Announcing AWS Parallel Computing Service to run HPC workloads at virtually any scale

Today we are announcing AWS Parallel Computing Service (AWS PCS), a new managed service that helps customers set up and manage high performance computing (HPC) clusters so they seamlessly run their simulations at virtually any scale on AWS. Using the Slurm scheduler, they can work in a familiar HPC environment, accelerating their time to results …

Announcing AWS Parallel Computing Service to run HPC workloads at virtually any scale Read More »

Destination: Data Freedom with the latest release of Veeam Data Platform 12.2

Today is the day we’ve all been waiting for: Veeam Data Platform v12.2 is now generally available! Despite being a point release, we’re delivering significant enhanced functionality and many new capabilities, many of which were unveiled for preview at VeeamON in Fort Lauderdale earlier this year. Long-time customers know when it comes to releases, new …

Destination: Data Freedom with the latest release of Veeam Data Platform 12.2 Read More »

Kubernetes: Unlocking Migration, Mobility, and Portability

Kubernetes has emerged as a cornerstone for managing containerized applications. Because of this, it’s become vital for IT professionals, DevOps engineers, cloud architects, and decision-makers to understand the distinct advantages offered by Kubernetes’s migration, mobility, and portability. Each of these functions brings unique capabilities to the table. Migration enables the seamless transfer of applications across …

Kubernetes: Unlocking Migration, Mobility, and Portability Read More »

Exploring Benefits of the Veeam Cyber Secure Program

Are you confident that your backups can recover from a cyberattack? During a cyber incident do you have forensics, decryption, and negotiation services readily available to help your organization recover quickly and safely? We’ve seen firsthand that organizations unfortunately do not rise to the occasion of recovering from a cyberattack. They fall to their level …

Exploring Benefits of the Veeam Cyber Secure Program Read More »

AWS Weekly Roundup: S3 Conditional writes, AWS Lambda, JAWS Pankration, and more (August 26, 2024)

The AWS User Group Japan (JAWS-UG) hosted JAWS PANKRATION 2024 themed ‘No Border’. This is a 24-hour online event where AWS Heroes, AWS Community Builders, AWS User Group leaders, and others from around the world discuss topics ranging from cultural discussions to technical talks. One of the speakers at this event, Kevin Tuei, an AWS …

AWS Weekly Roundup: S3 Conditional writes, AWS Lambda, JAWS Pankration, and more (August 26, 2024) Read More »

Salesforce AI Data Protection: Why Backup Matters

Salesforce, the CRM powerhouse, is embracing the AI revolution with open arms. Einstein, Salesforce’s AI engine, is transforming how businesses analyze customer data, personalize experiences, and automate processes. With this exciting frontier comes a critical question: How do you protect your AI investment? In this blog post, we’ll cover the symbiotic relationship between data, AI, …

Salesforce AI Data Protection: Why Backup Matters Read More »

Government Data Protection: Challenges and Modernization Strategies

The U.S. Department of Defense (DoD) and civilian government agencies are mandated to protect government data in transit and at rest across their networks and IT ecosystems. While current data governance, risk, and compliance (GRC) strategies address common cybersecurity issues, CIOs continue to be challenged by: IT ecosystem complexity; an evolving threat landscape; growing data …

Government Data Protection: Challenges and Modernization Strategies Read More »

Now open — AWS Asia Pacific (Malaysia) Region

In March of last year, Jeff Barr announced the plan for an AWS Region in Malaysia. Today, I’m pleased to share the general availability of the AWS Asia Pacific (Malaysia) Region with three Availability Zones and API name ap-southeast-5. The AWS Asia Pacific (Malaysia) Region is the first infrastructure Region in Malaysia and the thirteenth Region in Asia Pacific, …

Now open — AWS Asia Pacific (Malaysia) Region Read More »

Kubernetes Compliance: NIST Cybersecurity Framework 2.0 Guide

Kubernetes has revolutionized how organizations develop and deploy applications by offering scalability, flexibility, and efficiency. However, the dynamic and distributed nature of Kubernetes environments introduces unique security and compliance challenges too. To address these challenges, organizations must better understand, manage, and reduce their cybersecurity risk and protect their networks and data. To help organizations do …

Kubernetes Compliance: NIST Cybersecurity Framework 2.0 Guide Read More »

Enterprise Ransomware Protection

Ransomware attacks are a significant threat to enterprises worldwide. These malicious attacks can cripple an organization, leading to halt operations, data loss, financial damage, and a tarnished reputation. To combat this growing menace, strong and unyielding enterprise ransomware protection strategies are essential. This blog post delves into effective measures for safeguarding your business against ransomware …

Enterprise Ransomware Protection Read More »

Scroll to Top