Welcome to The NAS Guy Blog

In the ever-evolving world of technology, where data rules supreme and innovations abound, finding your way through the digital labyrinth can be a daunting task. Whether you’re a seasoned tech enthusiast, a curious newcomer, or just someone looking to make sense of the rapidly changing tech landscape, “The NAS Guy” is here to be your guiding light.

Welcome to my tech-savvy haven where we unravel the mysteries of cloud computing, dive deep into storage solutions, explore the intricacies of data backup, and navigate everything in between. If you’ve ever found yourself lost in the jargon of terabytes, cloud migrations, or RAID arrays, fear not – you’re in the right place!

Recent Blog Posts

  • Introducing Amazon Application Recovery Controller Region switch: A multi-Region application recovery service
    As a developer advocate at AWS, I’ve worked with many enterprise organizations who operate critical applications across multiple AWS Regions. A key concern they often share is the lack of confidence in their Region failover strategy—whether it will work when needed, whether all dependencies have been identified, and whether their teams have practiced the procedures … Read more
  • Veeam Achieves TX-RAMP Level 2 Security Certification for Veeam Data Cloud Products
    Veeam® Software, the leader in Data Protection and Ransomware Recovery, today announced that its Veeam Data Cloud (VDC) offerings have been awarded the Texas Risk and Authorization Management Program (TX-RAMP) Level 2 security certification. This achievement underscores Veeam’s commitment to delivering industry-leading, secure cloud data protection solutions to public sector organizations across Texas. TX-RAMP Level … Read more
  • Amazon DocumentDB Serverless is now available
    Today, we’re announcing the general availability of Amazon DocumentDB Serverless, a new configuration for Amazon DocumentDB (with MongoDB compatibility) that automatically scales compute and memory based on your application’s demand. Amazon DocumentDB Serverless simplifies database management with no upfront commitments or additional costs, offering up to 90 percent cost savings compared to provisioning for peak … Read more
  • Veeam in a Multi-Hypervisor World
    The hypervisor landscape is undergoing significant change. With VMware’s acquisition by Broadcom and the resulting strategic shifts, new opportunities are emerging for alternative virtualization platforms. This technological evolution is bringing fresh momentum to the IT market – along with new challenges in data protection. Veeam is more than just backup for VMware environments. Our commitment … Read more
  • Fortify Cyber Resilience Through Hyperautomation with Veeam + Torq
    Cyberthreats continue to expand in frequency and complexity. They increase pressure on security operations and IT teams to preempt, detect, respond to, and recover from attacks faster, more accurately and confidently. Many organizations remain hindered by limited visibility, fragmented tools, and manual processes. These obstructions and complexities slow their ability to respond effectively to a … Read more
  • AWS Weekly Roundup: SQS fair queues, CloudWatch generative AI observability, and more (July 28, 2025)
    To be honest, I’m still recovering from the AWS Summit in New York, doing my best to level up on launches like Amazon Bedrock AgentCore (Preview) and Amazon Simple Storage Service (S3) Vectors. There’s a lot of new stuff to learn! Meanwhile, it’s been an exciting week for AWS builders focused on reliability and observability. … Read more
  • Clean Recovery and Business Continuity: Expert Insights from Veeam and Coveware
    Recovery isn’t just about getting systems back online; it’s about proving that IT operations are essential to business continuity. Veeam’s Leah Troscianecki sat down with Ray Umerley, Field CISO, Coveware by Veeam, for a tactical conversation about what actually happens when ransomware hits, and how clean recovery can turn the tide from operational fire drills … Read more
  • Targeted social engineering is en vogue as ransom payment sizes increase
    “Don’t say the “S…” word. But which adjective starting with S are we talking about? Three specifically come to mind in Q2, as these groups were both prolific in the sheer volume of attacks and novel iterations of social engineering in their intrusion vectors. Below, we dissect each one. Scattered SpiderAttack Approach: TargetedCharacterized By: Social … Read more
  • 8 Reasons Veeam Data Cloud is the #1 Choice for Microsoft 365 SaaS Backup
    Choosing a backup solution for your Microsoft 365 SaaS environment isn’t just a checkbox for IT, it’s a make-or-break decision for your entire business. The stakes are high: misconfigurations, accidental deletions, unauthorized data access, and compliance violations are everywhere, and the cost of a failed backup solution in a critical moment can have devastating business … Read more
  • AWS Weekly Roundup: Kiro, AWS Lambda remote debugging, Amazon ECS blue/green deployments, Amazon Bedrock AgentCore, and more (July 21, 2025)
    I’m writing this as I depart from Ho Chi Minh City back to Singapore. Just realized what a week it’s been, so let me rewind a bit. This week, I tried my first Corne keyboard, wrapped up rehearsals for AWS Summit Jakarta with speakers who are absolutely raising the bar, and visited Vietnam to participate … Read more
  • YARA Rules Guide: What They Are and How to Write Them
    YARA (Yet Another Recursive Acronym) rules are powerful pattern-matching tool used by security teams to  identify and classify malware based on known signature, strings, and behaviors. In backup recovery, YARA scanning adds a valuable layer of protection. Combined with immutable backups and secure restore workflow, YARA rules ensure safe and clean recovery. In this article, … Read more
  • Backing Up Microsoft Entra ID Conditional Access Policies Matters
    Veeam automates the backup and restore of conditional access policies for full protection. Conditional access policies in Microsoft Entra ID (formerly Azure AD) are at the heart of modern identity security. They determine who gets access to what, under which conditions, based on factors like user identity, device state, location, and application sensitivity. But these … Read more
  • Simplify serverless development with console to IDE and remote debugging for AWS Lambda
    Today, we’re announcing two significant enhancements to AWS Lambda that make it easier than ever for developers to build and debug serverless applications in their local development environments: console to IDE integration and remote debugging. These new capabilities build upon our recent improvements to the Lambda development experience, including the enhanced in-console editing experience and … Read more
  • AWS AI League: Learn, innovate, and compete in our new ultimate AI showdown
    Since 2018, AWS DeepRacer has engaged over 560,000 builders worldwide, demonstrating that developers learn and grow through competitive experiences. Today, we’re excited to expand into the generative AI era with AWS Artificial Intelligence (AI) League. This is a unique competitive experience – your chance to dive deep into generative AI regardless of your skill level, … Read more
  • Accelerate safe software releases with new built-in blue/green deployments in Amazon ECS
    While containers have revolutionized how development teams package and deploy applications, these teams have had to carefully monitor releases and build custom tooling to mitigate deployment risks, which slows down shipping velocity. At scale, development teams spend valuable cycles building and maintaining undifferentiated deployment tools instead of innovating for their business. Starting today, you can … Read more
  • How Veeam’s Focus on Data Resilience Inspires Industry Recognition
    At Veeam, our customers are at the heart of everything we do. Their needs, challenges, and feedback inspire us to continually enhance our solutions and maintain a steadfast commitment to our customer-first philosophy. In a world where data is the backbone of business operations, ensuring its resilience and availability is more critical than ever. That’s … Read more
  • Top announcements of the AWS Summit in New York, 2025
    Today at the AWS Summit in New York City, Swami Sivasubramanian, AWS VP of Agentic AI, provided the day’s keynote on how we’re enabling customers to deliver production-ready AI agents at scale. See below for a roundup of the biggest announcements from the event. Introducing Amazon Bedrock AgentCore: Securely deploy and operate AI agents at any … Read more
  • Announcing Amazon Nova customization in Amazon SageMaker AI
    Today, we’re announcing a suite of customization capabilities for Amazon Nova in Amazon SageMaker AI. Customers can now customize Nova Micro, Nova Lite, and Nova Pro across the model training lifecycle, including pre-training, supervised fine-tuning, and alignment. These techniques are available as ready-to-use Amazon SageMaker recipes with seamless deployment to Amazon Bedrock, supporting both on-demand … Read more
  • Introducing Amazon Bedrock AgentCore: Securely deploy and operate AI agents at any scale (preview)
    In just a few years, foundation models (FMs) have evolved from being used directly to create content in response to a user’s prompt, to now powering AI agents, a new class of software applications that use FMs to reason, plan, act, learn, and adapt in pursuit of user-defined goals with limited human oversight. This new … Read more
  • Streamline the path from data to insights with new Amazon SageMaker Catalog capabilities
    Modern organizations manage data across multiple disconnected systems—structured databases, unstructured files, and separate visualization tools—creating barriers that slow analytics workflows and limit insight generation. Separate visualization platforms often create barriers that prevent teams from extracting comprehensive business insights. These disconnected workflows prevent your organizations from maximizing your data investments, creating delays in decision making and … Read more
  • AWS Free Tier update: New customers can get started and explore AWS with up to $200 in credits
    When you’re new to Amazon Web Services (AWS), you can get started with AWS Free Tier to learn about AWS services, gain hands-on experience, and build applications. You can explore the portfolio of services without incurring costs, making it even easier to get started with AWS. Today, we’re announcing some enhancements to the AWS Free Tier … Read more
  • Monitor and debug event-driven applications with new Amazon EventBridge logging
    Starting today, you can use enhanced logging capability in Amazon EventBridge to monitor and debug your event-driven applications with comprehensive logs. These new enhancements help improve how you monitor and troubleshoot event flows. Here’s how you can find this new capability on the Amazon EventBridge console: The new observability capabilities address microservices and event-driven architecture … Read more
  • Introducing Amazon S3 Vectors: First cloud storage with native vector support at scale (preview)
    Today, we’re announcing the preview of Amazon S3 Vectors, a purpose-built durable vector storage solution that can reduce the total cost of uploading, storing, and querying vectors by up to 90 percent. Amazon S3 Vectors is the first cloud object store with native support to store large vector datasets and provide subsecond query performance that … Read more
  • Amazon S3 Metadata now supports metadata for all your S3 objects
    Amazon S3 Metadata now provides complete visibility into all your existing objects in your Amazon Simple Storage Service (Amazon S3) buckets, expanding beyond new objects and changes. With this expanded coverage, you can analyze and query metadata for your entire S3 storage footprint. Today, many customers rely on Amazon S3 to store unstructured data at … Read more
  • TwelveLabs video understanding models are now available in Amazon Bedrock
    Earlier this year, we preannounced that TwelveLabs video understanding models were coming to Amazon Bedrock. Today, we’re announcing the models are now available for searching through videos, classifying scenes, summarizing, and extracting insights with precision and reliability. TwelveLabs has introduced Marengo, a video embedding model proficient at performing tasks such as search and classification, and … Read more
  • Securing the Future of Defense: Veeam Kasten Joins the DoD P1 Marketplace to Deliver Kubernetes Data Resilience
    As the Department of Defense (DoD) rapidly modernizes its digital infrastructure, we are pleased to announce that Veeam Kasten is now awardable in the P1 Marketplace, marking an important advancement in securing cloud-native applications at scale. The P1 Solutions Marketplace is a digital repository of post-competition and readily awardable pitch videos that address the DoD’s … Read more
  • HPE and Veeam: Enhancing Private Cloud Data Protection with Morpheus Software, VM Essentials, and Kubernetes
    “Data is an organization’s most valuable asset and often its most vulnerable. We’re delivering to customers the industry’s most advanced private cloud solutions with data protection that is secure, resilient, and future-ready for the evolving IT landscape,” said Fidelma Russo, Executive Vice President of Hybrid Cloud and CTO of Hewlett Packard Enterprise (HPE). At HPE … Read more
  • AWS Weekly Roundup: AWS Builder Center, Amazon Q, Oracle Database@AWS, and more (July 14, 2025)
    Summer is well and truly here in the UK! I’m a bit of a summer grinch though so, unlike most people, I’m not crazy about “the glorious sun” scorching me when I’m out and about. On the upside, this provides the perfect excuse to retreat to the comfort of a well-ventilated room where I can … Read more
  • Data Resilience Maturity Model: Your Questions Answered
    Mastering Resilience: Essential Questions About the Data Maturity Model Data resilience should be a top priority for all organizations. But what does true resilience look like, and how can companies objectively measure and improve it? Enter the Data Resilience Maturity Model (DRMM), a comprehensive framework designed to help businesses assess their current capabilities, benchmark themselves … Read more
  • Cyber Resilience Strategies from the Risk to Resilience Report
    Ransomware attacks are evolving faster than ever, making cyber resilience a top priority for organizations of all sizes. In this post, our principal product marketing manager, Leah Troscianecki, EMEA field CTO, Edwin Weijdema, and VP, Technology GRC, Courtney Elder, answer some of the main questions from Veeam’s Risk to Resilience Report, share real-world insights from … Read more
Scroll to Top