AWS S3 with CloudFront, high-performance security
top of page
Services Amazon CloudFront is a content delivery network (CDN) service built for high-performance security, and developer convenience can be used as the frontend of many services (S3 Buckets, ELB’s, media distribution, and any other HTTP server running in ec2 instance or any other kind of host). Besides, Cloudfront uses edge locations to cache copies of the content that it serves, so the content is closer to users and can be delivered to them faster. Edge locations are AWS da
Instance interactive access
Generally, we create Linux instances allowing port 22 to access via SSH. Using AWS Systems Manager Session Manager instead of directly accessing via SSH we don't need inbound rules to open ports in Security Groups. There are no inbound rules. Normally we’d require tcp 22 to ssh into this instance. If we go back to Systems Manager, we can go to instance actions, start a session, and..what’s gonna happen? We are connected to our instance! We strongly recommend using AWS Systems
Technological Challenges for Startups in 2022
A couple of years ago talking about Covid-19 was something new for all of us, today it is already daily bread so much that it sounds like a cliché, but as humans, we have overcome the arrival of this virus in a large percentage and in the same way they have made many companies that were affected and had to find new ways to sell their products and services. As 2022 begins, there is more attention than ever on early-stage startups as they have played a major role in driving eco
Sometimes, we want to know if we have the necessary permissions to execute a certain command, but we don’t really want to execute it! And let’s say that for some reason we can’t access IAM and check our permissions For this, we have --dry-run, a parameter that is applicable to some commands that we can use in our AWS CLI. Suppose we want to know if our user has the necessary permissions to run instances! we have a test user, teratip. A correct example of run-instances would b
What are we talking about when we talk about service delivery?
How many times a day do we see search posts for Service Delivery Managers? How many people have this experience described in their professional profiles? But, do we know what it is about? Do we know what areas it covers? And what knowledge should Service Delivery Manager have? If we search the web, we will see that Service Delivery is a framework that encompasses a set of principles, standards, policies, and restrictions that will be used to guide designs, development, implem
Easy CodeCommit authentication with git-remote-codecommit
There is a new and much easier way to interact with CodeCommit repositories from git. Forget the times when you need to run git config for setting helper scripts for authentication and enter the XXI century with git-remote-codecommit. In a nutshell, this new git helper gives you two features: Authenticate using your aws cli credentials automatically Use a new codecommit:// protocol that simplifies the url and naming of the repositories. How to install it Install the helper wi
How to secure your business? Is your data secure?
One of the main concerns of a company when deciding to move part or all of its computing and data management resources to a cloud computing service is security. That is why data protection is the first step for an adequate cloud security strategy. Due to the pandemic, e-commerce, online transactions, and the use of digital services increased dramatically, but as companies have adapted to the digital world, thieves also find new ways to commit criminal acts and increase digita
CyberSecurity Month: Tips to avoid being phished
October is Cybersecurity Awareness Month. And just today, Twitch has been breached, badly. How does this relate to phishing, you wonder? Well, 91% of cyberattacks start with Phishing, that’s how. Phishing is a type of social engineering where an attacker sends a fraudulent message designed to trick a victim into revealing sensitive information to the attacker or to deploy malicious software on the victim's infrastructure like ransomware. Bad actors continually capitalize on
How do companies benefit when machines learn?
Machine Learning or ML is a branch of Artificial Intelligence (AI) that mainly consists of mathematical and statistical models that help machines to learn based on data and is currently being the development engine of many companies. For some years now, organizations have been interested in developing image recognition, shape recognition, understanding of natural language -that studies the interactions between computers and human language- among others, in order to improve th
Data fundamentals on AWS: Data Pipelines
As our world becomes more and more data-oriented, we need good conceptual frameworks for communicating our ideas and for making the best design decisions. On one hand, this blog post describes a mental model of a data processing pipeline with two main goals: to establish common language and concepts and to help us to design data pipeline architectures following the best practices. From a practical standpoint, this framework will guide you in designing and evaluating any data
bottom of page