AWS Partner Network (APN) Blog

Tag: AWS Partner Success Stories

Avahi-APN-Blog-080823

InovCares Opens Up Service Offering to Support Enterprises with Help from Avahi to Scale AWS Infrastructure

As applications go to market and the customer workload increases rapidly, a higher level of cloud expertise is typically needed to tune the AWS infrastructure. Learn how Avahi Technologies and AWS collaborated to help InovCares take on the challenge of tuning a cloud infrastructure to support applications as workloads increase. Avahi was well suited for this project for its ability to help customers drive change and compete at speed by leveraging a cloud-first strategy.

Building a Secure, Reliable, and Scalable Chainlink Environment on AWS

A prominent blockchain technology provider sought TrackIt‘s assistance in deploying a scalable Chainlink environment on AWS. Learn how TrackIt leveraged a comprehensive suite of AWS services to implement a customized Chainlink workflow, and explore the steps required to deploy a secure, reliable, and scalable Chainlink environment on AWS. Chainlink is a decentralized blockchain oracle network built on Ethereum designed to facilitate the transfer of tamper-proof data from off-chain sources to on-chain smart contracts.

Tech Mahindra’s BMC Helix ITSM Deployment on AWS for End-to-End Data Protection

This post describes how Tech Mahindra transitioned a segment of telecom customers in the EMEA region from a legacy monolithic application, BMC Remedy on-premises, to a self-managed microservices application, BMC Helix IT Service Management, utilizing Kubernetes operations with end-to-end data protection on AWS. Tech Mahindra is an AWS Premier Tier Services Partner with the Migration Consulting Competency that specializes in digital transformation, consulting, and re-engineering solutions.

OPSWAT-APN-Blog-080723

Best Practices from OPSWAT to Secure AWS Applications from File-Borne Threats

The AWS Shared Responsibility Model requires security architects to take proactive measures to detect and prevent zero-day risks and other malware at the perimeter of their network. Learn about the potential risks associated with cloud applications that handle file uploads and transfers, and explore best practices to help mitigate. This post provides guidance on modern threat prevention technologies such as OPSWAT MetaDefender that help augment and automate cybersecurity defense.

Privacera-APN-Blog-080423

Governing Databricks Data Access with AWS Lake Formation and Privacera

Many organizations have standardized or plan to standardize their unified data security governance on AWS Lake Formation. Some of these organizations are also leveraging Databricks and would like to create and manage data access policies for Databricks using AWS Lake Formation as well. Learn how Privacera’s integrated solution extends AWS Lake Formation source support to Databricks and provides data access policy authorship and maintenance from one safe and convenient location.

Fivetran-APN-Blog-080423

Building a Modern Data Lake with Fivetran and Amazon S3 to Accelerate Data-Driven Success

Many organizations are adopting data lakes to handle large volumes of data, and flexible pipelines to fit the needs of consuming services and teams (machine learning, business intelligence, and analytics). In this post, we’ll explore the modern data lake and how Fivetran can help accelerate time-to-value with Amazon S3 and Apache Iceberg. Fivetran offers pre-built connectors for 300+ data sources and employs ETL to land data in the warehouse or data lake.

Managing AWS Account Root MFA Using CyberArk Privileged Access Manager

Protecting AWS account root users with multi-factor authentication (MFA) is a crucial security control, and now you can use CyberArk’s Privileged Access Manager (PAM) to securely manage the AWS account root and authenticate its use with MFA. We’ll review the current MFA features for AWS account root user, provide a step-by-step walkthrough of how to install and configure CyberArk PAM to manage root accounts with MFA, and show how to sign into the AWS root account with CyberArk PAM.

Amazon CloudWatch Monitoring for Workloads Hosted on VMware Cloud on AWS

Monitoring and managing cloud-based resources is crucial for maintaining performance, troubleshooting issues, and ensuring the health of your infrastructure. Learn about the integration of Amazon CloudWatch with VMware Cloud on AWS with a focus on monitoring the workload of virtual machines. We’ll elaborate on the benefits of integrating CloudWatch with other AWS services as well as third-party services like ServiceNow ITSM tool and IBM Netcool.

How to Access the Jurassic-2 Large Language Model via an AWS Lambda Endpoint

Generative AI and large language models (LLMs) such as AI21 Labs’ Jurassic models are reshaping how we engage with information. This post walks through using the Jurassic-2 (J2) large language model and how to consume the model via an AWS Lambda API endpoint. We’ll also discuss how to make calls to the J2 model via the publicly available Jurassic-2 Python SDK. AI21 Labs is an AWS Partner and leader in generative AI and LLMs, revolutionizing the way people read and write.

Sustainability-Adobe-2023-2

IBM Energy Anomaly Detection for Energy and Utilities Companies Leveraging Personalized AI

As the world grows, concerns over pollution and climate change are forcing businesses to redesign how they produce and use energy. A notable approach for achieving this objective is through informing end users of their power usage patterns. Learn how IBM’s anomaly detection solution for energy and utilities helps companies increase energy efficiency leveraging a personalized AI paradigm and to calculate ESG metrics related to energy consumption.