Modern best practice to connect Amazon EC2 instance via SSH without SSH key/password and with closed inbound 22 port. AWS Systems Manager Session Manager tutorial.

  • Step 1: Launch Amazon EC2 Instance
  • Step 2: Create AWS IAM Role
  • Step 3: Connect Amazon EC2 via SSH
  • Extra: Connect using SSH command and SSH key
  • Sources

Disclaimer: I do not represent my current/previous employers on my personal Medium blog.

Navigate to Amazon EC2 and start launching new instance…

The best tech trends in IT industry for 2020 year. What are they like? How to define and prove? Gartner, IDC, Google, Stack Overflow, Computer Economics…

  • Trend #1: AWS and Distributed Cloud
  • Trend #2: Artificial Intelligence and AI Security
  • Trend #3: Voice-Enabled Virtual Assistants and Multiexperience
  • About the author
  • Sources

Disclaimer: I do not represent my current/previous employers on my personal Medium blog.

Cloud Computing is the on-demand availability of computer system resources, especially data storage…

To export your data, sign in to mifit.huami.com/t/account_mifit or api-mifit.huami.com/t/account_mifit and select Export data.

That’s what I noticed in my Mi Fit Android app (ver. 4.0.7):

Profile -> Help -> How to exercise your right?

Can I export my personal data?

To export your data, sign in to mifit.huami.com/t/account_mifit and select “Export data”.

Note: I can strongly recommend navigate to your Mi Fit app and verify the link.

Navigate to mifit.huami.com/t/account_mifit and click Export data:

As successful Data Scientist, what can I do and what cannot to be GDPR compliant? Amazon Web Services (AWS) vs on-premise. De-identification vs Anonymization. Anonymization: removing, masking or suppression, generalization, k-anonymization, scrambling, blurring. Pseudonymization: tokenization, hashing, encryption, key deletion or crypto-shredding.

Navigate to Part 1

As successful Data Scientist, what can I do and what cannot to be GDPR compliant? Amazon Web Services (AWS) vs on-premise. De-identification vs Anonymization. Anonymization: removing, masking or suppression, generalization, k-anonymization, scrambling, blurring. Pseudonymization: tokenization, hashing, encryption, key deletion or crypto-shredding.

Ruslan Korniichuk

Python Developer and Artificial Intelligence Engineer

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store