AWS Weekly Roundup: Kiro CLI latest features, AWS European Sovereign Cloud, EC2 X8i instances, and more (January 19, 2026)

At the end of 2025 I was happy to take a long break to enjoy the incredible summers that the southern hemisphere provides. I’m back and writing my first post…

Continue ReadingAWS Weekly Roundup: Kiro CLI latest features, AWS European Sovereign Cloud, EC2 X8i instances, and more (January 19, 2026)

Amazon EC2 X8i instances powered by custom Intel Xeon 6 processors are generally available for memory-intensive workloads

Since a preview launch at AWS re:Invent 2025, we’re announcing the general availability of new memory-optimized Amazon Elastic Compute Cloud (Amazon EC2) X8i instances. These instances are powered by custom…

Continue ReadingAmazon EC2 X8i instances powered by custom Intel Xeon 6 processors are generally available for memory-intensive workloads

Why Kubernetes Security, Compliance, and Observability Need a New Mindset

Kubernetes is everywhere; it’s the de facto orchestration layer for modern infrastructure. Thanks to its scalability, declarative management, and ability to dynamically allocate resources across heterogeneous environments, Kubernetes powers everything…

Continue ReadingWhy Kubernetes Security, Compliance, and Observability Need a New Mindset

Proxmox High Availability: Ensuring Always‑On Virtualization with Veeam

TL;DR – Key Takeaways Proxmox High Availability (HA) automatically restarts virtual machines on healthy nodes when failures occur, keeping workloads online with minimal disruption. Even brief outages can impact operations and customer trust.HA ensures critical services…

Continue ReadingProxmox High Availability: Ensuring Always‑On Virtualization with Veeam

Top Security Awareness Training Topics Every Company Should Cover

Key Takeaways: Security awareness training builds human resilience, not just compliance. Teach employees to spot manipulation, urgency, authority, and traps before they click. Phishing and social engineering dominate breaches. Train teams to pause, verify, and report suspicious messages to strengthen…

Continue ReadingTop Security Awareness Training Topics Every Company Should Cover