Connecting Code to Capital: Understanding EPS

 In the IT sector, we often measure success through “per unit” metrics: requests per second, cost per gigabyte, or tickets per agent. In the world of public markets and executive leadership, the ultimate “per unit” metric is EPS, or Earnings Per Share.

For an IT professional aiming for a managerial role, EPS is the bridge between your technical efficiency and the company’s stock price. It is the single most watched number by investors and the Board of Directors because it reveals how much actual profit each share of the company is generating.


Understanding EPS

IaC – Infrastructure as Code

 

The Recipe for Modern IT

In the traditional world of IT, setting up a server was a craft.  A sysadmin would log in, click through menus, install packages, and tweak settings until everything worked.  I know, I did this job for much of my early career.  But much like a chef cooking a complex signature dish from memory, this manual approach has a fatal flaw: human variability.  If the chef forgets one pinch of salt or a single sprig of thyme, the dish changes.  In IT, we call this Configuration Drift.  Infrastructure as Code (IaC) solves this by turning that “memory” into a precise, digital recipe.  Instead of manually configuring hardware or virtual machines, you write machine-readable files that define exactly what your environment should look like.

Cloud Formation Example

 Imagine you’re a System Administrator tasked with setting up a new environment.  Traditionally, this involves a long checklist: log into the console, click through menus to create a VPC, spin up three VMs, configure storage, attach security groups, and set up a load balancer. If you need a second environment for testing, you have to do it all over again, and hope you didn't miss a single checkbox.  AWS Cloud Formation turns that manual checklist into a text file.


cloud-formation-example

This is amusing to me

 I have never seen anything even remotely close from the "other side".

Being able to program one's hate and disdain for things, instead of just ignoring, crossing the street, or moving on.  Amazing to me how many of these Libertarian/ GOP/ MAGA/ Republicans just can't wait to get into other people's business and tell them what's what.

BLOCKADE Ebook Scanner Setup Guide


Adding Identity to the Authorization Layer

 In the journey through information security, you will frequently encounter OAuth 2.0. While OAuth is excellent at authorization, it was never actually designed for authentication. To solve this, OIDC, or OpenID Connect, was created.  Think of it this way: OAuth 2.0 is the key to a hotel room, while OIDC is the ID card that proves you are the person who booked it.

oidc-openid-connect