Monday, August 26, 2019

VMware acquires AWS security vendor; Lake Formation goes GA; and more

AWS Digest
A roundup of AWS content from TechTarget's network |August 26th, 2019
TechTarget
FEATURED STORY
VMware buys serverless security startup
By Chris Kanaracus, Senior News Writer

Intrinsic offers technology to secure serverless workloads on AWS, Azure and Google Cloud. The acquisition is part of VMware's broader plan to expand well beyond its roots. (SearchCloudComputing.com)

Advertisement
NEWS
 

Globe and Mail's AWS journey helps outlet tell digital stories

The Globe and Mail's AWS migration has set up the large Canadian news outlet for success, as it seeks to grow digital subscription revenue and target what readers want most. (SearchAWS.com)
 

Amazon eyes data lake market with AWS Lake Formation

Amazon's cloud data lake service is generally available. Experts think platforms like AWS could play a key role in large-scale, data-driven initiatives. (SearchDataManagement.com)

EXPERT ADVICE
 

When not to use AWS Lambda

AWS Lambda isn't the only option to automatically scale infrastructure resources. Read about AWS Lambda alternatives from Elastic Beanstalk to Azure Functions, and learn how to choose one or more. (SearchAWS.com)
 

What AWS users get with Amazon Personalize

Enterprises get the same recommendation engine the Amazon storefront uses when they adopt Personalize. Learn how it works and how it compares to other AI-based recommendation technologies. (SearchAWS.com)
 

What's next for AWS' container services

AWS was early to container orchestration services and has continued to develop its offerings, especially around Kubernetes. Round out your AWS container knowledge and find out where the cloud vendor might take the technology next. (SearchAWS.com)

 
Scout these non-Lambda serverless architecture examples

Check out how to deploy a serverless architecture on AWS without Lambda. Use DynamoDB, Kinesis, S3 and other services to deploy serverless applications. (SearchAWS.com)

 

Learn how to create automated AWS IAM resources

To stay up to date on access control and permissions, use CloudFormation templates to automate AWS IAM users and groups. Follow this video tutorial for the step-by-step process. (SearchAWS.com)

 

Conduct proper AWS vulnerability scanning in 3 steps

AWS vulnerability scanning and management is the duty of the user, not AWS. Learn about the shared responsibility model for cloud security and how to conduct a proper scan. (SearchCloudSecurity.com)

About This E-Newsletter
This e-newsletter is published by the TechTarget network. To unsubscribe from AWS Digest, click here. Please note, this will not affect any other subscriptions you have signed up for.

TechTarget Enterprise Applications Media Group, 275 Grove Street, Newton, MA 02466. Contact: webmaster@techtarget.com

Copyright 2019 TechTarget. All rights reserved.
TechTarget

No comments: