Welcome to above the clouds

AWS – Amazon CloudWatch Synthetics supports cron expression for scheduling
CloudWatch Synthetics now supports cron expressions, allowing for flexibility when you schedule canaries to monitor your endpoints. For example, you can run a canary every minute on weekdays between 8 AM and 5 PM. Alternately, you can schedule a canary run for the third Tuesday of the month at 12 PM. Read More for the […]

AWS – Introducing IAM Access Control for Apache Kafka on Amazon MSK
Today we announced AWS Identity and Access Management (IAM) Access Control for Amazon MSK. IAM Access Control is a security option offered at no additional cost that simplifies cluster authentication and Apache Kafka API authorization using IAM role or user policies to control access. By using IAM Access Control, customers no longer need to build […]

AWS – Amazon CloudFront announces price cuts in India and Asia Pacific regions
Amazon CloudFront announces price cuts of up to 36% in India and up to 20% in the Asia Pacific region (Hong Kong, Indonesia, Philippines, Singapore, South Korea, Taiwan, & Thailand) for Regional Data Transfer Out to Internet rates. The new CloudFront prices in these regions are effective May 1st, 2021. You can find CloudFront’s updated […]

Azure – Append blob support in Azure Data Lake Storage is now generally available
Applications can now create append blobs in addition to block blobs in Azure Data Lake Storage accounts and append to them using Append Block operations. Applications that need to add information to existing files efficiently and continuously can leverage append blobs. Read More for the details.

GCP – Chrome Insider: Managing BeyondCorp Enterprise’s threat and data protection capabilities in Chrome
Google’s BeyondCorp Enterprise recently launched, offering organizations a zero trust solution that enables secure access to applications and cloud resources with integrated threat and data protection. These threat and data protection capabilities are delivered directly through Chrome, so organizations can easily take advantage of our web-based protections. Due to BeyondCorp Enterprise’s agentless approach utilizing the […]

GCP – A map of storage options in Google Cloud
Where should your application store data?Of course, the choice depends on the use case. This post covers the different storage options available within Google Cloud across three storage types: object storage, block storage, and file storage. It also covers the use cases that are best suited for each storage option. (Click to enlarge) Object storage […]

GCP – Chrome OS is paving the way for return to office at Google
The pandemic continues to deeply affect our lives around the globe. In some places, new cases are surging and returning to work is the last thing on people’s minds. In other areas, conditions are improving and companies are starting to think about transitioning their workforce back to the office. Exactly when and how to do […]

GCP – Introducing new docking stations designed for Chrome OS devices
Today, we’re announcing a new category of peripherals in the Works With Chromebook program: docking stations. Over the coming months, you can expect to see new docking stations from partners including Targus, Hyper, Acer, Belkin, StarTech.com, and more. Designed for Chrome OS, the new docking stations are ideal for workers who are using a Chromebook […]

AWS – AWS Audit Manager now offers three new frameworks – NIST Cybersecurity Framework version 1.1, AWS Foundational Security Best Practices, and AWS Well-Architected framework
AWS Audit Manager now offers three new prebuilt standard frameworks: NIST Cybersecurity Framework version 1.1, AWS Foundational Security Best Practices, and AWS Well-Architected framework. These frameworks add to the existing prebuilt frameworks provided in Audit Manager. With this release, you can launch an assessment from any of these frameworks with just a few clicks. Audit […]
GCP – 13 best practices for user account, authentication, and password management, 2021 edition
Updated for 2021: This post includes updated best practices including the latest from Google’s Best Practices for Password Management whitepapers for both users and system designers. Account management, authentication and password management can be tricky. Often, account management is a dark corner that isn’t a top priority for developers or product managers. The resulting experience […]