menu
techminis

A naukri.com initiative

google-web-stories
Home

>

Cloud News

Cloud News

source image

Tech Radar

4w

read

408

img
dot

Image Credit: Tech Radar

ChatGPT's new customization options are exactly what I've been waiting for to make my chats more personal

  • OpenAI has introduced new customization features to ChatGPT.
  • Users can customize how ChatGPT responds and tailor information to their profession.
  • The customization options include choosing traits, providing personal information, and specifying how ChatGPT should address you.
  • More exciting updates are expected in 2025, including an AI Agent from ChatGPT.

Read Full Article

like

24 Likes

source image

Medium

4w

read

208

img
dot

Image Credit: Medium

AWS vs Microsoft Azure for Chatbot Development: Can a Hybrid Approach Be the Right Solution?

  • AWS offers a range of tools tailored for different chatbot needs like Amazon Lex for natural language understanding to Step Functions for workflow automation.
  • Amazon Translate steps in to handle multilingual queries and capture responses in customers language.
  • With AWS, developers focus on building chatbot logic without worrying about infrastructure management.
  • Azure is designed for scenarios where conversational accuracy and context matter the most.
  • Tools like LUIS (Language Understanding Intelligent Service) and Azure Cognitive Services integrate seamlessly with broader Microsoft ecosystem.
  • Azure's Cognitive Services analyze inputs and recommends personalized outputs.
  • Combining AWS’s backend power with Azure’s conversational smarts creates a robust, flexible chatbot.
  • Hybrid models ensure your chatbot delivers exceptional user experiences.
  • AI agents allow chatbots to perform more dynamic tasks by leveraging multiple tools and communicating with each other seamlessly.
  • Stay tuned for a practical use case study that showcases the true potential of these AI-driven ecosystems.

Read Full Article

like

12 Likes

source image

Dev

4w

read

93

img
dot

Image Credit: Dev

Effortless File Transfers (SFTP) with AWS Transfer Family and S3: A Step-by-Step Guide

  • AWS Transfer Family and S3 Bucket provide an easy, secure and efficient way to transfer files into and out of AWS storage services.
  • AWS Transfer Family is a fully-managed service that enables file transfers over SFTP, FTPS, and FTP.
  • SFTP helps in secure file transfer of critical data, including billing information, financial records, and data recovery files.
  • AWS Transfer Family is a hassle-free service that efficiently handles file transfer operations and reduces operational overhead.
  • AWS Transfer Family can seamlessly integrate with other AWS services like S3 Buckets and IAM.
  • Combining AWS Transfer Family and S3 Buckets provides an effortless, secure, and cost-effective solution for file transfer.
  • Amazon S3 offers 99.99% durability and high availability, making it a highly protected and accessible storage solution.
  • SFTP users can be configured to access only the data they are authorized to see using AWS IAM.
  • Configuring AWS Transfer Family with S3 Buckets is easy, and it can be done using a few simple steps.
  • Organizations can optimize their file transfer process and seek further insights into AWS solutions by reaching out to Stackgenie's AWS specialists.

Read Full Article

like

5 Likes

source image

Tech Radar

4w

read

355

img
dot

Image Credit: Tech Radar

Fresh Nvidia RTX 5090 and 5080 stock rumors again suggest that next-gen GPUs will not be easy to buy

  • Fresh rumors suggest that Nvidia's RTX 5000 graphics cards could be in short supply when these next-gen GPUs first arrive.
  • Moore’s Law is Dead (MLID) discusses the subject of Blackwell stock and RTX 5090 is looking very shaky indeed for its amount of launch stock.
  • The news doesn’t sound all that much better for the RTX 5080.
  • Theoretical allocation of around 20 for the RTX 5080 graphics cards is for the first month of sales and nothing for flagship RTX 5090.
  • Supply is a ‘fraction’ of that seen with the RTX 4080, although this source doesn’t estimate it’ll be quite as bad as a tenth – more like a third to half of that seen with the RTX 4080.
  • The RTX 5090 is looking like it’ll be ‘very rare’ but that the RTX 5080 seemingly has ‘okay’ stock levels, for the graphics card’s initial launch anyway.
  • Multiple insiders have chimed in here and there’s some mixed chatter here for the RTX 5080, and some indications of stronger stock levels.
  • Nvidia might not want to prioritize RTX 5090 stock for its own boards or third-party graphics cards.
  • There’s no solid evidence what will be the stock levels of Founders Edition.
  • Reports hint at difficulty in getting Nvidia's next-gen GPUs at launch.

Read Full Article

like

21 Likes

source image

Dbi-Services

4w

read

412

img
dot

Image Credit: Dbi-Services

Creating your private cloud using OpenStack – (3) – Keystone, the Identity Service

  • Keystone, the Identity Service in OpenStack provides an API to deal with authentication and service discovery. It combines multiple services that expose endpoints.
  • Installation begins by setting up a message queue - RabbitMQ, used by OpenStack to coordinate operations among services.
  • Keystone requires Memcached as a token cache, etcd as a distributed configuration store, and a PostgreSQL database to store configurations.
  • Bootstrap Keystone with the admin user and project, roles, and a region using a token provider and backend configuration.
  • Configure Apache HTTP server with WSGI and create symbolic links to wsgi-keystone.conf files.
  • Keystone requires a small environment script to set environment variables.
  • By sourcing the admin environment script and requesting a token, authentication is processed without needing a password.
  • This article demonstrates how to install Keystone and its dependencies, create the admin user, and configure Apache on the controller node.
  • In the next article, the Image (Glance) and the Placement service will be set up.
  • The installation covers multiple services that will all run on the controller node.

Read Full Article

like

24 Likes

source image

Tech Radar

4w

read

297

img
dot

Image Credit: Tech Radar

Huge Apple Intelligence upgrade expected for Mail as part of macOS Sequoia 15.4 free update

  • Mac users can expect a major upgrade to the Mail app in macOS Sequoia 15.4.
  • The upgrade will bring Apple Intelligence features to prioritize, categorize, and summarize emails.
  • The iOS Mail app already has these features, and now Mac users will get the same benefits.
  • macOS Sequoia 15.4 is expected to be released in April.

Read Full Article

like

17 Likes

source image

Dev

4w

read

377

img
dot

Image Credit: Dev

Amazon Q Developer transform for .NET

  • Amazon Q Developer introduced a code transformation agent for Java when launched in preview back in November 2023.
  • Amazon Q has announced the public preview of new transformation capabilities for .NET, mainframe, and VMware workloads was announced, allowing upgrading applications to modern and supported versions of programming languages, libraries, and frameworks.
  • IT professionals can utilise this tool where existing applications are left untouched until they become unsupported with all kinds of inherent vulnerabilities.
  • This transformation capability is available in the Visual Studio IDE, but also available via the Amazon Q Developer transformation web experience to enable easy porting of .NET Framework Applications to .NET.
  • Amazon Q analyses all of the repositories it has access to, discover which ones run a .NET Framework application that is capable of being transformed, then automatically ports the .NET application to the target version in line with the transformation plan it has created.
  • The tool currently does not support WebUI, SQLServer and ASP.NET types of jobs that Amazon Q cannot currently transform.
  • The web experience gives you the option of carrying out a .NET transform of multiple repositories.
  • The transformation capability lets IT professionals to modernise .NET applications to cross-platform .NET, migrate VMware applications to Amazon ECS, and perform the mainframe modernisation (z/os to AWS).
  • If you have existing .NET Framework applications that you want to improve for cross-platform support, it is definitely worth giving this feature a try.

Read Full Article

like

22 Likes

source image

Medium

4w

read

168

img
dot

Image Credit: Medium

Processing 1 PB of Data: A Scalable Azure Architecture for AI Model Training

  • To process 1 PB of raw data for AI model training, a scalable Azure architecture is used.
  • Azure Blob Storage is chosen for its scalability, cost-effectiveness, and support for parallel access to files.
  • Azure Data Factory (ADF) orchestrates the data processing workflow efficiently.
  • Azure Batch enables parallel processing with high computational power, processing 1,000 files every 15 seconds using 1,000 VMs.

Read Full Article

like

10 Likes

source image

Dev

4w

read

190

img
dot

Image Credit: Dev

Automatic deletion of unused AWS ECR container images for multi-account AWS ECS services

  • AWS Elastic Container Service (ECS) is often used as a platform for Microservices on AWS.
  • Unused container images in AWS Elastic Container Registry (ECR) can accumulate and result in wasted space and costs.
  • An automated approach is presented to automatically clean up ECR repositories, removing old images not used by ECS services.
  • The solution leverages AWS Config Aggregator, EventBridge, and EventBridge Scheduler to efficiently manage image deletion based on active ECS tasks.

Read Full Article

like

11 Likes

source image

Dev

4w

read

341

img
dot

Image Credit: Dev

Your Guide to AWS Programs and Communities

  • AWS provides programs and communities to support individuals and organizations in their cloud journey.
  • AWS Educate is designed for students and beginners to develop essential technical skills and get hands-on experience.
  • AWS Skill Builder platform offers over 600 free self-paced courses, exams, digital classrooms, and labs for learning AWS.
  • AWS Academy offers cloud computing courses to students and educators with curricula designed by AWS experts.
  • AWS Cloud Institute is a virtual training program that offers a comprehensive curriculum to help individuals launch a career as cloud developers.
  • AWS re/Start is a workforce development training program for underemployed or unemployed individuals looking to start a cloud career.
  • AWS Emerging Talent Community is a program for students who successfully complete an AWS Education Program to access AWS Certification prep resources, mentorship opportunities, and 50% discount vouchers for AWS Certification exams.
  • AWS Talent Community Program connects individuals with AWS recruiters and career advice to help them succeed in cloud computing careers.
  • AWS Cloud Clubs are student-led groups supported by AWS, providing opportunities to learn about AWS services, organize hackathons and attend events.
  • AWS User Groups are community-led groups and a forum for AWS professionals and enthusiasts to share knowledge and network.

Read Full Article

like

20 Likes

source image

Damienbod

4w

read

204

img
dot

Image Credit: Damienbod

ASP.NET Core user application access token management

  • This article discusses application access token management in an ASP.NET Core web application.
  • The article explains the use of OAuth client credential flow to generate an application access token.
  • It highlights the properties of an effective token management system like secure token storage, token expiration, and handling invalid or missing access tokens.
  • The article provides an implementation example using ApplicationAccessTokenCache and ApplicationUsersService class.
  • The service is registered as a singleton and runs once for the whole application.
  • The article adds required services in the program file for application access token management.
  • The token cache is designed for an in-memory cache but can be persisted in a safe way using a persistent cache.
  • The access token is persisted per application and the solution must work for multiple instances when deployed to multi-instance deployments.
  • The article also provides links to different strategies to implement token management in ASP.NET Core web applications.
  • The article concludes by stating the importance of token management in ASP.NET Core web applications.

Read Full Article

like

12 Likes

source image

Dev

4w

read

177

img
dot

Image Credit: Dev

Configuring Virtual Network Peering in Azure

  • Virtual network peering enables us to connect two or more virtual networks in Azure, whether they are in the same Azure region or not. The traffic between peered virtual networks is private, and they appear as one for connectivity purposes.
  • Azure supports two types of virtual network peering- Virtual Network Peering and Global virtual network peering. Virtual Network Peering is where you connect virtual networks within the same Azure region. Global virtual network peering is where you connect virtual networks across Azure regions.
  • Virtual network peering gives us a low-latency, high-bandwidth connection between Azure resources that are deployed between different virtual networks. It gives us the ability to securely transfer data between between virtual networks across Azure subscriptions, regions, even Microsoft Entra tenants.
  • Peering doesn't inflict any extract restrictions on bandwidth within the peering. We can apply network security groups (NSGs) in either virtual network to block access to other virtual networks or subnets.
  • After peering, one can resize the address space of virtual networks without incurring any downtime. This works for both IPv4 and IPv6 address spaces.
  • We can use service chaining to direct traffic from one virtual network to a gateway or virtual appliance and vice versa. This helps in deploying hub-and-spoke networks.
  • Peering between virtual networks allows the next hop in a User Defined Route (UDR) to be the IP address of a virtual machine in the peered virtual network or a VPN gateway. We can't do this if the UDR specifies that the next hop is an Azure ExpressRoute gateway.
  • If virtual networks are peered globally, resources in one virtual network won't be able to communicate with the frontend IP address of a basic load balancer (whether it's public or internal). Services that use a basic load balancer won't work over global virtual network peering.
  • In summary, with just a few lines of Bicep, you can create two virtual networks and configure regional VNet peering between them so that resources in one virtual network can communicate with resources in the other without doing so over the public internet.
  • Understanding how peering works in Azure virtual networks is important, especially when it comes to designing landing zones and figuring out how various resources across different networks, subscriptions, regions etc. will communicate with each other safely.

Read Full Article

like

10 Likes

source image

Dev

4w

read

71

img
dot

Image Credit: Dev

Microsoft Certifications: Unlock Your Path to Tech Success

  • Microsoft Learning offers a wide range of courses on popular skills such as Dynamics 365, Microsoft Azure, M365, and Power Platform.
  • Microsoft certifications are widely recognized and enhance qualifications, showcasing knowledge and dedication to staying current.
  • Many Microsoft courses focus on hands-on, practical learning, providing job-ready skills for data analysts, cloud engineers, and app developers.
  • The courses are flexible and modular, allowing learners to complete them at their own pace.

Read Full Article

like

4 Likes

source image

Serverless360

4w

read

17

img
dot

Image Credit: Serverless360

25 Azure Cost Optimization Best Practices to Reduce Azure Cost

  • This article explains what azure cost optimization is and why it is important to monitor usage of resources and the expenses incurred. It also provides 25 strategies and best practices that can be implemented to optimize cost on Azure. The article mentions rightsizing of virtual machines and storage, using reserved instances and automatic scaling to adjust resource capacity, and spot VMs for non-critical workloads. It also advises monitoring costs and acting on unintentional spikes regularly, consolidating subscriptions, and implementing role-based access control. Additionally, it recommends reviewing third-party tools, scheduling resource shutdowns, and regularly reviewing licensing options.
  • The article highlights the need for identifying and reallocating idle resources, understanding resources by tagging and grouping, and monitoring costs and acting on unintentional spikes. It also suggests monitoring costs and acting on unintentional spikes, consolidating subscriptions, and implementing role-based access control to optimize cost and prevent unauthorized resource provisioning.
  • Understanding the resources by tagging and grouping can help in cleaning up the resources related to a new solution and managing Azure subscriptions across an organization. Consolidated subscriptions often qualify for volume discounts, reducing the total expenditure. The article advises that rightsizing virtual machines and storage configurations based on needs, using Azure's reserved offer, implementing automatic scaling policies, and using spot VMs are effective cost optimization strategies.
  • The article also highlights using test pricing, enabling Azure hybrid benefit, optimizing SQL database costs, and implementing role-based access control. Regularly auditing resource usage, scheduling resource shutdowns, and regularly reviewing licensing options can help reduce costs too.
  • Azure cost optimization is a continuous process that needs regular monitoring and auditing. The article suggests that breaking down costs into something meaningful is crucial to get full control of the Azure cost. The Turbo360 Azure Cost Analyzer is a tool that enables organizations to tackle this problem from both sides by creating all-around better experiences.

Read Full Article

like

1 Like

source image

Dev

4w

read

155

img
dot

Image Credit: Dev

Encrypting EBS Volumes of Amazon EC2 Instances Using Python

  • The account has hundreds of EC2 instances with EBS volumes that are encrypted with the KMS AWS managed key aws/ebs.
  • The need to encrypt or re-encrypt EBS volumes is not uncommon, so someone would have developed tools and scripts for it.
  • To encrypt or re-encrypt an EBS volume that is attached to an EC2 instance, create a snapshot of the volume, create a new volume from the previously created snapshot, detach the original volume from EC2 instance, attach a new volume to EC2 instance with same device name as above.
  • Given Boto3 and Python are part of my preferred toolset, I decided to leverage the aws_volume_encryption solution as my starting point.
  • Although developed years ago, the original script remains fully functional, proving its reliability.
  • The original volume still exits and have some metadata tags added by the script for traceability.
  • With this improved script, you can (re-)encrypt EBS volumes of any EC2 instance with ease.
  • If you are encrypting volumes for many instances, you can write another script that reads a CSV file containing EC2 instance information and runs volume_encryption.py on multiple instances in parallel.
  • This demonstrates how automation and generative AI empower DevOps engineers to tackle complex challenges efficiently.
  • If your organization’s security policies require that EBS volumes be encrypted, consider using the Amazon EBS encryption by default feature to automatically encrypt any new EBS volumes.

Read Full Article

like

9 Likes

For uninterrupted reading, download the app