Using Amazon MQ for RabbitMQ as an event source for Lambda

By Dustin Ward

AWS FeedUsing Amazon MQ for RabbitMQ as an event source for Lambda Amazon MQ for RabbitMQ (ARMQ) is an AWS managed version of RabbitMQ. The service manages the provisioning, setup, and maintenance of RabbitMQ, reducing operational overhead for companies. Now, with ARMQ as an event source for AWS Lambda, you can process messages from the service.…

Why a Cloud Automated Operation Model is Key for Enterprises Moving to AWS

By Dustin Ward

AWS FeedWhy a Cloud Automated Operation Model is Key for Enterprises Moving to AWS By Juan Alvarez, Cloud Sr. Advisor – DXC TechnologyBy Diego Garcia, Manager, Partner Solutions Architect – AWSBy Pierre Merle, Partner Solutions Architect – AWS A transformation step is key to achieving the cloud strategy benefits for organizations moving or implementing workloads…

Get started with Flink SQL APIs in Amazon Kinesis Data Analytics Studio

By Dustin Ward

AWS FeedGet started with Flink SQL APIs in Amazon Kinesis Data Analytics Studio Before the release of Amazon Kinesis Data Analytics Studio, customers relied on Amazon Kinesis Data Analytics for SQL on Amazon Kinesis Data Streams. With the release of Kinesis Data Analytics Studio, data engineers and analysts can use an Apache Zeppelin notebook within…

ERGO Breaks New Frontiers for Insurance with AI Factory on AWS

By Dustin Ward

AWS FeedERGO Breaks New Frontiers for Insurance with AI Factory on AWS This post is co-authored with Piotr Klesta, Robert Meisner and Lukasz Luszczynski of ERGO Artificial intelligence (AI) and related technologies are already finding applications in our homes, cars, industries, and offices. The insurance business is no exception to this. When AI is implemented…

Privileged Identity Management with Azure Lighthouse enables Zero Trust

By Dustin Ward

Recent incidents from ransomware to supply chain compromises have shown both the interconnectedness of our digital world and the critical need to secure these digital assets from attackers, criminals, and other hostile third parties. To achieve this, our customers need Zero Trust security and least privilege access for users and resources. This becomes even more important…