Ends in
00
days
00
hrs
00
mins
00
secs
ENROLL NOW

🚀 25% OFF All Practice Exams, Video Courses, & eBooks – Cyber Sale Extension!

Cloud Computing

Home » Cloud Computing » Page 8

Switching Your Spot EC2 Instance to a Reserved EC2 Instance

2024-02-14T04:58:57+00:00

Amazon Elastic Compute Cloud (EC2) is a cloud computing service that instantly provides flexible and scalable resources to deploy virtual servers, called instances. While Spot Instances can save you a significant amount of money, especially for short-lived workloads, there may come a time when you need a more predictable pricing model. This is where Reserved Instances (RIs) come in handy. In this article, we'll explain the reasons for switching from a Spot Instance to a Reserved Instance and guide you through the process. Understanding Spot Instances and Reserved Instances: Spot Instances and Reserved Instances are two pricing models available on [...]

Switching Your Spot EC2 Instance to a Reserved EC2 Instance2024-02-14T04:58:57+00:00

Microsoft Entra ID

2024-02-20T15:10:02+00:00

Bookmarks Features Concepts Monitoring Microsoft Entra Directory Security Microsoft Entra ID Cheat Sheet An identity and access management service that helps you access internal and external resources. Microsoft Entra licenses: Free, Premium P1, Premium P2 and Pay as you go Free – user and group management in your on-premises directory Premium P1 – allows access to both on-premises and cloud resources. Premium P2 – provides an additional feature called Microsoft Entra Identity Protection. Pay as you go – offers a feature called Azure AD B2C. Features You can use Microsoft Entra Authentication for [...]

Microsoft Entra ID2024-02-20T15:10:02+00:00

Securing Application Logs with Amazon Comprehend

2024-02-07T03:19:12+00:00

Security is one of the more overlooked aspects that many fall victim to when designing the architecture of applications. Partnering this lack of security priority with the increasing value of personal user data, security breaches become one of the certain ways for companies to lose user trust, face legal charges, and, in the long run, fail.  Various governments developed data compliance laws to set minimum guidelines for security in data handling by data stakeholders. These laws govern the collecting, processing, storing, and sharing of personal and sensitive information to protect individuals' privacy and data security. Although regulations may vary depending [...]

Securing Application Logs with Amazon Comprehend2024-02-07T03:19:12+00:00

3 Ways to Fast Track your Cloud Career Journey this 2024

2024-02-01T17:22:18+00:00

  I usually have a countdown to the end of the year (even as early as the 1st quarter of the year) that acts as a timebox for me to track my goal progression or even catch up with the old aspirations until the earth completes yet another revolution around the sun. We may not accomplish 100% of our targets, but if we keep a positive disposition in life and persistently work on achieving our objectives each and every day, the chances are we'll eventually arrive at 80% or 90% completion of our desired outcome. That's way lot better than [...]

3 Ways to Fast Track your Cloud Career Journey this 20242024-02-01T17:22:18+00:00

Machine Learning Mathematics: Regression Basics

2024-01-28T03:02:56+00:00

In recent years, of the ever-evolving landscape of technology, a few of the most prominent buzzwords that continue to capture the imagination of innovators and entrepreneurs alike are Machine Learning (ML) and Artificial Intelligence (AI). With the boom of OpenAI’s ChatGPT last November 2023, as well as the many that followed suit, including major tech companies like Meta with their LLaMa model and Google’s PaLM and newly announced Gemini, ML and AI will most likely be the spotlight for the months, years, and possibly, decades to come.  In a previous article, The AI Revolution: An Overview of Generative AI and [...]

Machine Learning Mathematics: Regression Basics2024-01-28T03:02:56+00:00

Release with a Pipeline: Continuous Delivery to AWS with GitHub Actions

2024-01-24T01:07:44+00:00

This is the final part of a three-part article about a Web Application Project from building a private infrastructure to building a deployment pipeline using AWS’ cloud-native continuous delivery service AWS CodePipeline, and now finalizing the infrastructure to be accessible in a public domain and building a pipeline for continuous deployment using a third-party CD tool – GitHub Actions. From the private infrastructure previously built, we will update the S3 policy to add a statement for an allowed action for the CloudFront resource. As best practice, this statement will be added to the Terraform script of the infrastructure to make it [...]

Release with a Pipeline: Continuous Delivery to AWS with GitHub Actions2024-01-24T01:07:44+00:00

Distributed Data Parallel Training with TensorFlow and Amazon SageMaker Distributed Training Library

2024-01-22T00:58:08+00:00

Introduction In the realm of machine learning, the ability to train models effectively and efficiently stands as a cornerstone of success. As datasets grow exponentially and models become more complex, traditional single-node training methods increasingly fall short. This is where distributed training enters the picture, offering a scalable solution to this growing challenge. Distributed Training Overview Distributed training is a technique used to train machine learning models on large datasets more efficiently. By splitting the workload across multiple compute nodes, it significantly reduces training time. There are two main strategies in distributed training: data parallelism, where the dataset is partitioned [...]

Distributed Data Parallel Training with TensorFlow and Amazon SageMaker Distributed Training Library2024-01-22T00:58:08+00:00

Securing Machine Learning Pipelines: Best Practices in Amazon SageMaker

2024-01-17T00:45:41+00:00

Introduction In today's digital era, the importance of security in machine learning (ML) pipelines cannot be overstated. As ML systems increasingly become integral to business operations and decision-making, ensuring the integrity and security of these systems is paramount. A breach or a flaw in an ML pipeline can lead to compromised data, erroneous decision-making, and potentially catastrophic consequences for businesses and individuals alike. This section will delve into why securing ML pipelines is crucial, highlighting the potential risks and impacts of security lapses. Short Introduction to Amazon SageMaker Amazon SageMaker is a fully managed service that provides every developer and [...]

Securing Machine Learning Pipelines: Best Practices in Amazon SageMaker2024-01-17T00:45:41+00:00

AWS, Azure, and GCP Certifications are consistently among the top-paying IT certifications in the world, considering that most companies have now shifted to the cloud. Upskill and earn over $150,000 per year with an AWS, Azure, or GCP certification!

Follow us on LinkedIn, Facebook, or join our Slack study group. More importantly, answer as many practice exams as you can to help increase your chances of passing your certification exams on your first try!