Image for post
Image for post

TypeORM is an Object Relational Mapping technique which is used to connect object code to a relational database. Let’s see what is known as Object Relational Mapping(ORM).

Object Relational Mapping (ORM)


Image for post
Image for post

Face recognition has become a crucial requirement for developers when building a verification system, automate video editing, or for security applications in cases such as to identify people or objects in a series of video streams or images. As a solution machine learning models can be used but it is time consuming, expensive and needs advanced knowledge related to machine learning.

Amazon Rekognition is based on highly scalable, deep learning technology developed by Amazon’s computer vision scientists. Amazon Rekognition API can easily identify objects, text, people, scenes , activities and inappropriate content in a given context. …


Image for post
Image for post

Amazon Polly is one of the prominent features of AWS where it converts text into life-like speech. Currently, Polly supports a wide variety of languages including female and male voices. Polly can be integrated for applications such as newsreaders, games, eLearning platforms, accessibility applications for visually impaired people, etc. Some of the benefits can be listed as follows.

  • Natural sounding voices
  • Store and re-distribute speech
  • Real-time streaming
  • Customize and control speech output
  • Low cost

Amazon Polly components

  1. Input Text

The input text can be provided as a plain text or Speech Synthesis Markup Language (SSML) format. …


Image for post
Image for post

Static website hosting can be easily configured using Amazon S3, Amazon CloudFront and Amazon Route53. Here when a user requests the website it first directs to Route53 and then the request is passed to the CloudFront. Through CloudFront, only the request is redirected to the S3 endpoint. This is a secure method rather than giving direct public connection to the S3 bucket.


Image for post
Image for post

Identity and Access Management is a global service that enables secure access for AWS resources. Since this is a key service of AWS, they have provided a set of best practices to follow when using IAM. According to AWS documentation IAM best practices can be listed down as follows.

  1. Freeze your AWS Account root user access keys

It is recommended not to use the AWS account root user access key. The root account access key gives full access for all the services as well as the billing information and access cannot be limited too. …

Uthpala Pitawela

Software Engineer

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store