. Once authenticated, logged-in users can only access an S3 keyspace specific to the user. Which of the solutions below meet these requirements? Choose two answers How would you authenticate to the application given these details? (Choose 2)

    • A. The application authenticates against LDAP, and retrieves the name of an IAM role associated with the user. The application then calls the IAM Security Token Service to assume that IAM Role. The application can use the temporary credentials to access the S3 keyspace.
    • B. Develop an identity broker which authenticates against LDAP, and then calls IAM Security Token Service to get IAM federated user credentials. The application calls the identity broker to get IAM federated user credentials with access to the appropriate S3 keyspace
    • C. Develop an identity broker which authenticates against IAM Security Token Service to assume an IAM Role to get temporary AWS security credentials. The application calls the identity broker to get AWS temporary security credentials with access to the app
    • D. The application authenticates against LDAP. The application then calls the IAM Security Service to login to IAM using the LDAP credentials. The application can use the IAM temporary credentials to access the appropriate S3 bucket.

    Answer: A. and B.
    The question clearly says “authenticate against LDAP”. Temporary credentials come from STS. Federated user credentials come from the identity broker.
    Reference: IAM faqs

    Top

    Q7:
    A corporate web application is deployed within an Amazon VPC, and is connected to the corporate data center via IPSec VPN. The application must authenticate against the on-premise LDAP server. Once authenticated, logged-in users can only access an S3 keyspace specific to the user. Which of the solutions below meet these requirements? Choose two answers
    How would you authenticate to the application given these details? (Choose 2)

    • A. The application authenticates against LDAP, and retrieves the name of an IAM role associated with the user. The application then calls the IAM Security Token Service to assume that IAM Role. The application can use the temporary credentials to access the S3 keyspace.
    • B. Develop an identity broker which authenticates against LDAP, and then calls IAM Security Token Service to get IAM federated user credentials. The application calls the identity broker to get IAM federated user credentials with access to the appropriate S3 keyspace
    • C. Develop an identity broker which authenticates against IAM Security Token Service to assume an IAM Role to get temporary AWS security credentials. The application calls the identity broker to get AWS temporary security credentials with access to the app
    • D. The application authenticates against LDAP. The application then calls the IAM Security Service to login to IAM using the LDAP credentials. The application can use the IAM temporary credentials to access the appropriate S3 bucket.

    Answer: A. and B.
    The question clearly says “authenticate against LDAP”. Temporary credentials come from STS. Federated user credentials come from the identity broker.
    Reference: AWA STS Faqs

    Top

    Q8:

    • A.
    • B.
    • C.
    • D.

    Reference:


    Top

    Q9:

    • A.
    • B.
    • C.
    • D.

    Reference:


    Top

    Q10:

    • A.
    • B.
    • C.
    • D.

    Reference:


    Top

    Other AWS Facts and Summaries and Questions/Answers Dump

Pass the 2023 AWS Cloud Practitioner CCP CLF-C02 Certification with flying colors Ace the 2023 AWS Solutions Architect Associate SAA-C03 Exam with Confidence Pass the 2023 AWS Certified Machine Learning Specialty MLS-C01 Exam with Flying Colors

List of Freely available programming books - What is the single most influential book every Programmers should read



#BlackOwned #BlackEntrepreneurs #BlackBuniness #AWSCertified #AWSCloudPractitioner #AWSCertification #AWSCLFC02 #CloudComputing #AWSStudyGuide #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AWSBasics #AWSCertified #AWSMachineLearning #AWSCertification #AWSSpecialty #MachineLearning #AWSStudyGuide #CloudComputing #DataScience #AWSCertified #AWSSolutionsArchitect #AWSArchitectAssociate #AWSCertification #AWSStudyGuide #CloudComputing #AWSArchitecture #AWSTraining #AWSCareer #AWSExamPrep #AWSCommunity #AWSEducation #AzureFundamentals #AZ900 #MicrosoftAzure #ITCertification #CertificationPrep #StudyMaterials #TechLearning #MicrosoftCertified #AzureCertification #TechBooks

Top 1000 Canada Quiz and trivia: CANADA CITIZENSHIP TEST- HISTORY - GEOGRAPHY - GOVERNMENT- CULTURE - PEOPLE - LANGUAGES - TRAVEL - WILDLIFE - HOCKEY - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
zCanadian Quiz and Trivia, Canadian History, Citizenship Test, Geography, Wildlife, Secenries, Banff, Tourism

Top 1000 Africa Quiz and trivia: HISTORY - GEOGRAPHY - WILDLIFE - CULTURE - PEOPLE - LANGUAGES - TRAVEL - TOURISM - SCENERIES - ARTS - DATA VISUALIZATION
Africa Quiz, Africa Trivia, Quiz, African History, Geography, Wildlife, Culture

Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada.
Exploring the Pros and Cons of Visiting All Provinces and Territories in Canada

Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA
Exploring the Advantages and Disadvantages of Visiting All 50 States in the USA


Health Health, a science-based community to discuss health news and the coronavirus (COVID-19) pandemic

Today I Learned (TIL) You learn something new every day; what did you learn today? Submit interesting and specific facts about something that you just found out here.

Reddit Science This community is a place to share and discuss new scientific research. Read about the latest advances in astronomy, biology, medicine, physics, social science, and more. Find and submit new publications and popular science coverage of current research.

Reddit Sports Sports News and Highlights from the NFL, NBA, NHL, MLB, MLS, and leagues around the world.

Turn your dream into reality with Google Workspace: It’s free for the first 14 days.
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes:
Get 20% off Google Google Workspace (Google Meet) Standard Plan with  the following codes: 96DRHDRA9J7GTN6 96DRHDRA9J7GTN6
63F733CLLY7R7MM
63F7D7CPD9XXUVT
63FLKQHWV3AEEE6
63JGLWWK36CP7WM
63KKR9EULQRR7VE
63KNY4N7VHCUA9R
63LDXXFYU6VXDG9
63MGNRCKXURAYWC
63NGNDVVXJP4N99
63P4G3ELRPADKQU
With Google Workspace, Get custom email @yourcompany, Work from anywhere; Easily scale up or down
Google gives you the tools you need to run your business like a pro. Set up custom email, share files securely online, video chat from any device, and more.
Google Workspace provides a platform, a common ground, for all our internal teams and operations to collaboratively support our primary business goal, which is to deliver quality information to our readers quickly.
Get 20% off Google Workspace (Google Meet) Business Plan (AMERICAS): M9HNXHX3WC9H7YE
C37HCAQRVR7JTFK
C3AE76E7WATCTL9
C3C3RGUF9VW6LXE
C3D9LD4L736CALC
C3EQXV674DQ6PXP
C3G9M3JEHXM3XC7
C3GGR3H4TRHUD7L
C3LVUVC3LHKUEQK
C3PVGM4CHHPMWLE
C3QHQ763LWGTW4C
Even if you’re small, you want people to see you as a professional business. If you’re still growing, you need the building blocks to get you where you want to be. I’ve learned so much about business through Google Workspace—I can’t imagine working without it.
(Email us for more codes)

error: Content is protected !!