AWS Compute Blog
Category: Uncategorized
Running Java applications on Amazon EC2 A1 instances with Amazon Corretto
This post is contributed by Jeff Underhill | EC2 Principal Business Development Manager and Arthur Petitpierre | Arm Specialist Solutions Architect Amazon EC2 A1 instances deliver up to 45% cost savings for scale-out applications and are powered by AWS Graviton Processors that feature 64-bit Arm Neoverse cores and custom silicon designed by AWS. Amazon Corretto is […]
Integrating an Inferencing Pipeline with NVIDIA DeepStream and the G4 Instance Family
Contributed by: Amr Ragab, Business Development Manager, Accelerated Computing, AWS and Kong Zhao, Solution Architect, NVIDIA Corporation AWS continually evolves GPU offerings, striving to showcase how new technical improvements created by AWS partners improve the platform’s performance. One result from AWS’s collaboration with NVIDIA is the recent release of the G4 instance type, a technology […]
Using new vCPU-based On-Demand Instance limits with Amazon EC2
This post is contributed by Saloni Sonpal, Senior Product Manager, Amazon EC2 As an Amazon EC2 customer running On-Demand Instances, you can increase or decrease your compute capacity depending on your application’s needs, and only pay for what you use. EC2 implements instance limits, which give you a highly elastic experience while protecting you from […]
ICYMI: Serverless Q2 2019
This post is courtesy of Moheeb Zara, Senior Developer Advocate – AWS Serverless Welcome to the sixth edition of the AWS Serverless ICYMI (in case you missed it) quarterly recap. Every quarter, we share all of the most recent product launches, feature enhancements, blog posts, webinars, Twitch live streams, and other interesting things that you […]
Securing credentials using AWS Secrets Manager with AWS Fargate
This post is contributed by Massimo Re Ferre – Principal Developer Advocate, AWS Container Services. Cloud security at AWS is the highest priority and the work that the Containers team is doing is a testament to that. A month ago, the team introduced an integration between AWS Secrets Manager and AWS Systems Manager Parameter Store with AWS Fargate […]
ICYMI: Serverless Q1 2019
Welcome to the fifth edition of the AWS Serverless ICYMI (in case you missed it) quarterly recap. Every quarter, we share all of the most recent product launches, feature enhancements, blog posts, webinars, Twitch live streams, and other interesting things that you might have missed! If you didn’t see them, check our previous posts for what […]
Enabling DNS resolution for Amazon EKS cluster endpoints
Update – December 2019 Amazon EKS now supports automatic DNS resolution for private cluster endpoints. This feature works automatically for all EKS clusters. You can still implement the solution described below, but this is not required for the majority of use cases. Learn more in the What’s New post or Amazon EKS documentation. This post […]
Optimizing Network Intensive Workloads on Amazon EC2 A1 Instances
This post courtesy of Ali Saidi, AWS, Principal Engineer At re:Invent 2018, AWS announced the Amazon EC2 A1 instance. The A1 instances are powered by our internally developed Arm-based AWS Graviton processors and are up to 45% less expensive than other instance types with the same number of vCPUs and DRAM. These instances are based […]
Using partition placement groups for large distributed and replicated workloads in Amazon EC2
This post is contributed by Ankit Jain – Sr. Product Manager, Amazon EC2 and Harsha Warrdhan Sharma – Global Account Solutions Architect at AWS Before we introduced partition placement groups, customers deployed large distributed and replicated workloads across multiple Availability Zones to reduce correlated failures. This new Amazon EC2 placement strategy helps reduce the likelihood […]
Anatomy of CVE-2019-5736: A runc container escape!
This post is courtesy of Samuel Karp, Senior Software Development Engineer — Amazon Container Services. On Monday, February 11, CVE-2019-5736 was disclosed. This vulnerability is a flaw in runc, which can be exploited to escape Linux containers launched with Docker, containerd, CRI-O, or any other user of runc. But how does it work? Dive in! […]








