The manufacturing sector is rife with unprotected Internet of Things (IoT) sensors and devices, many of them integrated into enterprises’ mission-critical systems. The resulting gaps make operations technology (OT) and information technology (IT) networks vulnerable to devastating cyberattacks. Visibility is key. Shivan Mandalam, director of product management for IoT security at CrowdStrike, told VentureBeat that “it’s […]
Category Archives: Blog
This week, I will meet our customers and partners at the AWS Summit Mexico. If you are around, please come say hi at the community lounge and at the F1 Game Day where I will spend most of my time. I would love to discuss your developer experience on AWS and listen to your stories […]
With nearly 5 billion users worldwide—more than 60% of the global population—social media platforms have become a vast source of data that businesses can leverage for improved customer satisfaction, better marketing strategies and faster overall business growth. Manually processing data at that scale, however, can prove prohibitively costly and time-consuming. One of the best ways […]
Planning and managing your cloud ecosystem and environments is critical for reducing production downtime and maintaining a functioning workload. In the “Managing your cloud ecosystems” blog series, we cover different strategies for ensuring that your setup functions smoothly with minimal downtime. To start things off, the first topic in this blog series is ensuring workload […]
The pandemic swung the IT pendulum to the extreme as businesses rushed to the cloud. Now organizations are seeing the bill come due, and they may be surprised at what they find. While the cloud can be useful for some things, it is not the ideal match for every application and can become costly with […]
For disaster-prone areas, fragile connectivity remains a major problem, often going offline in critical moments. Aerospace enterprises face a similar challenge when trying to run consistent high-altitude connectivity while operating in remote locations, which can also be very expensive. This is where Project OWL comes into play: developing new technologies to help address these challenges. Formed […]
It looks like an easy day for James, an IT Administrator. It is vacation time and most of his end users are out of the office, so he thinks it is time to have a look at some of the backlog tasks—maybe even procrastinate a bit. But then, the phone rings. It’s Robert, one of […]
When it comes to hosting applications on Amazon Web Services (AWS), one of the most important decisions you will need to make is which Amazon Elastic Compute Cloud (EC2) instance type to choose. EC2 instances are virtual machines that allow you to run your applications on AWS. They come in various sizes and configurations—known as […]
The average cost of a data breach is USD 4.35 million, and 83% of organizations have had more than one breach (of which 45% occur in the cloud). With these increases in the frequency and costs data breaches, an enterprise’s data protection and privacy in the cloud is more important than ever. The data protection needs […]
These are monumental topics that command volumes of diligent research, backed by empirical evidence and citations from subject-matter experts. Yet, I’m afraid we don’t have the time for this. In 2022, I had a video meeting with a core member of OpenAI. It was still a project being “leaked” at the time, and the floodgates […]