AWS News Blog

AWS re:Invent Hackathon 2013

We have organized a unique Hackathon for re:Invent 2013. The event will run from 9:00 AM to Midnight on November 12th in Ballroom A of the Venetian conference center in Las Vegas. Hack AwayParticipants will assemble into teams and compete to solve a challenge faced by one of four non-profit organizations that have agreed to […]

Read More

AWS CloudHSM Update

I’d like to give you a quick update on AWS CloudHSM. First, the “HSM” is short for Hardware Security Module. As I noted in my earlier blog post: An HSM is a piece of hardware — a dedicated appliance that provides secure key storage and a set of cryptographic operations within a tamper-resistant enclosure. You […]

Read More

The AWS Report – Peng Zhao of MadeiraCloud

In the latest episode of The AWS Report, I spoke with Peng Zhao, CTO of MadeiraCloud, to learn more about their WYSIWYG design tool for AWS. We spoke about how and why they built it, and what their customers are using it for. We also spoke about the state of the cloud computing market in […]

Read More

AWS Week in Review – October 28, 2013

Let’s take a quick look at what happened in AWS-land last week: Monday, October 28 I published a new AWS Report video featuring Chris Langway of Optaros. The AWS Application Management Blog discussed CloudFormation and the New AWS CLI. The AWS .Net Development Blog talked about Getting Your EC2 Windows Password. Tuesday, October 29 We […]

Read More

Cross-Region Snapshot Copy for Amazon RDS

I know that many AWS customers are interested in building applications that run in more than one of the eight public AWS regions. As a result, we have been working to add features to AWS to simplify and streamline the data manipulation operations associated with building and running global applications. In the recent past we […]

Read More

AWS Identity and Access Management Policy Simulator

AWS Identity and Access Management (IAM for short) lets you control access to AWS services and resources using access control policies. IAM includes a large collection of prebuilt policies, and you can also create your own. IAM policies are comprised of policy statements. Each statement either allows or denies access to some AWS services (at […]

Read More