Amazon, Facebook want to hire software-defined networking engineers

  photo: Jordan Novet SUMMARY:Amazon and Facebook are looking for engineers to work on deploying next-generation software-defined networks. Amazon’s project could bring new services for its cloud customers. While software-defined networking (SDN) seems to be still stuck in the hype cycle, use cases from service providers and a few enterprises were on display at the Open ...

Amazon S3 goes exponential, now stores 2 trillion objects

This was originally posted on Gigaom. SUMMARY:Less than year after hitting the 1 trillion object mark, Amazon S3 is now storing more than 2 trillion objects. That’s a lot any way you slice it and highlights AWS’s role as an underpinning of today’s web. It took six years for Amazon Web Services’ Simple Storage Service, ...

Forecast for the cloud: it will come in a million varieties

This was posted originally on Gigaom photo: Tartos/Shutterstock SUMMARY:The cloud is dominated by massive, super-scale providers like Google and Amazon. But that is going to change, and eventually every business big or small will have a cloud suited specifically to their needs. tweet this It became popular a few years back to claim that the ...

EMC’s Amazon Challenger Comes Out

Jim Wilson/The New York TimesPaul Maritz, chief executive of Pivotal, a Web services company spun out of the assets of EMC and VMware. A well-financed competitor to AmazonWeb Services became official Monday. Pivotal, a company spun out of assets ofEMC and VMware, two tech companies each with billions in revenue, became an independent firm, ahead of a formal ...

Rackspace to telcos: build your OpenStack cloud on us

This was originally posted on Gigaom. photo: Shutterstock SOMKKU SUMMARY:Telcos and service providers wanting to compete with Amazon in public cloud services can jump-start that effort by tapping Rackspace, says Rackspace. Rackspace fancies itself as the OpenStack supplier to the stars. The company says it will provide telcos and other service providers with OpenStack technology that will enable ...

Top 10 AWS Security Tips: #2 Password Policies and Multi-Factor Authentication

In last week’s post, Protecting your resources with AWS Identity and Access Management, Justin covered the basics of AWS Identity Access Management (IAM). This week, we’re going to take a look at password policies and multi-factor authentication using IAM. Password Policies The value of a strong passwords is well known. Most organizations already have a password policy in place. This ...

Top 10 AWS Security Tips: #3 Build a Secure Base Amazon Machine Image (AMI)

In our previous top tips for AWS security we looked at hardening access to your AWS resources through proper use ofIAM, policies and authentication. In this tip we turn our focus to hardening your Amazon Machine Images (AMI). No matter whether you pronounce it A.M.I or Ahhh-ME (as the AWS folks do) your machine images are an important part of ...

Top 10 AWS Security Tips: #4 Protecting Guest Operating Systems

Last week, Justin covered some of the high level issues around AMI development. This week, we’re going to take a look at how to protect the guest operating system running on your EC2 and VPC instances. AWS Recommendations AWS had published quite a few papers around their services. AWS Security Best Practices [PDF] and AWS Risk and Compliance [PDF] stand out as excellent ...

Top 10 AWS Security Tips: #5 Create Restrictive Firewall Policies

In this series, Mark and I have covered tips for securing your Amazon Web Services (AWS) account, building hardened Amazon Machine Images and locking down the operating system. Now we turn our attention to one of the mostsimple, yet powerful ways to secure your instances: the firewall. Implementing a firewall policy is just basic survival when it comes to internet-facing servers. AWS provides Security Groups ...

Top 10 AWS Security Tips: #6 Secure Your Applications Using a Host-Based Intrusion Prevention System

So far in this series, Justin and I have provided tips for securing the foundations of your AWS deployment. Taken together, these tips work to reduce the overall attack surface—the area exposed to the outside world—of your application. Now it’s time to add the next layer of controls to you application, starting with a host-based intrusion prevention system or ...