AWS News Blog

Jeff Barr

Author: Jeff Barr

Jeff Barr is Chief Evangelist for AWS. He started this blog in 2004 and has been writing posts just about non-stop ever since.

IT-Lifeline – Disaster Recovery Using AWS

Matt Gerber,CEO of managed service provider IT-Lifeline spent some time talking about AWS on camera. Here’s the full video: Matt enumerates the three main benefits that AWS provides him: cost, elasticity, and time to market (sometimes saving 6 months to a year for a new offering). He also talks about security and compliance, and about […]

Read More

Run Microsoft SQL Server 2012 (\Denali\) on AWS Now

Microsoft SQL Server 2012 (code named “Denali”) has a lot of really intriguing features including high availability, columnstore indexes, self-service Business Intelligence, faster full-text search, data visualization, and improved security and compliance. Consult the feature guide for more information. In order to make it as easy as possible for you to test your applications with […]

Read More

Free Live Stream of AWS GovCloud Summit II

Due to an overwhelming response, the live registration for tomorrow’s AWS GovCloud Summit has been closed. We will be streaming the entire event and I invite you to sign up now. The event will feature keynote addresses by GSA CIO Casey Coleman and Amazon.com CTO Werner Vogels, customer presentations, how-to sessions, information on FISMA and […]

Read More

AWS Web Event: Running a Lean Startup on AWS

Are you thinking about kicking off a lean startup and wondering what the buzz is all about? In his new book, The Lean Startup, author and entrepreneur Eric Ries (co-founder of IMVU) outlines key principles of the ideal lean startup: Customer-centric, rapid iterations on the product. Application of agile software development methodologies. Use of platforms […]

Read More

Integrated IAM Policy Generator

You can now create custom IAM (Identity and Access Management) policy documents from the IAM tab of the AWS Management Console. You can use a custom policy document to gain access to a number of advanced IAM features such as limiting access by user agent, time, or IP address, requiring a secure transport, or even […]

Read More