I am excited to announce that Amazon Elastic Compute Cloud (Amazon EC2) C7g instances powered by the latest AWS Graviton3 processors that have been available in preview since re:Invent last year are now available for all. Let’s decompose the name C7g: the “C” instance family is designed for compute-intensive workloads. This is the 7th generation […]
Category Archives: Blog
This post is part of our Week in Review series. Check back each week for a quick roundup of interesting news and announcements from AWS! This is the right place to quickly learn about recent AWS news from last week, in just about five minutes or less. This week, I have collected a couple of […]
If you are a long-time reader of this blog, you know that I categorize some posts as “chocolate and peanut butter” in homage to an ancient (1970 or so) series of TV commercials for Reese’s Peanut Butter Cups. Today, I am happy to bring you the latest such post, combining AWS Backup and Amazon FSx […]
Competing on product quality has never been more urgent as rising raw material and component costs continue to squeeze manufacturers’ margins. At the same time, unpredictable supply chains make it increasingly difficult to maintain consistent product quality and cost visibility. In the midst of these challenges, manufacturers are strengthening their evolving in-house and virtual workforces […]
This post is part of our Week in Review series. Check back each week for a quick roundup of interesting news and announcements from AWS! I had been on the road for the last five weeks and attended many of the AWS Summits in Europe. It was great to talk to so many of you […]
Multi-tenant clouds are becoming more popular than ever because they’re incredibly cost effective and easy to set up. If you’re considering switching your business over to a multi-tenant cloud platform, this article is for you. Cloud computing is revolutionizing the way businesses operate. The reason why cloud adoption is on the rise is because it […]
In computing, Trusted Platform Module (TPM) technology is designed to provide hardware-based, security-related functions. A TPM chip is a secure crypto-processor that is designed to carry out cryptographic operations. There are three key advantages of using TPM technology. First, you can generate, store, and control access to encryption keys outside of the operating system. Second, […]
When employees are working remotely, they need to be able to access company resources and applications just as if they were in the office. This means that remote authentication needs to be just as secure as if the employee was on-site. Here are 12 ways to ensure secure remote authentication for your employees. Use Multi-Factor […]
Data creation has risen dramatically in recent years and shows no signs of slowing. According to analyst firm IDC, widespread remote work led to a spike of new data in 2020. At its current rate, data creation will eventually outpace storage capacity, leaving today’s businesses oversaturated with data. This data growth highlights vital considerations around […]
This post is part of our Week in Review series. Check back each week for a quick roundup of interesting news and announcements from AWS! Another week starts, and here’s a collection of the most significant AWS news from the previous seven days. This week is also the one-year anniversary of CloudFront Functions. It’s exciting […]