AWS Architecture Blog

Category: Compute

Figure 1. Redundant direct connection from Hawaii to the US mainland

Building Resilient and High Performing Cloud-based Applications in Hawaii

Hawaii is building a digital economy for a sustainable future. Many local businesses are already embarking on their journey to the cloud to meet their customers’ growing demand for digital services. To access Amazon Web Services (AWS) on the US mainland, customers’ data must traverse through submarine fiber-optic cable networks approximately 2,800 miles across the […]

Figure 2. Control plane architecture

How Ribbon Built a Scalable, Resilient Robocall Mitigation Platform

Ribbon provides communications software, and IP and optical networking end-to-end solutions that deliver innovation, unparalleled scale, performance, and agility to service providers and enterprise. Ribbon is helping customers modernize their networks. In today’s data-hungry, 24/7 world, this equates to improved competitive positioning and business outcomes. Companies are migrating from on-premises equipment for telephony services and looking […]

Figure 2. Credit application – technical solution using Amazon SageMaker and Experian CaaS ML models

How Experian uses Amazon SageMaker to Deliver Affordability Verification 

Financial Service (FS) providers must identify patterns and signals in a customer’s financial behavior to provide deeper, up-to-the-minute, insight into their affordability and credit risk. FS providers use these insights to improve decision making and customer management capabilities. Machine learning (ML) models and algorithms play a significant role in automating, categorising, and deriving insights from […]

Figure 1. Heimdall Proxy architecture

Using Amazon Aurora Global Database for Low Latency without Application Changes

Deploying global applications has many challenges, especially when accessing a database to build custom pages for end users. One example is an application using AWS Lambda@Edge. Two main challenges include performance and availability. This blog explains how you can optimally deploy a global application with fast response times and without application changes. The Amazon Aurora […]

Figure 2. Technical workflow for Meshify IoT architecture

How Meshify Built an Insurance-focused IoT Solution on AWS

The ability to analyze your Internet of Things (IoT) data can help you prevent loss, improve safety, boost productivity, and even develop an entirely new business model. This data is even more valuable, with the ever-increasing number of connected devices. Companies use Amazon Web Services (AWS) IoT services to build innovative solutions, including secure edge […]

Figure 3. Choreography monitoring with AWS Step Functions

Use AWS Step Functions to Monitor Services Choreography

Organizations frequently need access to quick visual insight on the status of complex workflows. This involves collaboration across different systems. If your customer requires assistance on an order, you need an overview of the fulfillment process, including payment, inventory, dispatching, packaging, and delivery. If your products are expensive assets such as cars, you must track […]

Figure 4. High-level architecture pattern for discovering public IPs

Find Public IPs of Resources – Use AWS Config for Vulnerability Assessment

Systems vulnerability management is a key component of your enterprise security program. Its goal is to remediate OS, software, and applications vulnerabilities. Scanning tools can help identify and classify these vulnerabilities to keep the environment secure and compliant. Typically, vulnerability scanning tools operate from internal or external networks to discover and report vulnerabilities. For internal […]

Figure 2. Modernized queuing architecture using Amazon SQS

Modernized Database Queuing using Amazon SQS and AWS Services

This blog post was last reviewed/updated August, 2022. The updated version shown below is based on working backwards from a customer need to ensure data consistency post migration, to a modernized microservice architecture. A queuing system is composed of producers and consumers. A producer enqueues messages (writes messages to a database) and a consumer dequeues […]

Figure 1 - Architecture showing the DXC RoboticDrive Ingestor (RDI) solution

Ingesting Automotive Sensor Data using DXC RoboticDrive Ingestor on AWS

This post was co-written by Pawel Kowalski, a Technical Product Manager for DXC RoboticDrive and Dr. Max Böhm, a software and systems architect and DXC Distinguished Engineer. To build the first fully autonomous vehicle, L5 standard per SAE, auto-manufacturers collected sensor data from test vehicle fleets across the globe in their testing facilities and driving […]

Figure 2. Network Mapper scanner task workflow

Modernize your Penetration Testing Architecture on AWS Fargate

Organizations in all industries are innovating their application stack through modernization. Developers have found that modular architecture patterns, serverless operational models, and agile development processes provide great benefits. They offer faster innovation, reduced risk, and reduction in total cost of ownership. Security organizations must evolve and innovate as well. But security practitioners often find themselves […]