Amazon's message delivery service can be used to send SMS text messages and email messages, among many other things.
Amazon Web Services (AWS) is using a 3D metaverse-like role-playing game to train users on how to use its cloud computing platform.
Brien shows how budgets can be adjusted automatically based on your recent usage trends, helping to avoid sticker shock.
Brien shows how to create a backup plan after previously creating an on-demand backup of an S3 bucket.
Amazon S3 storage buckets previously were conspicuously absent from the list of backup-supported services, but no longer, as Brien demonstrates.
The thing that makes using an ARN so tricky is that even though every AWS object has an ARN, Amazon may not tell you what that ARN is.
It can be intimidating, but you don't need to use the IAM Management Console.
The VPC Reachability Analyzer looks at the configuration of all the resources in your virtual private clouds and uses automated reasoning to determine what network flows are feasible.
What to do if you create an EC2 instance on the AWS cloud only to find that you later outgrow it and need more storage.
The easiest way to adapt to evolving workload demands in EC2 is to change the instance type.
After earlier detailing needed planning, Brien goes to the next step: an in-place upgrade of the Windows Server OS as it relates to AWS EC2.
Brien demonstrates the process of upgrading AWS EC2 instances running Windows Server 2012 R2 to newer OSes.
While it would be a bad idea to host a mission-critical workload on spot instances, they're great for dev/test environments or for workloads that do not have strict SLAs.
Brien walks through the process of creating an IAM role for the AWS Fault Injection Simulator in order to find out what happens when an EC2 spot instance is interrupted.
If an organization uses spot instances as a means of providing extra capacity for EC2 workloads, it must consider what will happen if a spot instance is interrupted.
Cloud security specialist Ermetic published research that found compromised identities can lead to risky AWS S3 storage buckets in certain situations, resulting in ransomware vulnerabilities.
One of the big advantages to using AWS as a management platform for your IoT devices is that you can create security profiles that are able to generate alerts in response to conditions that might indicate a security issue.
Brien Posey provides step-by-step instructions to install an agent onto a device so that AWS can discover and manage it.
Brien Posey explains how to manage AWS "things" -- digital representations of IoT devices -- by categorize them so they can be easily tracked.
Brien Posey explains the process, which can help you to better manage data growth and the corresponding cost, along with providing other benefits.