Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Joe Gardner
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Can someone explain how Amazon Kinesis Data Firehose is different from Amazon Kinesis Data Streams?
On
Orchestrate data ingestion pipelines (batch-based ML workloads and streaming-based ML workloads) – Amazon Kinesis , Amazon Kinesis Data Firehose , Amazon EMR , AWS Glue , Amazon Managed Service for Apache Flink
Very informative. Thanks for sharing!
On
Recovery time objectives (RTOs) and recovery point objectives (RPOs)
I have a question about the standards ASFF adheres to. Are they well-defined and consistently followed across AWS services?
On
AWS Security Finding Format (ASFF)
Thank you for this informative post!
On
Implementing infrastructure patterns, governance controls, and security standards into reusable IaC templates (for example, AWS Service Catalog, CloudFormation modules, AWS CDK)
Appreciate the detailed explanation about Amazon DynamoDB!
On
Databases (for example, Amazon DynamoDB, Amazon OpenSearch Service, Amazon RDS, self-managed databases on Amazon EC2)
For those new to streaming data with Amazon Kinesis, the blog post provides a great starting point. Thanks!
On
Orchestrate data ingestion pipelines (batch-based ML workloads and streaming-based ML workloads) – Amazon Kinesis , Amazon Kinesis Data Firehose , Amazon EMR , AWS Glue , Amazon Managed Service for Apache Flink
I heard alias records also support certain third-party services. Can anyone confirm?
On
Amazon Route 53 features (for example, alias records, traffic policies, resolvers, health checks)
How does AWS Config differ from Amazon CloudWatch?
On
Methods and strategies to interact with the AWS software-defined infrastructure
How do we set up logging for ALB?
On
Integrating load balancers with existing application deployments
Not all organizations have the same security budget. What cost-effective solutions would you recommend?
On
Selecting appropriate edge services based on anticipated threats and attacks (for example, OWASP Top 10, DDoS)
load more comments
Search for:
x