AWS Architecture Blog

Category: Application Integration

Let's Architect

Let’s Architect! Using open-source technologies on AWS

With open-source technology, authors make software available to the public, who can view, use, or change it and add new features or support new capabilities. Open-source technology promotes collaboration across different teams, organizations, and people because the process often includes different perspectives and ideas, which typically results a stronger solution. It can be difficult to […]

Read More
Figure 1. Architecture diagram for autonomous driving simulation

How to Run Massively Scalable ADAS Simulation Workloads on CAEdge

This post was co-written by Hendrik Schoeneberg, Sr. Global Big Data Architect, The An Binh Nguyen, Product Owner for Cloud Simulation at Continental, Autonomous Mobility – Engineering Platform, Rumeshkrishnan Mohan, Global Big Data Architect, and Junjie Tang, Principal Consultant at AWS Professional Services. AV/ADAS simulations processing large-scale field sensor data such as radar, lidar, and […]

Read More
Figure 3. Choreography monitoring with AWS Step Functions

Use AWS Step Functions to Monitor Services Choreography

Organizations frequently need access to quick visual insight on the status of complex workflows. This involves collaboration across different systems. If your customer requires assistance on an order, you need an overview of the fulfillment process, including payment, inventory, dispatching, packaging, and delivery. If your products are expensive assets such as cars, you must track […]

Read More
Figure 4. High-level architecture pattern for discovering public IPs

Find Public IPs of Resources – Use AWS Config for Vulnerability Assessment

Systems vulnerability management is a key component of your enterprise security program. Its goal is to remediate OS, software, and applications vulnerabilities. Scanning tools can help identify and classify these vulnerabilities to keep the environment secure and compliant. Typically, vulnerability scanning tools operate from internal or external networks to discover and report vulnerabilities. For internal […]

Read More
Figure 2. Modernized queuing architecture using Amazon SQS

Modernized Database Queuing using Amazon SQS and AWS Services

A queuing system is composed of producers and consumers. A producer enqueues messages (writes messages to a database) and a consumer dequeues messages (reads messages from the database). Business applications requiring asynchronous communications often use the relational database management system (RDBMS) as the default message storage mechanism. But the increased message volume, complexity, and size, […]

Read More
Figure 1 - Architecture showing the DXC RoboticDrive Ingestor (RDI) solution

Ingesting Automotive Sensor Data using DXC RoboticDrive Ingestor on AWS

This post was co-written by Pawel Kowalski, a Technical Product Manager for DXC RoboticDrive and Dr. Max Böhm, a software and systems architect and DXC Distinguished Engineer. To build the first fully autonomous vehicle, L5 standard per SAE, auto-manufacturers collected sensor data from test vehicle fleets across the globe in their testing facilities and driving […]

Read More
Figure 1 - Architecture diagram showing Serverless Scheduling with Amazon EventBridge, AWS Lambda, and Amazon DynamoDB

Serverless Scheduling with Amazon EventBridge, AWS Lambda, and Amazon DynamoDB

Many applications perform scheduled tasks. For instance, you might want to automatically publish an article at a given time, change prices for offers which were defined weeks in advance, or notify customers 8 hours before a flight. These might be one-off tasks, or recurring ones. On Unix-like operating systems, you might have opted for the […]

Read More
Figure 1. Architecture for batch inference at scale with Amazon SageMaker

Batch Inference at Scale with Amazon SageMaker

Running machine learning (ML) inference on large datasets is a challenge faced by many companies. There are several approaches and architecture patterns to help you tackle this problem. But no single solution may deliver the desired results for efficiency and cost effectiveness. In this blog post, we will outline a few factors that can help […]

Read More
CrowdStrike Falcon Horizon IOA architecture

Detect Adversary Behavior in Milliseconds with CrowdStrike and Amazon EventBridge

By integrating Amazon EventBridge with Falcon Horizon, CrowdStrike has developed a real-time, cloud-based solution that allows you to detect threats in less than a second. This solution uses AWS CloudTrail and EventBridge. CloudTrail allows governance, compliance, operational auditing, and risk auditing of your AWS account. EventBridge is a serverless event bus that makes it easier […]

Read More

Field Notes: Creating Custom Analytics Dashboards with FireEye Helix and Amazon QuickSight

FireEye Helix is a security operations platform that allows organizations to take control of any incident from detection to response. FireEye Helix detects security incidents by correlating logs and configuration settings from sources like VPC Flow Logs, AWS CloudTrail, and Security groups. In this blog post, we will discuss an architecture that allows you to […]

Read More