AWS Database Migration Service now supports parallel threads when using Redshift as a target during full load

By Dustin Ward

AWS FeedAWS Database Migration Service now supports parallel threads when using Redshift as a target during full load AWS Database Migration Service (AWS DMS) expands its functionality by supporting parallel threads when using Redshift as a target during full load. Amazon Redshift is a fully managed, petabyte-scale data warehouse service in the cloud. You can start with…

Build Next-Generation Microservices with .NET 5 and gRPC on AWS

By Dustin Ward

AWS FeedBuild Next-Generation Microservices with .NET 5 and gRPC on AWS Modern architectures use multiple microservices in conjunction to drive customer experiences. At re:Invent 2015, AWS senior project manager Rob Brigham described Amazon’s architecture of many single-purpose microservices – including ones that render the “Buy” button, calculate tax at checkout, and hundreds more. Microservices commonly…

Happy 15th Birthday Amazon EC2

By Dustin Ward

AWS FeedHappy 15th Birthday Amazon EC2 Fifteen years ago today I wrote the blog post that launched the Amazon EC2 Beta. As I recall, the launch was imminent for quite some time as we worked to finalize the feature set, the pricing model, and innumerable other details. The launch date was finally chosen and it…

How MEDHOST’s cardiac risk prediction successfully leveraged AWS analytic services

By Dustin Ward

AWS FeedHow MEDHOST’s cardiac risk prediction successfully leveraged AWS analytic services MEDHOST has been providing products and services to healthcare facilities of all types and sizes for over 35 years. Today, more than 1,000 healthcare facilities are partnering with MEDHOST and enhancing their patient care and operational excellence with its integrated clinical and financial EHR…

Securing Serverless Applications with Critical Logging

By Dustin Ward

We’ve seen time and again how serverless architecture can benefit your application; graceful scaling, cost efficiency, and a fast production time are just some of the things you think of when talking about serverless. But what about serverless security? What do I need to do to ensure my application is not prone to attacks? One…