AWS Public Sector Blog

Tag: AWS Secrets Manager

McGraw Hill delivers dynamic learning experiences with SHARPEN, powered by AWS

McGraw Hill, an AWS Partner, is an education technology (EdTech) and publishing company that provides educational content, software, and services for pre-K through postgraduate education. To meet evolving learner needs, McGraw Hill recently launched the SHARPEN app—a mobile study app that mimics the types of social media content feeds familiar to young learners to foster educational success. Developed in collaboration with the AWS Growth Advisory Team, this dynamic learning experience uses AWS.

AWS announces low-to-no cost security services for federal political campaigns and committees

It is essential for election campaigns and committees to have access to the latest security services so they can mitigate risks against security threats at minimal cost. To support this, AWS is collaborating with Defending Digital Campaigns (DDC) to offer more than 20 cybersecurity-related AWS services for low-to-no cost to all active and registered national party committees and federal candidate committees for the US House and US Senate midterm elections that are eligible in accordance with DDC and Federal Election Commission (FEC) criteria.

Photo by Tom Rumble on Unsplash

Bridging data silos to house and serve the homeless

Efforts to prevent and combat homelessness are limited by the lack of comprehensive data about people experiencing homelessness. This makes it difficult for states to identify trends and emerging needs to respond and make data-driven decisions about the effective deployment of resources. The cloud can help bridge information silos. Read on for examples of how states use the cloud to bridge data silos and better serve the homeless.

lock over computer chip

Delegated authentication using OAuth: A case study using Spotify and AWS

Cloud-based technologies allow organizations like governments to build a new application on existing services on the internet that offers open and documented APIs to deliver reliable data. These services have an authentication model so that new users verify their identity before accessing, even if it’s offered at no cost. There are three components in this scenario: a service provider, an end user, and an application that needs to access user data. The key technology here is OAuth. OAuth is a standard that enables access delegation.