Skip to main content

Cloud

Forex Diagrams And Stock Market Rising Lines With Numbers

Perficient Achieves AWS Glue Service Delivery Designation

Perficient has earned the AWS Glue Service Delivery Designation, demonstrating our deep technical expertise and proven success in delivering scalable, cost-effective, and high-performance data integration, data pipeline orchestration, and data catalog solutions. What is the AWS Service Delivery Program? The AWS Service Delivery Program is an AWS Specialization Program designed to validate AWS Partners with […]

data tables on computer

HCL Commerce Containers Explained

In this blog, we will explore the various Containers, their functionalities, and how they interact to create a seamless customer shopping experience. HCL Commerce Containers provide a modular and scalable approach to managing ecommerce applications. Benefits of HCL Commerce Containers Improved Performance: The system becomes faster and more responsive by caching frequent requests and optimizing […]

Lock@1x.jpg

Disabling Cookies in Sitecore SDKs

Intro đź“– In this post, we’ll take a look at a couple Sitecore SDKs commonly used to build XM Cloud head applications. Specifically, we’ll be looking at how to disable cookies used by these SDKs. This can be useful for data privacy and/or regulatory compliance reasons. These SDKs allow your application to integrate with other […]

Cyber security firewall interface protection concept HTTPS certificates. Businesswoman protecting herself from cyber attacks. Personal data security and banking. stock photo

Activate to SFTP from Salesforce Data Cloud

SFTP?  Isn’t that old? It is an oldie, but a goodie.  🙂 With Data Cloud we can send data to a lot of external data sources like Marketing Cloud Engagement or Amazon S3 through Activation Targets.   But there are times we are working with a destination system like Eloqua or Marketo that has solid support […]

Cloud Computing

Best Practices for IaC using AWS CloudFormation

In the ever-evolving landscape of cloud computing, Infrastructure as Code (IaC) has emerged as a cornerstone practice for managing and provisioning infrastructure. IaC enables developers to define infrastructure configurations using code, ensuring consistency, automation, and scalability. AWS CloudFormation, a key service in the AWS ecosystem, simplifies IaC by allowing users to easily model and set […]

Istock 1484825666

Boost Sitecore Performance with Vercel Fluid Compute

Are you using Vercel to supercharge your Sitecore experience? If so, you’re already benefiting from a powerful, globally optimized platform designed for modern web applications. But did you know you can take your performance even further? Vercel Fluid Compute is a game-changer, optimizing workloads for higher efficiency, lower costs, and enhanced scalability—perfect for high-performance Sitecore […]

Istock 1536191188

Automating Backup and Restore with AWS Backup Service using Python

Protecting data is vital for any organization, and AWS Backup Service offers a centralized, automated solution to back up your AWS resources. This blog will examine how to automate backup and restore operations using AWS Backup and Python, ensuring your data remains secure and recoverable. Why We use AWS Backup Service Manual backup processes can […]

Groovy Scripts To Automate Content Updates

Automate the Deployment of a Static Website to an S3 Bucket Using GitHub Actions

Automating deployments is crucial for efficiency and reliability in today’s fast-paced development environment. GitHub Actions provides a seamless way to implement CI/CD pipelines, allowing developers to automate the deployment of static websites without manual intervention. In this blog, we will explore how to deploy a static website to an AWS S3 bucket using GitHub Actions. […]

Cybersecurity Concept Laptop

RDS Migration: AWS-Managed to CMK Encryption

As part of security and compliance best practices, it is essential to enhance data protection by transitioning from AWS-managed encryption keys to Customer Managed Keys (CMK). Business Requirement During database migration or restoration, it is not possible to directly change encryption from AWS-managed keys to Customer-Managed Keys (CMK). During migration, the database snapshot must be […]

Cloud Computing Backup Cyber Security Fingerprint Identity Encryption Technology

From Cloud to Local: Effortlessly Import Azure SQL Databases

With most systems transitioning to cloud-based environments, databases are often hosted across various cloud platforms. However, during the development cycle, there are occasions when having access to a local database environment becomes crucial, particularly for analyzing and troubleshooting issues originating in the production environment. Sometimes, it is necessary to restore the production database to a […]

Coding See Through

Setting Up CloudFront Using Python

Python is an open-source programming language. We can use Python to build/enable AWS services such as Terraform or other IAC code. In this blog, we are going to discuss setting up the CloudFront service using Python. Why We Use Python As we know, Python is an imperative language. This means that you can write more […]

Istock 2163867912

Windows Password Recovery with AWS SSM

The Systems Manager (SSM) streamlines managing Windows instances in AWS. If you’ve ever forgotten the password for your Windows EC2 instance, SSM offers a secure and efficient way to reset it without additional tools or manual intervention. Objective & Business Requirement In a production environment, losing access to a Windows EC2 instance due to an […]

Load More