Category Archives: Blog

Future Unveiled: Q&A with Drew Firment on AI, Cloud, & Beyond

As we delve into the realm where artificial intelligence intersects with the ever-evolving landscape of cloud computing, who better to guide our exploration than Drew Firment, the VP of Enterprise Strategies at Pluralsight. With a career steeped in pioneering cloud initiatives, Drew is at the forefront of ushering businesses into the digital future. Having honed […]

What you need to know about the CCPA rules on AI and automated decision-making technology

In November 2023, the California Privacy Protection Agency (CPPA) released a set of draft regulations on the use of artificial intelligence (AI) and automated decision-making technology (ADMT).  The proposed rules are still in development, but organizations may want to pay close attention to their evolution. Because the state is home to many of the world’s […]

Deployable architecture on IBM Cloud: A look at the IaC aspects of VPC landing zone 

In the ever-evolving landscape of cloud infrastructure, creating a customizable and secure virtual private cloud (VPC) environment within a single region has become a necessity for many organizations. The VPC landing zone deployable architectures offers a solution to this need through a set of starting templates that can be quickly adapted to fit your specific […]

What Are Kubernetes Operators?

A Kubernetes Operator is a method of packaging, deploying, and managing a Kubernetes application. Conceptually, an Operator takes human operational knowledge and encodes it into software that is packaged with the application. This could include how to deploy a complex application, how to handle failing nodes or persistent storage, and how to upgrade an application […]

Build RAG applications with MongoDB Atlas, now available in Knowledge Bases for Amazon Bedrock

Foundational models (FMs) are trained on large volumes of data and use billions of parameters. However, in order to answer customers’ questions related to domain-specific private data, they need to reference an authoritative knowledge base outside of the model’s training data sources. This is commonly achieved using a technique known as Retrieval Augmented Generation (RAG). […]

AI, Deepfakes, and Digital Trust: A Conversation with Nicos Vekiarides

In an insightful interview with CloudTweaks, Nicos Vekiarides, CEO and Co-founder of Attestiv, sheds light on the transformative impact of artificial intelligence (AI) and the escalating challenges posed by deepfake technology. With a background rich in enterprise technology and a keen expertise in digital security, Vekiarides is at the helm of Attestiv, a company that […]

Stop the CNAME chain struggle: Simplified management with Route 53 Resolver DNS Firewall

Starting today, you can configure your DNS Firewall to automatically trust all domains in a resolution chain (such as aCNAME, DNAME, or Alias chain). Let’s walk through this in nontechnical terms for those unfamiliar with DNS. Why use DNS Firewall?DNS Firewall provides protection for outbound DNS requests from your private network in the cloud (Amazon […]

How generative AI will revolutionize supply chain 

Unlocking the full potential of supply chain management has long been a goal for businesses that seek efficiency, resilience and sustainability. In the age of digital transformation, the integration of advanced technologies like generative artificial intelligence brings a new era of innovation and optimization. AI tools help users address queries and resolve alerts by using […]

Frank Kim on Zero-Trust Architecture: Essential for Cloud Security

In an interview with CloudTweaks, Frank Kim, a SANS Fellow and cloud security expert, discusses the critical aspects of safeguarding cloud environments. Frank emphasizes the adoption of zero-trust architectures as essential for protecting high-value data and preventing attackers from moving laterally within network systems. He explains the shared responsibility model, highlighting that cloud service providers […]

Add your Ruby gems to AWS CodeArtifact

Ruby developers can now use AWS CodeArtifact to securely store and retrieve their gems. CodeArtifact integrates with standard developer tools like gem and bundler. Applications often use numerous packages to speed up development by providing reusable code for common tasks like network access, cryptography, or data manipulation. Developers also embed SDKs–such as the AWS SDKs–to […]