Welcome to above the clouds

AWS – Amazon Timestream for InfluxDB now supports Internet Protocol Version 6 (IPv6) connectivity
Amazon Timestream for InfluxDB now offers customers the option to create instances with Internet Protocol version 6 (IPv6) addresses. Timestream for InfluxDB makes it easy for application developers and DevOps teams to run fully managed InfluxDB databases on Amazon Web Services for real-time time-series applications using open-source APIs. Customers moving to IPv6 can now simplify […]

AWS – Kinesis Producer Library now supports the AWS SDK for Java 2.x
AWS announces a new version of Kinesis Producer Library (KPL) that supports the AWS SDK for Java 2.x for improved performance and security features. With the new KPL version 1.0, now you can fully remove the dependency on the AWS SDK for Java 1.x. You can upgrade your applications running previous KPL versions to KPL […]

AWS – Amazon EBS launches Local Snapshots for AWS Dedicated Local Zones
You can now use Amazon EBS Local Snapshots in AWS Dedicated Local Zones. Dedicated Local Zones are a type of AWS infrastructure that are fully managed by AWS, built for exclusive use by you or your community, and placed in a location or data center specified by you to help you comply with regulatory requirements. […]

AWS – Bottlerocket now supports Elastic Fabric Adapter for AI/ML and HPC workloads
Today, AWS announces the introduction of Elastic Fabric Adapter (EFA) support for Bottlerocket, the Linux-based operating system purpose-built for hosting containers, with a focus on security, minimal footprint, and safe updates. An EFA is a network device that you can attach to your Amazon EC2 instance to accelerate Artificial Intelligence (AI), Machine Learning (ML), and […]

AWS – Announcing Node Health Monitoring and Auto-Repair for Amazon EKS
Amazon Elastic Kubernetes Service (Amazon EKS) now monitors the health of the EC2 instances (nodes) in EKS clusters for Kubernetes-specific health issues and automatically takes action to repair them if they become unhealthy. This helps you achieve higher availability for your Kubernetes applications and reduces the operational overhead required to keep cluster infrastructure performing optimally. […]

AWS – Introducing Amazon EC2 High Memory U7inh Instance
Amazon Web Services is announcing the general availability of Amazon EC2 High Memory U7inh instance, a new addition to EC2 High Memory family, built in collaboration with Hewlett Packard Enterprise (HPE). Amazon EC2 U7inh instance run on 16-socket HPE Compute Scale-up Server 3200, and are built on the AWS Nitro System to deliver a fully […]

GCP – AI Playground: Where learning and innovation converge in the heart of London
AI is rapidly transforming industries and redefining the future of work. However, many organizations face a significant hurdle: bridging the knowledge gap and acquiring the necessary skills to effectively harness the power of AI. Recognizing this challenge, Google Cloud is set to launch the AI Playground in Shoreditch, Central London, in the first quarter of […]

GCP – Looker now available in the AWS Marketplace, bringing AI for BI to multi-cloud environments
Looker, Google Cloud’s complete AI for BI platform, is now available on the AWS Marketplace, allowing AWS customers to benefit from Looker’s powerful analytics and reporting capabilities in their environment. As the next step in Looker’s commitment to an open multicloud strategy, this milestone simplifies procurement for businesses that use AWS cloud and databases such […]

GCP – Using Cilium and GKE Dataplane V2? Be sure to check out Hubble for observability
As a Kubernetes platform engineer, you’ve probably followed the buzz around eBPF and its revolutionary impact on Kubernetes networking. Perhaps you’ve explored Cilium, a popular solution leveraging eBPF, and wondered how Google Kubernetes Engine (GKE) harnesses this power. That curiosity may have led you to GKE Dataplane V2. And you’ve undoubtedly noticed that where eBPF […]
GCP – The Cyber Threat Intelligence Program Design Playbook is now available
As cybersecurity threats have grown more sophisticated and prevalent, we’ve seen organizations develop robust cyber threat intelligence (CTI) programs to help bolster defenses. However, creating and maturing a CTI program remains a challenge because it requires people, processes, technologies, and metrics to validate success. To help organizations better operationalize threat intelligence, we’ve published the CTI […]