Meet the AWS News Blog team!
Now that Jeff Barr has retired from the AWS News Blog as of December last year, the AWS News Blog team will keep sharing the most important and impactful AWS…
Now that Jeff Barr has retired from the AWS News Blog as of December last year, the AWS News Blog team will keep sharing the most important and impactful AWS…
On the path to digital transformation, enterprises have increasingly turned to containerized environments to quickly and effectively deploy new revenue-generating applications. As customers increasingly explore alternatives to VMware as their…
Today, I’m happy to announce Amazon Q Developer support for Amazon OpenSearch Service, providing AI-assisted capabilities to help you investigate and visualize operational data. Amazon Q Developer enhances the OpenSearch…
Today, we are launching IPv6 support for Amazon API Gateway across all endpoint types, custom domains, and management APIs, in all commercial and AWS GovCloud (US) Regions. You can now…
Akira ransomware has cemented its reputation as one of the most relentless and disruptive cyber threats affecting organizations today. Akira has held the number one spot for six straight quarters…
It’s AWS Summit season! Free events are now rolling out worldwide, bringing our cloud computing community together to connect, collaborate, and learn. Whether you prefer joining us online or in-person,…
I’m excited to announce that AWS CodeBuild now supports parallel test execution, so you can run your test suites concurrently and reduce build times significantly. With the demo project I…
Cloud adoption is at an all-time high, with nearly 98% of businesses utilizing cloud services in some capacity. This trend continues to grow as organizations store, process, and manage vast…
Today, we’re announcing the general availability of the AWS WAF integration with AWS Amplify Hosting. Web application owners are constantly working to protect their applications from a variety of threats.…
In the digital age, where information is power, cybercriminals loom like shadowy adversaries, ready to pounce on unsuspecting organizations. These stealthy assailants are relentless, exploiting every vulnerability to breach digital…