AWS Compute Optimizer introduces customizable rightsizing recommendations for EC2 Instances
Today we are announcing customizable EC2 rightsizing recommendations within AWS Compute Optimizer. With this launch you can now...
Amazon CloudWatch Logs announces Infrequent Access log class
We are excited to announce Amazon CloudWatch Logs Infrequent Access (Logs IA), a new log class for cost-effectively...
Announcing the new Amazon EFS Archive storage class
Amazon EFS Archive is a new storage class that is cost-optimized for long-lived file data that is accessed...
Amazon Web Services announces Unified Billing and Cost Management console
Today, AWS announces a unified Billing and Cost Management console that helps customers make faster, better-informed decisions and...
AWS announces CloudWatch Logs Anomaly Detection and Pattern analysis
Today, AWS announces the general availability of a suite of machine-learning powered log analytics capabilities in CloudWatch, including...
Amazon S3 Access Grants integrate with identity providers to simplify data lake permissions
Amazon S3 Access Grants map identities in directories such as Active Directory, or AWS Identity and Access Management (IAM)...
AWS Systems Manager Automation makes it easier to author runbooks with new low-code visual design experience
AWS Systems Manager Automation enables you to automate routine operations tasks using runbooks. Starting today, developers can author...
Automate AWS Control Tower landing zone operations using APIs
AWS Control Tower customers can now programmatically set up and manage their landing zones. Customers can discover, create,...
Recommend actions that increase brand loyalty with Amazon Personalize Next Best Action
Amazon Personalize is excited to announce the new Next-Best-Action recipe to help you recommend actions that your users have...
Announcing the general availability of AWS re:Post Private
Today, AWS announces the general availability of AWS re:Post Private, a fully managed, secure knowledge service for enterprises...
AWS CloudTrail Lake data now available for zero-ETL analysis in Amazon Athena
Starting today, AWS CloudTrail Lake data is now available for zero-ETL analysis in Amazon Athena. You can use...
Amazon Managed Service for Prometheus launches an agentless collector for Prometheus metrics from Amazon EKS
We are excited to announce Amazon Managed Service for Prometheus collector, a fully-managed agentless collector customers can use...
Redshift provisioned concurrency scaling and serverless autoscaling now supports Create Table As Select (CTAS)
Amazon Redshift provisioned cluster concurrency scaling and serverless autoscaling now supports CREATE TABLE AS SELECT (CTAS) queries. This...
Amazon CloudWatch announces AI-powered natural language query generation (in preview)
Amazon CloudWatch announces (in preview) natural language query generation powered by generative AI for Logs Insights and Metrics...
Announcing preview of AMB Access Polygon, serverless access to Polygon blockchain
Today, AWS announces the preview release of Amazon Managed Blockchain (AMB) Access Polygon. Access Polygon will help developers...
Amazon EFS now supports up to 250,000 IOPS per file system
Amazon EFS now supports up to 250,000 read IOPS and up to 50,000 write IOPS per file system,...
AWS Config launches generative AI-powered natural language querying (Preview)
AWS Config introduces a new natural language querying feature powered by generative AI, which simplifies the investigation and...
Accelerate AI Workflows for 3D Medical Imaging with NVIDIA MONAI Cloud APIs
AI is increasingly being used to improve medical imaging for health screenings and risk assessments. Medical image segmentation,...
New ‘HrServ.dll’ Web Shell Detected in APT Attack Targeting Afghan Government
An unspecified government entity in Afghanistan was targeted by a previously undocumented web shell called HrServ in what’s suspected to...
Warning: 3 Critical Vulnerabilities Expose ownCloud Users to Data Breaches
The maintainers of the open-source file-sharing software ownCloud have warned of three critical security flaws that could be...