Cloud Computing


Simplifying the Amazon EC2 Instance Customization Process

AWS expert Brien Posey demonstrates how to automate EC2 instance customization by using PowerShell to simplify post-deployment tasks.

AWS Cites Move to On-Premises, Gartner Says It's Not Widespread

Is there a widespread backlash to cloud computing that sees organizations moving their IT operations back to on-premises datacenters? That longstanding debate was fueled by recent comments from AWS about cloud repatriation among its customer base.

Default Settings Cause AI Cloud Security Woes: Report

Cloud misconfigurations, specifically the blind acceptance of default resource settings, continue to cause cybersecurity issues in the cloud, with AI systems being a new factor.

Cloudflare Tool Helps 'Capture Value' from AI Site Scrapers

Connectivity cloud specialist Cloudflare announced a new AI Audit tool that monitors and controls how AI bots interact with site content, part of the back-and-forth between content owners and AI scrapers, with the former wanting to get paid by the latter.

Amazon Back-to-Office Edict Flummoxes Recent Hire

Corporate strategies, worker productivity, the value of in-person collaborations, the value of happy employees and other factors were debated after the announcement, but one social media post brings home how such decisions can affect individual workers.

Advanced AI Surges on Linux

While Linux is the OS of choice for many AI researchers and practitioners, Windows has been getting a lot more Gen AI functionality thanks to Microsoft's huge investment into OpenAI, but there are signs of an AI surge in the open-source OS space.

AWS Open-Source Brouhaha About Elasticsearch Takes Another Turn

A twisty, years-long brouhaha centered around open-source licensing has taken another turn, with an Amazon Web Services (AWS) project based on Elasticsearch being turned over to a new group under the direction of the Linux Foundation.

Cohesity Data Protection Adds CrowdStrike Threat Intelligence

"Our latest collaboration with CrowdStrike allows customers to bring their own (BYO) cyber threat intelligence."

Feds Propose Reporting Requirements for AI, Cloud Providers

This proposed rule from the department's Bureau of Industry and Security aims to enhance national security by establishing reporting requirements for the development of advanced AI models and computing clusters.

VMware Explore 2024: Announcements and Final Recap

Veteran attendee Tom Fenton explains how the event showcased a clear vision for VMware's future, with AI, on-premises and edge computing emerging as focus points.

Best Practices for Managing AWS EC2 Security Groups

Security groups crucially keep VM instances secure, so cloud expert Brien Posey is sharing best practices for working with them.

VMware Explore 2024: Day 1

Tom braves concerns about Broadcom's acquisition of VMware to once again attend the big show and connect with vendors both big and small to check out all the new offerings, techniques, guidance and more.

We Have a Software Quality Problem

"I'm an MSP, providing IT services to a handful of small businesses, and the software supply chain brings a lot of risks to my clients."

AWS CEO and GitHub Agree on One Thing: AI Coding Is the Future

GitHub data released same day cloud giant CEO predicts a possible future where "most developers are not coding."

Report Lists Principles/Best Practices for Securing AI Systems

"Continuous verification of identities and permissions, coupled with designing systems that limit the potential impact of issues, is crucial."

Azure OpenAI (GPT-4o) Chases Other Cloud AI Services with Federal Security Approval

Effectively, Azure OpenAI is catching up to AI offerings from the other cloud giants, AWS and Google Cloud.

Accepted for Limited Beta: Hands On with Azure AI-Assisted GitHub Models

"We believe every developer can be an AI engineer with the right tools and training."

Getting Started with the IAM Access Analyzer

A new tool called the IAM Access Analyzer can help you to find IAM resources with unused permissions, IAM settings that allow for external access, and more.

Using AI for 'Offensive Security' by Simulating Attacks

Adversarial testing with red/black teams is nothing new in cybersecurity, but a new paper examines how advanced AI can help and provides recommendations for organizations to do just that.

KubeCon 2024: Visiting Utah

Former resident Tom Fenton shares some of the fun and exciting things he found there to try to convince you to spend a few days after or before the conference exploring attractions outside Salt Lake City.

Subscribe on YouTube