Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help

Implementation (4738 results) showing 1651 - 1660



EDA-Serverless Architecture combines the benefits of Event-Driven Architecture (EDA) with the power of serverless computing, thus empowering businesses to harness the full potential of event-driven applications while benefiting from the inherent advantages of serverless computing. This architecture...


Meet your business goals with our end-to-end Integrated implementation programs. Our expert engineers and enterprise architects leverage reference architectures and proven best practices to deliver complete design, build, validation and go-live project phases. These integrated services projects...


Kainos MLOps leverages end-to-end DevOps and ML technologies on AWS, industry best practice playbooks and model IP that enables organisations to quickly and efficiently transition from tactical to strategic use of data science in production at scale. MLOps will transform your adoption of data...


Well-Architected Review (WAR) will evaluate your application or workload using the six pillars of the Well-Architected Framework: Operational Excellence, Security, Reliability, Performance Efficiency, Cost Optimizations, and Sustainability. This review will provide a critical business workload and...


TensorIoT's Generative AI Executive Briefing offers an informative, hands-on experience for decision-makers aiming to improve their understanding of the business applications of Generative AI. This executive briefing aims to bridge the knowledge gap, fostering an understanding of how Generative AI...


Adopting the cloud can be challenging because of the steep learning curve, the investment into training and planning and the need to rebuild or refactor applications. OpsGuru's Cloud Launchpad is the cloud adoption program to remove such key obstacles. You get the technical solution, the coaching...


Multi-factor authentication is a process in which users are prompted during the sign-in process for an additional form of identification, such as a code on their cellphone or a fingerprint scan. If you only use a password to authenticate a user, it leaves an insecure vector for attack. If the...