Skip to the content

Dustin Ward

Cloud Engineer

Menu
  • Home
  • Blog
  • Contact Me

Address Modernization Tradeoffs with Lake House Architecture

By Dustin Ward

AWS FeedAddress Modernization Tradeoffs with Lake House Architecture Many organizations are modernizing their applications to reduce costs and become more efficient. They must adapt to modern application requirements that provide 24×7 global access. The ability…

New AWS Solutions Implementation: AWS Innovation Sandbox

By Dustin Ward

AWS FeedNew AWS Solutions Implementation: AWS Innovation Sandbox We are delighted to announce the addition of AWS Innovation Sandbox to the AWS Solutions Implementations portfolio.

Implement operations observability in landing zone environments

By Dustin Ward

AWS FeedImplement operations observability in landing zone environments In an earlier blog post, Automate customized deployment of cross-account/cross-region CloudWatch dashboards using tags, we showed you how to implement Amazon CloudWatch dashboards for specific events with automation.…

Use Amazon EventBridge rules to run AWS Systems Manager automation in response to CloudWatch alarms

By Dustin Ward

AWS FeedUse Amazon EventBridge rules to run AWS Systems Manager automation in response to CloudWatch alarms Since its launch in 2009, Amazon CloudWatch has become the cloud-native choice for a monitoring and observability service built…

Detecting PrintNightmare Exploit Attempts using Trend Micro Vision One and Cloud One Threat Research Engineer

By Dustin Ward

AWS FeedDetecting PrintNightmare Exploit Attempts using Trend Micro Vision One and Cloud One Threat Research Engineer We look into the different implementations of PrintNightmare and include recommendations on how security teams can safeguard their workloads.

Most supply chain attacks target supplier’s code—ENISA

By Dustin Ward

AWS FeedMost supply chain attacks target supplier’s code—ENISA The agency also reported that attacks on the supply chain have grown in number and become more sophisticated. Sixty-two percent of the attacks were also done using…

Posts navigation

Previous 1 … 558 559 560 … 1,180 Next

Recent Posts

  • Agent Factory: Connecting agents, apps, and data with new open standards like MCP and A2A
  • Announcing Amazon EC2 M4 and M4 Pro Mac instances
  • Accelerate serverless testing with LocalStack integration in VS Code IDE
  • Ask Ralph: Where style meets AI—a new era of conversational commerce
  • AWS Weekly Roundup: AWS Transform, Amazon Neptune, and more (September 8, 2025)

Tags

ARM AWS AWS Cloud AWSCloud AWS Community AWS Training Azure Azure Data Factory Azure Functions Azure Maps Azure Monitor AzureStack Builders Certification Cloud Cloud Computing Community Cosmos DB CosmosDB DataFactory Functions Graph IoT Learning Log Analytics Maps mentor Microsoft monitor News NoSQL OMS PowerShell Resource Manager Security SendGrid Serverless success tag1 tag2 tag3 tag4 tag5 Training VSCode

Follow Me

This website uses cookies to improve your experience. I assume you're ok with this, but you can opt-out if you wish. Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}