huanliu.wordpress.com
Amazon’s physical hardware and EC2 compute unit | Huan Liu's Blog
https://huanliu.wordpress.com/2010/06/14/amazons-physical-hardware-and-ec2-compute-unit
Huan Liu's Blog. IPhone dance game, cloud, mobile, wearable. Experience with cloud (IaaS) providers. Amazon EC2 Micro instances deeper dive →. Amazon’s physical hardware and EC2 compute unit. June 14, 2010. Ever wonder what hardware is running behind Amazon’s EC2? Why would you even care? Well, there are at least a couple of reasons. Our observation is based on a combination of “hints” from several different tools and methods, including the following:. With the model numbers reported by “cpuid̶...
thecloudsaga.com
ec2-manage-snapshots | The Cloud Saga
http://www.thecloudsaga.com/aws-ec2-manage-snapshots
8 Mar 2010, 4:40pm. Based on code from Oren Solomianik’s. Ec2-manage-snapshots does things a little differently. Oren’s script would delete any snapshots older than. Days for (a) given volume(s). I improved the code a little bit so as to handle a –region parameter ( –region eu-west-1 is an example) an –noop so as to tell us what it would do but not actually do it. That’s the ec2-delete-old-snapshots you’ll find in the included archive. In the last 7 days. The past 4 sundays. Every first day of the month.
elastic-security.com
Read-Only Credentials For EC2 | Elastic Security
https://elastic-security.com/2010/12/30/read-only-credentials-for-ec2
Elastic Security for Cloud Infrastructures (IaaS). Read-Only Credentials For EC2. December 30, 2010. A common concern of EC2 users with regard to using third-party tools like Elastic Detector. Is the fact that those tools require the users’ AWS EC2 credentials to work. In the wrong hands, those credentials can be misused to cause significant damage by e.g. shutting down instances. Fortunately, AWS provides a solution called Identity and Access Management (IAM). 1 Install IAM Client Tools. 2 Create A Group.
alanweiss.com
Million Dollar Consulting Convention | Alan Weiss, Ph.D.
http://www.alanweiss.com/growth-experiences/million-dollar-consulting-convention
Alan Weiss, Ph.D. Publishing & Speaking. Alan’s Personal Power. Alan’s Investment Bank. The Writing on The Wall. Alan’s Communities Index. Million Dollar Consulting Mindset. Alan’s Forum Registration. Alan Weiss’s Third Annual Million Dollar Consulting Convention. After a hugely successful inaugural in Atlanta in 2015 and a smash hit in Los Angeles in 2016 (“The best convention of its kind ever! How to leap from strictly technical consulting to also embrace business consulting. April 26-28, 2017. How do ...
elastic-security.com
AWS | Elastic Security
https://elastic-security.com/category/aws
Elastic Security for Cloud Infrastructures (IaaS). Big Data Security: How to secure your Hadoop cluster. Hi all, Big Data is for sure one of the biggest trends of the last few years. Besides the conceptual discussions on what big data actually is and what amount of data can be defined as such, any technology that quickly becomes widespread is relevant to security as well. A bit of History When talking about…. August 10, 2016. How-To: Creating Advanced AWS Credentials with IAM. May 18, 2016. July 7, 2014.
elastic-security.com
Great Trailblazer Competition to start the year! | Elastic Security
https://elastic-security.com/2014/01/10/great-trailblazer-competition-to-start-the-year
Elastic Security for Cloud Infrastructures (IaaS). Great Trailblazer Competition to start the year! January 10, 2014. As 2014 kicks off, we at SecludIT would like to wish you a fantastic start to 2014! Starting the year, we would like to share some great news on SecludIT being a Security Trailblazer Finalist. Currently, as finalists of this competition, we are at the last step where we need now to raise the most votes to become 2014’s Security Trailblazer. January 10, 2014. Docker: Best Security Practices.
elastic-security.com
Discussions | Elastic Security
https://elastic-security.com/category/discussions
Elastic Security for Cloud Infrastructures (IaaS). A deeper look at Whatsapp End-to-end Encryption. Hi all, a few days ago Whatsapp announced that end-to-end encryption is finally available on iOS and Android (only if you have the latest version of Whatsapp installed). That’s great news! It’s worth pointing out it’s been a while that users have been asking for this feature, and other applications have been providing it with…. April 26, 2016. First Line of Defense: Best Security Practices for Users. Hi th...
elastic-security.com
Elastic Security | Elastic Security
https://elastic-security.com/category/elastic-security
Elastic Security for Cloud Infrastructures (IaaS). How to outsource your data to the Cloud without losing confidentiality and control. Hi there, recently, data leaks and various security incidents have been constantly part of daily news and scandals. From an end-user point of view, it looks like storing confidential data in the cloud is a serious risk, especially when dealing with sensitive and strategic data. Why? Thanks to the confession of Edward Snowden, we now know for sure…. May 5, 2015. Hi there, ...
elastic-security.com
Secure Cloud | Elastic Security
https://elastic-security.com/category/secure-cloud
Elastic Security for Cloud Infrastructures (IaaS). Big Data Security: How to secure your Hadoop cluster. Hi all, Big Data is for sure one of the biggest trends of the last few years. Besides the conceptual discussions on what big data actually is and what amount of data can be defined as such, any technology that quickly becomes widespread is relevant to security as well. A bit of History When talking about…. August 10, 2016. A deeper look at Whatsapp End-to-end Encryption. April 26, 2016. April 11, 2016.
SOCIAL ENGAGEMENT