As we delve into the realm where artificial intelligence intersects with the ever-evolving landscape of cloud computing, who better to guide our exploration than Drew Firment, the VP of Enterprise Strategies at Pluralsight. With a career steeped in pioneering cloud initiatives, Drew is at the forefront of ushering businesses into the digital future. Having honed […]
Category Archives: Blog
In November 2023, the California Privacy Protection Agency (CPPA) released a set of draft regulations on the use of artificial intelligence (AI) and automated decision-making technology (ADMT). The proposed rules are still in development, but organizations may want to pay close attention to their evolution. Because the state is home to many of the world’s […]
In the ever-evolving landscape of cloud infrastructure, creating a customizable and secure virtual private cloud (VPC) environment within a single region has become a necessity for many organizations. The VPC landing zone deployable architectures offers a solution to this need through a set of starting templates that can be quickly adapted to fit your specific […]
A Kubernetes Operator is a method of packaging, deploying, and managing a Kubernetes application. Conceptually, an Operator takes human operational knowledge and encodes it into software that is packaged with the application. This could include how to deploy a complex application, how to handle failing nodes or persistent storage, and how to upgrade an application […]
Foundational models (FMs) are trained on large volumes of data and use billions of parameters. However, in order to answer customers’ questions related to domain-specific private data, they need to reference an authoritative knowledge base outside of the model’s training data sources. This is commonly achieved using a technique known as Retrieval Augmented Generation (RAG). […]
In an insightful interview with CloudTweaks, Nicos Vekiarides, CEO and Co-founder of Attestiv, sheds light on the transformative impact of artificial intelligence (AI) and the escalating challenges posed by deepfake technology. With a background rich in enterprise technology and a keen expertise in digital security, Vekiarides is at the helm of Attestiv, a company that […]
Starting today, you can configure your DNS Firewall to automatically trust all domains in a resolution chain (such as aCNAME, DNAME, or Alias chain). Let’s walk through this in nontechnical terms for those unfamiliar with DNS. Why use DNS Firewall?DNS Firewall provides protection for outbound DNS requests from your private network in the cloud (Amazon […]
Unlocking the full potential of supply chain management has long been a goal for businesses that seek efficiency, resilience and sustainability. In the age of digital transformation, the integration of advanced technologies like generative artificial intelligence brings a new era of innovation and optimization. AI tools help users address queries and resolve alerts by using […]
In an interview with CloudTweaks, Frank Kim, a SANS Fellow and cloud security expert, discusses the critical aspects of safeguarding cloud environments. Frank emphasizes the adoption of zero-trust architectures as essential for protecting high-value data and preventing attackers from moving laterally within network systems. He explains the shared responsibility model, highlighting that cloud service providers […]
Ruby developers can now use AWS CodeArtifact to securely store and retrieve their gems. CodeArtifact integrates with standard developer tools like gem and bundler. Applications often use numerous packages to speed up development by providing reusable code for common tasks like network access, cryptography, or data manipulation. Developers also embed SDKs–such as the AWS SDKs–to […]