About our blog:

At Lucian Systems we always like to stay up to date about the latest news in our industry.

That is why we show you the most recent blognews from Amazon, All Things Distributed, Cloud computing news and CloudTweaks.

Threat Hunting in the Public Cloud: A Practical Guide

Threat hunting is a proactive cybersecurity process where specialists, known as threat hunters, search through networks and datasets to identify threats that existing automated security solutions may have missed. It’s about thinking like the attacker, anticipating their moves and countering them before they can cause harm. Threat hunting is an essential tool in our cybersecurity […]

Generative AI that’s tailored for your business needs with watsonx.ai

According to a recent IBV study, 64% of surveyed CEOs face pressure to accelerate adoption of generative AI, and 60% lack a consistent, enterprise-wide method for implementing it. An AI and data platform, such as watsonx, can help empower businesses to leverage foundation models and accelerate the pace of generative AI adoption across their organization. […]

Amazon MSK Introduces Managed Data Delivery from Apache Kafka to Your Data Lake

I’m excited to announce today a new capability of Amazon Managed Streaming for Apache Kafka (Amazon MSK) that allows you to continuously load data from an Apache Kafka cluster to Amazon Simple Storage Service (Amazon S3). We use Amazon Kinesis Data Firehose—an extract, transform, and load (ETL) service—to read data from a Kafka topic, transform […]

Debunking observability myths – Part 6: Observability is about one part of your stack

In our blog series, we’ve debunked the following observability myths so far: Part 1: You can skip monitoring and rely solely on logs Part 2: Observability is built exclusively for SREs Part 3: Observability is only relevant and beneficial for large-scale systems or complex architectures Part 4: Observability is always expensive Part 5: You can create an observable […]

From Trust to Zero Trust: The Growing Trend Sweeping Enterprises Worldwide

The zero trust model is becoming more commonplace in security. It’s based on the realization that threats exist inside and outside of a network. Limiting those requires verifying a person’s permission to access something during every request they make. Zero Trust Computing is a security concept that operates on the premise “never trust, always verify.” […]

AWS Weekly Roundup: Amazon EC2 M2 Pro Mac, Amazon Coretto 21, Amazon CloudWatch Synthetics, and more (Sept. 25, 2023)

This week, I’m in Jakarta to support AWS User Group Indonesia and AWS Cloud Day Indonesia. Yesterday, I attended a community event – a collaboration between AWS User Group Indonesia and Hacktiv8 with “Innovating Yourself as Early-Stage Developers” as the main theme. We had a blast and I had a wonderful time connecting with speakers and […]

Unleashing the power of Presto: The Uber case study

The magic behind Uber’s data-driven success Uber, the ride-hailing giant, is a household name worldwide. We all recognize it as the platform that connects riders with drivers for hassle-free transportation. But what most people don’t realize is that behind the scenes, Uber is not just a transportation service; it’s a data and analytics powerhouse. Every […]

IBM TechXchange underscores the importance of AI skilling and partner innovation

Generative AI and large language models are poised to impact how we all access and use information. But as organizations race to adopt these new technologies for business, it requires a global ecosystem of partners with industry expertise to identify the right enterprise use-cases for AI and the technical skills to implement the technology. During […]

Cyber Threats of 2023 – Are You Prepared?

Cybersecurity is an ever-expanding discipline, where every move is crucial, and the risks are unparalleled. Businesses must adapt to evolving threats, and this article provides an in-depth look into the key areas of concern, offering strategic insights specifically for enterprises. As an industry analyst with firsthand insights from Blackberry’s reports, I’m pleased to present this article […]