menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cloud News

Cloud News

source image

Tech Radar

2d

read

118

img
dot

Image Credit: Tech Radar

Google Whisk is a new way to create AI visuals using image prompts –here's how to try it

  • Google Whisk is a new AI tool for creating visuals using image prompts.
  • It allows users to input three image prompts - one for subject, one for scene, and one for style.
  • Whisk analyzes the input images and generates matching images based on the prompts.
  • The tool is free to try and aims to provide a more intuitive way for visual creators to explore and remix their ideas.

Read Full Article

like

7 Likes

source image

Dev

2d

read

15

img
dot

Image Credit: Dev

Amazon Q Developer Tips: No.22 Amazon Q Keyboard shortcuts

  • Tip number 22 talks about keyboard shortcuts that can be used with Amazon Q Developer to enhance the developer experience.
  • Using keyboard shortcuts can give quick access to every feature.
  • On Windows, replace COMMAND + OPTION with CTRL + ALT.
  • Shortcuts in use:
  • COMMAND + OPTION + I - moves the cursor focus to the Amazon Q Developer chat window.
  • COMMAND + OPTION + E - Explain
  • COMMAND + OPTION + F - Fix
  • COMMAND + OPTION + A - Optimise
  • COMMAND + OPTION + U - Refactor
  • COMMAND + OPTION + Q - Send to prompt
  • COMMAND + OPTION + T - Generate tests
  • The post also shares how to view the complete list of Amazon Q keyboard shortcuts.
  • It is also possible to update the keyboard shortcuts.
  • This post shares tips and tricks to help Amazon Q developers with their day to day workflows.

Read Full Article

like

Like

source image

Medium

3d

read

230

img
dot

Image Credit: Medium

Let's talk about Elastic compute cloud (Ec2) instances of Amazon.

  • To generate an EC2 instance, sign in to the AWS Management Console and navigate to the EC2 service.
  • Choose an operating system, select the instance type, configure the instance with desired resources, add storage, and configure security groups.
  • Review the configurations and launch the instance, then access it using SSH or Remote Desktop.
  • EC2 instances offer scalability, diverse instance types, elastic IPs, pay-as-you-go pricing, customizable networking, spot instances, persistent storage options, and security features.

Read Full Article

like

13 Likes

source image

Dev

3d

read

335

img
dot

Image Credit: Dev

60-Second Series - Amazon EFS: Elastic File Storage Simplified

  • Amazon EFS is a serverless and elastic file system that automatically adjusts to changing data.
  • It eliminates the need for upfront storage provisioning and seamlessly integrates with existing applications.
  • Key features include scalability, cost-efficiency, performance options, and multi-AZ availability.
  • It is secure, integrates with AWS services, and offers lifecycle management for data storage.

Read Full Article

like

20 Likes

source image

Dev

3d

read

239

img
dot

Image Credit: Dev

60-Second Series - Amazon S3: The Simple Storage Solution for Your Data Needs

  • Amazon S3 is a cloud-based object storage service designed for durability, scalability, and flexibility.
  • It offers unlimited storage capacity and various storage classes for different needs.
  • S3 is commonly used for static website hosting, data backup, data lakes, and content distribution.
  • Key features include object lock, lifecycle policies, and seamless integration with other AWS services.

Read Full Article

like

14 Likes

source image

Dev

3d

read

334

img
dot

Image Credit: Dev

AWS Serverless: Develop, Test, and Deploy with AWS Lambda's New Code Editor and SAM template

  • AWS Lambda introduced a significant update to the Lambda code editor in the console in 2024.
  • New editor is built on the open-source foundation of Visual Studio Code (VS Code).
  • Lambda code editor replicates the features and workflow of your desktop environment.
  • Key updates include enhancements to the code editor, improved configurations, and streamlined function deployment/testing processes.
  • Download the AWS SAM or CloudFormation template for your Lambda function to continue development in your preferred IDE.
  • The updated AWS Lambda console introduces several exciting features designed to enhance the developer experience.
  • The Lambda code editor allows users to update the code and configure test events before deployment and validation.
  • Lambda function can be built, validated and tested using SAM commands
  • After validating locally, developers can deploy their function to an AWS cloud region
  • This article highlights the effectiveness of the updated Lambda code editor to develop, test, and deploy a Lambda function.

Read Full Article

like

20 Likes

source image

Dev

3d

read

235

img
dot

Image Credit: Dev

Build a Conversational Generative AI Assistant Using Amazon Q Business – A Step-by-Step Guide

  • This article discusses how to create a conversational generative AI application for employees using Amazon Q Business application.
  • Amazon Q Business empowers employees to be efficient and productive by answering questions from enterprise content, backed up with citations and references.
  • The article outlines the process of how Amazon Q Business works from query retrieval to response delivery and provides a number of AWS tools and resources to deploy an Amazon Q Business application.
  • The article includes a bonus section on creating a plugin for the Amazon Q Business application for seamless interaction with external services and systems.
  • Amazon Q Business ensures that authorized user access enterprise content securely according to their permissions.
  • Amazon Kendra is an external indexing tool that can be used for users who require advanced search features.
  • The article also explains that users can utilize generative AI models, such as Amazon Bedrock or proprietary large language models, to generate emails based on enterprise-specific tasks.
  • The article provides a detailed guide on how to create an Amazon Q Business application, configure a retriever, connect data sources, and deploy a web experience using AWS IAM Identity Center.
  • The article also includes steps to configure a web crawler connector and an Amazon S3 connector and explains how to configure synchronization settings.
  • The bonus content provides an API Schema in YAML for use with the Amazon Q Business Plugin and explains how to create a plugin that interacting with external services and systems.

Read Full Article

like

14 Likes

source image

Tech Radar

3d

read

11

img
dot

Image Credit: Tech Radar

NYT Strands today — my hints, answers and spangram for Sunday, December 22 (game #294)

  • NYT Strands is the latest word game introduced by The New York Times.
  • The hints for today's NYT Strands game #294 include the theme, clue words, spangram hint, and spangram position.
  • The theme of today's NYT Strands is 'Are you listening?'
  • The clue words for today's game are WINK, RING, KING, WREN, RENT, and ANGEL.

Read Full Article

like

Like

source image

Tech Radar

3d

read

231

img
dot

Image Credit: Tech Radar

Quordle today – my hints and answers for Sunday, December 22 (game #1063)

  • Quordle is one of the Wordle alternatives and has reached over 1,000 games.
  • Today's Quordle game #1063 has 5 different vowels.
  • There are 2 Quordle answers that contain repeated letters.
  • None of the letters Q, Z, X, or J appear in today's Quordle answers.

Read Full Article

like

13 Likes

source image

Dev

3d

read

27

img
dot

Image Credit: Dev

AWS Security Considerations by Industry: Finance, Healthcare, and Beyond...

  • Amazon Web Services (AWS) offers a comprehensive suite of security tools and services to help businesses protect their sensitive data and maintain compliance with industry regulations.
  • Each industry has its own regulatory requirements, data sensitivity levels, and threat landscapes. Consequently, security strategies must be tailored to address these unique challenges.
  • In finance, data breaches can lead to severe financial losses and regulatory penalties, while in healthcare, unauthorized access to patient data can harm individuals and breach compliance with laws like HIPAA.
  • AWS provides various compliance certifications and attestations that can help financial institutions meet regulatory obligations, such as the Gramm-Leach-Bliley Act and the Payment Card Industry Data Security Standard. Healthcare providers must sign a Business Associate Agreement with AWS to ensure compliance.
  • Financial organizations must protect sensitive data, including personally identifiable information (PII) and financial records. AWS offers encryption options for data at rest and in transit. Services like AWS Key Management Service (KMS) and AWS CloudHSM can assist in managing encryption keys securely.
  • Controlling access to sensitive financial data is crucial. AWS Identity and Access Management (IAM) allows organizations to define user roles, assign permissions, and implement multi-factor authentication (MFA) to enhance security. In healthcare industry, secure communication channels are essential.
  • Organizations across different industries should establish incident response plans and conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry regulations. Leverage AWS Security Tools: Utilize AWS security services like AWS Shield for DDoS protection and AWS Config for resource compliance tracking.
  • At MedSecure Health, a regional healthcare provider, the team resolved security issues before migrating to AWS cloud services. They implemented end-to-end encryption, set up AWS Key Management Service (KMS), and AWS Identity and Access Management (IAM) to enforce strict access controls, ensuring that only authorized personnel could access sensitive information.
  • In a rapidly evolving digital landscape, prioritizing security is a fundamental component of building trust and ensuring the integrity of critical operations in finance, healthcare, and beyond.
  • By leveraging AWS’s robust security tools and adhering to best practices, organizations can effectively protect sensitive data, maintain compliance with regulations, and mitigate risks associated with cyber threats.

Read Full Article

like

1 Like

source image

Dev

3d

read

76

img
dot

Image Credit: Dev

How to run llama 405b bf16 with gh200s

  • Lambda labs has half-off GH200s right now to get more people used to the ARM tooling.
  • Llama 405b is about 750GB so you want about 10 96GB GPUS to run it.
  • We'll be putting the python environment and the model weights in the NFS.
  • You need torch, triton, and flash-attention.
  • We can speed up the model download by having each server download part.
  • Ray provides a dashboard (similar to nvidia-smi) at http://localhost:8265.
  • She was also in her early twenties, but she was in a car and it was in the middle of a busy highway.
  • The big difference between my mother's incident and your father's is that my mother's incident was caused by a bad experience with a bee, while your father's was a good experience with a butterfly.
  • I think you have a great point, though, that experiences in our lives shape who.
  • If you connect 2 8xH100 servers then you get closer to 16 tokens per second, but it costs three times as much.

Read Full Article

like

4 Likes

source image

Dev

3d

read

268

img
dot

Image Credit: Dev

AWS ECR Made Easy: Securely Store and Manage Your Container Images

  • Amazon Elastic Container Registry (ECR) is a fully managed container registry service by AWS, providing a secure, scalable, and integrated solution for storing and managing container images.
  • ECR integrates with AWS Identity and Access Management (IAM) to control access to your images, works seamlessly with AWS services like ECS, EKS, and AWS Fargate, and provides high availability and durability for container images.
  • Compared to Docker Hub, ECR offers deeper AWS integration, built-in image scanning, and robust IAM controls. Private and Public Repositories, Image Scanning, Lifecycle Policies, and Encryption are some of the key features of Amazon ECR. It provides tight AWS integration (ECS, EKS, Fargate, CodeBuild) and is popular with a broad ecosystem (CI/CD tools, etc.).
  • To illustrate ECR’s versatility, examples include storing proprietary microservices images securely, sharing a popular Node.js library as a Docker image, and complying with security standards and reducing storage costs.
  • Step-by-Step instructions to get started with ECR include Creating an ECR Repository, Authenticating Docker to Your ECR Registry, and Pulling and Pushing Images in ECR.
  • Amazon ECR provides a secure, scalable, and highly integrated container registry for AWS-centric workflows. By combining ECR with AWS ECS or EKS, you can streamline your entire container pipeline.
  • ECR is ideal for those that need a special, secure storage room to keep container images neat and organized. ECR serves as a perfect system for organizing everything.
  • Troubleshooting tips when encountering problems with ECR include double-checking AWS account ID and region, ensuring the correct ECR permissions are enabled, and updating IAM policy.
  • ECR is best suited for storage and management of container images in AWS-centric workflows, while Docker Hub is flexible for multi-cloud or smaller personal projects.
  • Day 5 will explore deploying a Multi-Container App in Amazon ECS and more.

Read Full Article

like

16 Likes

source image

Tech Radar

3d

read

36

img
dot

Image Credit: Tech Radar

Fake parcel delivery texts are the fastest-growing phishing scam this holiday season – here’s how to avoid them

  • Fake parcel delivery alerts sent by text are the fastest-growing phishing scam this festive season, according to UK bank NatWest.
  • Fraudulent messages claim to come from courier services stating that delivery has been attempted and needs to be rescheduled, prompting a link.
  • The embedded link leads to a phishing website that looks legitimate which prompts payment for redelivery and asks for personal details including login credentials or credit card information.
  • FedEx, DHL and UPS are commonly impersonated, fooling people who regularly receive delivery alerts and making SMS messages easy to fake as they contain fewer words and lack a logo.
  • The scam creates a sense of urgency and relies on emotional manipulation because packages may contain gifts for loved ones during the festive season.
  • Fraud expert, Stuart Skinner from NatWest recommends people to stop, think and check before clicking on any link.
  • Look for tell-tale signs such as urgent requests for personal information and inconsistencies in the message.
  • Courier services recommend going directly to their website to check tracking numbers rather than submitting personal or financial information through unsolicited emails, texts or mails.
  • People who are unsure about the validity of messages are advised to not click on any links for redelivery or report suspicious messages.
  • This scam is particularly effective during the festive season, not just because of the high volume of expected deliveries but also because people are more vulnerable to emotional manipulation.

Read Full Article

like

2 Likes

source image

Dev

3d

read

56

img
dot

Image Credit: Dev

The Cloud-Native Revolution: A Beginner's Guide to Building the Future in 2025

  • Cloud-native is designing, building, and running applications that fully embrace the capabilities of cloud computing. It is scalable, resilient, and agile. Companies like Netflix, Uber, and Spotify have already adopted it and use microservices, Kubernetes, containerization, and CI/CD practices. Cloud-native systems allow businesses to scale dynamically, recover automatically, deploy updates without downtime, and optimize resource usage by using pay-as-you-go models. It has become a necessity for businesses to stay competitive in today's digital-first world. To get started, learn the basics of cloud computing, master containers and Kubernetes, build CI/CD pipelines, implement observability, adopt a DevOps culture, shift left security, use Infrastructure as Code, and focus on resilience.
  • Examples of cloud-native in action include Netflix, which handles over 200 million users worldwide, Uber which relies on cloud-native principles to match millions of drivers and riders in real-time, and Spotify which uses Kubernetes to manage its music streaming services. TO work on real-world projects, build cloud-native applications and deploy them on the public cloud.
  • The pillars of cloud-native are Containers, Kubernetes, Microservices, CI/CD, and Observability. Containers are like lunchboxes for your applications, Kubernetes is like a traffic controller for containers, microservices are breaking apps into smaller, independent services, CI/CD is automating code integration and deployment, and Observability is monitoring system health and performance.
  • To get started with cloud-native, understand IaaS, PaaS, and SaaS, explore cloud platforms, install Docker and create containers, master Kubernetes, build a CI/CD pipeline, set up monitoring tools, and create dashboards.
  • Best practices for cloud-native development include adopting a DevOps culture, shifting left security, using Infrastructure as Code, focusing on resilience, and staying updated with CNCF.

Read Full Article

like

3 Likes

source image

Siliconangle

3d

read

348

img
dot

Image Credit: Siliconangle

The yellow brick road to agentic AI

  • Agentic AI requires a strong data foundation built upon cloud-like scalability, a unified metadata model, and harmonized data and business process logic.
  • Agentic automation is expected to become a reality within the next decade and will require a reinvention of the software stack.
  • The enterprise software stack is changing, and there is a shift from control at the database layer toward the governance catalog using operational metadata.
  • To achieve true automation in agentic AI, it's crucial to have harmonized process logic that enables agents to communicate across the entire customer journey.
  • The future of agentic AI will involve harmonizing end-to-end business processes to ensure that agents and humans collaborate effectively and share a common understanding.
  • Data platforms such as Snowflake and Databricks, organizations such as Palantir and Salesforce, and vendors like Google, Microsoft, and UiPath Inc. are leading the way to agentic automation.
  • The process of achieving agentic automation involves creating new infrastructure layers, incorporating genuine harmonization, and avoiding the trap of superficial bolt-ons.
  • Achieving the vision of agentic automation will take time, persistence, and focusing on the pieces that do not yet exist in the enterprise software stack.
  • The opportunity is to reinvent the application stack and not perpetuate the status quo by bolting agents onto existing legacy architectures.
  • The agentic future that delivers a 10x productivity gain hinges on harmonizing end-to-end business processes and ensuring that agents and humans collaborate effectively and share a common understanding.

Read Full Article

like

20 Likes

For uninterrupted reading, download the app