AWS Storage Blog
Optimize storage costs by analyzing API operations on Amazon S3
The demand for data storage has increased with the advent of a fast-paced data environment – creating, sharing, and replicating data at a large scale. Most organizations are looking for the optimal way to store their data cost-effectively, giving them everything they need from their data but without breaking the bank. Cloud storage provides flexible […]
High-performance cloud storage comes of age with Amazon FSx for Lustre
The rapid maturation of cloud tools for high-performance workloads in the past several years has made it possible for household names like T-Mobile, Toyota, and Rivian to move their high-performance analytics and AI/ML environments to the cloud. These are hugely data-intensive workflows that many companies five years ago believed would never be able to be […]
Recovering network file shares with AWS Elastic Disaster Recovery and AWS DataSync
Data is one of the most valuable assets that a business owns. Protecting that data from disasters, such as system or infrastructure failures, is an important part of business continuity planning. Companies have diverse IT infrastructures in which data can be presented from multiple sources. This includes on-premises network-attached storage devices via different file-sharing protocols, […]
Automate and improve your security posture using AWS Backup and AWS PrivateLink
Enterprises set up their AWS environment preconfigured in-line with organizational security policies, compliance, and detective and preventive controls codified right from the beginning. Furthermore, enterprises want to access cloud-native services in a manner similar to how they have been consuming services in the past, from within their own secured networking environment according to their security […]
How Simon Data reduced encryption costs by using Amazon S3 Bucket Keys on existing objects
As more organizations look to operate faster and at scale, they need ways to meet critical compliance requirements and improve data security. Encryption is a critical component of a defense in depth strategy, and when used correctly, can provide an additional layer of protection above basic access control. However, workloads that access millions or billions […]
Analytical processing of millions of cell images using Amazon EFS and Amazon S3
Analytical workloads such as batch processing, high performance computing, or machine learning inference often have high IOPS and low latency requirements but operate at irregular intervals on subsets of large datasets. Typically, data is manually copied between storage tiers in preparation of processing, which can be cumbersome and error-prone. Given this, IT teams want to […]
Synchronize your Oracle databases quickly and easily with Amazon FSx for OpenZFS
Update 4/8/2024: You can find a more recent version of this solution in the blog “Accelerate development refresh cycles and optimize cost with Amazon FSx for NetApp ONTAP.” That post presents an alternative solution to the same use case found in this post, but using Amazon FSx for NetApp ONTAP. This post, which uses Amazon […]
Allowing external users to securely and directly upload files to Amazon S3
Organizations are often required to store files, images, and other digital assets in a repository. In many cases, the source of these files are partners or individuals who are not connected to internal systems and requires corporate authentication in order to upload the files. Customers traditionally use servers to handle file uploads, which can use […]
5 ways to simplify backup plans using AWS Backup resource assignment rules
Prior to the announcement of new resource assignment capabilities in AWS Backup, customers could assign resources to a backup plan in two ways. They could either select a specific resource using its resource ID or define a specific selection tag, which helps the service identify resources to be backed up by the backup plan. While […]
How Trend Micro uses Amazon S3 Object Lambda to help keep sensitive data secure
Does your application handle data that is uploaded by hundreds of thousands of end users? Is that same underlying data then shared across the same magnitude of users? Being able to scan data for malware before it’s returned to an application helps keep sensitive data secure, provides protection regardless of when the data was initially […]