Amazon OpenSearch Serverless extends auto-scaling to handle high query rates
We are excited to announce that Amazon OpenSearch Serverless has expanded its auto-scaling capabilities to efficiently handle tens of...
Amazon EMR on EKS now supports Amazon Linux 2023
We are excited to announce support for Amazon Linux 2023 (AL2023) on Amazon EMR on EKS. Customers can now...
Knowledge base for Amazon Bedrock connects foundation models to your data sources
Today, we are announcing knowledge base for Amazon Bedrock in preview that lets you connect your organization’s private...
AWS Elastic Disaster Recovery is now available in Israel (Tel Aviv)
Starting today, AWS Elastic Disaster Recovery (DRS) is available in Israel (Tel Aviv) region. Source:: Amazon AWS
AWS AppSync WebSockets-based subscriptions for real-time updates support nested filtering
AWS AppSync is a fully managed service that enables developers to build digital experiences based on real-time data....
UK gov’t announces new $1.1B supercomputer and AI research facility
As part of its commitment to AI R&D, the UK has announced the development of a new supercomputer...
Announcing post-launch actions framework for AWS Elastic Disaster Recovery
AWS Elastic Disaster Recovery (AWS DRS) now allows you to define actions that run automatically after launching recovery instances,...
12 thoughts for business after Apple’s iPhone 15 launch
While the move to USB-C might mean bigger businesses will end up with a host of older Lightning...
New Course: Generative AI Explained
Explore generative AI concepts and applications, along with challenges and opportunities in this self-paced course. Explore generative AI...
Alert: New Kubernetes Vulnerabilities Enable Remote Attacks on Windows Endpoints
Three interrelated high-severity security flaws discovered in Kubernetes could be exploited to achieve remote code execution with elevated...
Researchers Detail 8 Vulnerabilities in Azure HDInsight Analytics Service
More details have emerged about a set of now-patched cross-site scripting (XSS) flaws in the Microsoft Azure HDInsight open-source analytics...
Gloves come off during day one of Google’s antitrust trial
The most significant tech antitrust trial of the 21st century thus far kicked off in US federal court...
Adobe generative AI tool Firefly is now generally available
Adobe on Wednesday announced the commercial release of Firefly, a suite of generative AI models that are natively...
A Zero Trust Architecture Model for Access Control in Cloud-Native Applications in Multi-Location Environments: NIST Publishes SP 800-207A
NIST announces the release of Special Publication (SP) 800-207A, A Zero Trust Architecture Model for Access Control in...
NIST Director Laurie E. Locascio to Lead Cybersecurity Business Development Mission to Taiwan
Between Sept. 18-20, Laurie E. Locascio, director of the Department of Commerce’s National Institute of Standards and Technology...
NIST Director Laurie Locascio to Lead Cybersecurity Business Development Mission to Taiwan
Between Sept. 18-20, Laurie Locascio, director of the Department of Commerce’s National Institute of Standards and Technology (NIST),...
Webinar: Identity Threat Detection & Response (ITDR) – Rips in Your Identity Fabric
In today’s digital age, SaaS applications have become the backbone of modern businesses. They streamline operations, enhance productivity,...
Will OpenAI’s enterprise chatbot put a big hurt on Microsoft?
Microsoft has a surprising and powerful new competitor in its attempt to dominate the generative AI market –...
Google’s increasingly prickly Android perception problem
Ask most Android enthusiasts for their thoughts on the eternal “iPhone vs. Android” debate, and you’re bound to...
Rust-Written 3AM Ransomware: A Sneak Peek into a New Malware Family
A new ransomware family called 3AM has emerged in the wild after it was detected in a single incident in...