AWS Marketplace

Updating your AWS Marketplace products via Catalog API

We are pleased to announce the availability of the AWS Marketplace Catalog API. This new feature provides an API interface to programmatically view and update your data products. You can now extend your release and deployment pipeline to programmatically publish new dataset revisions to your data products using AWS SDKs and Catalog APIs. AWS Marketplace […]

machine learning AWS Marketplace

Using AWS Marketplace for machine learning workloads

Organizations of all sizes are realizing that Machine Learning is more than a nice-to-have capability. It’s becoming a necessary differentiator that has the potential to impact almost every aspect of the business. From back-office optimizations to business forecasting and risk reduction, ML is critical for companies looking to innovate and remain relevant. One way for […]

You can now analyze AWS Marketplace AMI software spend using cost allocation tags

Starting November 2019, Amazon Machine Images (AMI) deployed on AWS Marketplace will inherit tags from their corresponding Amazon Elastic Compute Cloud (Amazon EC2) instances. This update provides greater spend management visibility into your AWS Marketplace software costs. Additionally, it will not impact your billing process or invoiced amount. You can use tags to categorize, allocate, […]

reInvent 2019 AWS Marketplace

Your guide to AWS Marketplace sessions at AWS re:Invent 2019

Updated 11/13/19 and 11/20/19 with new and revised sessions AWS re:Invent 2019 is almost here, and reserved seating is now live! You can reserve seating for re:Invent activities such as breakout sessions, workshops, chalk talks, builder sessions, hacks, spotlight labs, and more by logging in to the event catalog using your re:Invent registration credentials. Build […]

Creating a curated digital catalog of AWS Marketplace products in a secured multi-account environment

The enterprise customers I work with use AWS Control Tower to set up and govern their secure multi-account AWS environments. They want to enable their technology users to find, buy, and immediately start using software from AWS Marketplace to run on their environments. At the same time, they also want to restrict AWS Marketplace purchases […]

Figure 8 create a machine learning job

Training a machine learning model to automate expense reporting

This is a guest post by Dale Brown, VP of Business Development, Figure Eight Before you can build a successful machine learning (ML) algorithm that works in the real world, you must ensure that your data is appropriately annotated by human annotators. Creating accurate training data helps ensure better accuracy when you launch your ML […]

Barracud CloudGen WAF screenshot

Configuring Barracuda CloudGen WAF on your Virtual Private Cloud

  Installing a web application firewall (WAF) in your virtual private cloud (VPC) protects your applications against sophisticated threats. Possible threats include Structure Query Language (SQL) injection, cross-site scripting (XSS), malware uploads, and application Distributed Denial of Service (DDoS) attacks. Installing a WAF can improve overall application performance while mitigating risks. Most WAFs include built-in […]

CIDL login page

How to install a self-serve data lake using TCS Connected Intelligence Data Lake

by guest author James Carden, Solution Architect, TCS The TCS Connected Intelligence Data Lake for Business (CIDL) is a self-serve data lake platform that helps business and IT teams turn raw data into insights. In this blog post, I will describe the steps to subscribe to, install, and test CIDL. Prerequisites Log in to your […]

aws marketplace private marketplace diagram

Controlling access to a well-architected Private Marketplace using IAM and AWS Organizations

At re:Invent 2018, AWS announced Private Marketplace, a feature that helps customers govern third-party software procurement from AWS Marketplace. In this post, I share some best practices that help you follow the principle of least privilege and implement access control using IAM and service control policies (SCPs) in AWS Organizations to set up a well-architected […]

crowdstrike confirm policies

Creating endpoint security policies with CrowdStrike’s Falcon Endpoint Protection

The term “endpoints” usually refers to user devices, such as laptops and servers. Cloud-based endpoints, however, include more than just the device: databases, instances, services, and applications. As endpoints have changed, endpoint security has expanded from a simple antivirus solution to an integrated set of advanced visibility and security features. Endpoint security solutions now offer […]