Links
Add
lifehacker.com.au: Teach Your Kid Machine Learning With These Free Lessons
https://www.lifehacker.com.au/2018/06/teach-your-kid-machine-learning-with-these-free-lessons/
Lifehacker is the ultimate authority on optimizing every aspect of your life. Do everything better.
Added 1 month ago
What Is the Goal AHI for CPAP Treatment of Sleep Apnea?
https://www.verywellhealth.com/sleep-apnea-what-is-my-goal-ahi-with-cpap-treatment-3015054
Learn how to use the apnea-hypopnea index (AHI) to better understand sleep apnea severity in testing.
Useful Git Tips and Commands - THE CURIOUS DEVELOPER
https://thecuriousdev.org/useful-git-tips-commands/
Added 1 month ago
https://www.brighttalk.com/webcast/8901/324107/dos-and-don-ts-for-devops-automation-on-aws
https://www.brighttalk.com/webcast/8901/324107/dos-and-don-ts-for-devops-automation-on-aws
https://aws.amazon.com/blogs/security/how-to-create-custom-alerts-with-amazon-macie/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_macie_custom_alerts&linkId=52705999
https://aws.amazon.com/blogs/security/how-to-create-custom-alerts-with-amazon-macie/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_macie_custom_alerts&linkId=52705999
June 15, 2020: This blog is out of date. Please refer here for the updated info: https://aws.amazon.com/blogs/aws/new-enhanced-amazon-macie-now-available/ Amazon Macie is a security service that makes it easy for you to discover, classify, and protect sensitive data in Amazon Simple Storage Service (Amazon S3). Macie collects AWS CloudTrail events and Amazon S3 metadata such as permissions […]
https://www.ubuntupit.com/top-12-best-google-drive-linux-client-software/
https://www.ubuntupit.com/top-12-best-google-drive-linux-client-software/
You can try these Google Drive clients for Linux to enjoy a better access to all the files in Google Drive and manage them easily.
https://firehydrant.io/
https://firehydrant.io/
FireHydrant helps you plan, respond, and learn from incidents with AI-enriched automation, retrospectives, and on-call tools—boosting reliability & reducing MTTR.
Added 1 month ago
https://www.amazon.jobs/en/landing_pages/interviewing-at-amazon?utm_source=social&utm_medium=li&utm_term=amazon&utm_content=interview-prep&ref=tsm_1_LINKEDIN_COMPANY_s_amzn_1550246240&linkId=52048859
https://www.amazon.jobs/en/landing_pages/interviewing-at-amazon?utm_source=social&utm_medium=li&utm_term=amazon&utm_content=interview-prep&ref=tsm_1_LINKEDIN_COMPANY_s_amzn_1550246240&linkId=52048859
https://aws.amazon.com/blogs/security/how-to-use-aws-config-to-monitor-for-and-respond-to-amazon-s3-buckets-allowing-public-access/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_AWS-Config-monitoring-tweet-2&linkId=51888090
https://aws.amazon.com/blogs/security/how-to-use-aws-config-to-monitor-for-and-respond-to-amazon-s3-buckets-allowing-public-access/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_AWS-Config-monitoring-tweet-2&linkId=51888090
AWS Config enables continuous monitoring of your AWS resources, making it simple to assess, audit, and record resource configurations and changes. AWS Config does this through the use of rules that define the desired configuration state of your AWS resources. AWS Config provides a number of AWS managed rules that address a wide range of […]
Added 1 month ago
https://aws.amazon.com/blogs/security/how-to-centralize-dns-management-in-a-multi-account-environment/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_directory_service&linkId=51000854
https://aws.amazon.com/blogs/security/how-to-centralize-dns-management-in-a-multi-account-environment/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_directory_service&linkId=51000854
Note from June 5, 2019: The approach and architecture in this post is recommended if you prefer more control over DNS servers or prefer to use AWS Managed Active Directory for DNS resolution, however there are some limitations to this approach and we added a “Limitations and additional considerations” section to this post to describe […]
Added 1 month ago
Spoofing Cell Networks with a USB to VGA Adapter | Hackaday
https://hackaday.com/2018/04/23/spoofing-cell-networks-with-a-usb-to-vga-adapter/
RTL-SDR brought cheap and ubiquitous Software Defined Radio (SDR) to the masses, opening up whole swaths of the RF spectrum which were simply unavailable to the average hacker previously. Because t…
Watch "Serverless Bytes | Workshop on Building a Serverless App" on YouTube
https://youtu.be/Hv3YrP8G4ag
AWS serverless experts Chris Munns & Ronald Widha walk you through developing a simple serverless application. You will learn how to use AWS Lambda, Amazon...
Added 1 month ago
Wonk post: chosen ciphertext security in public-key encryption (Part 1) – A
https://blog.cryptographyengineering.com/2018/04/21/wonk-post-chosen-ciphertext-security-in-public-key-encryption-part-1/
In general I try to limit this blog to posts that focus on generally-applicable techniques in cryptography. That is, I don't focus on the deeply wonky. But this post is going to be an exception. Today, I'm going to talk about a topic that most "typical" implementers don't -- and shouldn't -- think about. Specifically:…
Added 1 month ago
https://aws.amazon.com/blogs/aws/aws-config-update-aggregate-compliance-data-across-accounts-regions/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_aws_config&linkId=50736326
https://aws.amazon.com/blogs/aws/aws-config-update-aggregate-compliance-data-across-accounts-regions/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_aws_config&linkId=50736326
As I have discussed in the past, sophisticated AWS customers invariably control multiple AWS accounts. Some of these are the results of acquisitions or a holdover from bottom-up, departmental adoption of cloud computing. Others create multiple accounts in order to isolate developers, projects, or departments from each other. We strongly endorse this as a best […]
Added 1 month ago
https://aws.amazon.com/blogs/security/aws-single-sign-on-now-enables-command-line-interface-access-for-aws-accounts-using-corporate-credentials/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_sso&linkId=50708343
https://aws.amazon.com/blogs/security/aws-single-sign-on-now-enables-command-line-interface-access-for-aws-accounts-using-corporate-credentials/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_sso&linkId=50708343
May 23, 2022: This blog post is out of date. Please refer here for current info: https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html September 12, 2022: This blog post has been updated to reflect the new name of AWS Single Sign-On (SSO) – AWS IAM Identity Center. Read more about the name change here. Today, AWS made it easier to use […]
Added 1 month ago
https://aws.amazon.com/blogs/aws/new-registry-of-open-data-on-aws-roda/
https://aws.amazon.com/blogs/aws/new-registry-of-open-data-on-aws-roda/
Almost a decade ago, my colleague Deepak Singh introduced the AWS Public Datasets in his post Paging Researchers, Analysts, and Developers. I’m happy to report that Deepak is still an important part of the AWS team and that the Public Datasets program is still going strong! Today we are announcing a new take on open […]
https://aws.amazon.com/blogs/security/understanding-aws-cloudhsm-cluster-synchronization/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_cloudhsm&linkId=50579720
https://aws.amazon.com/blogs/security/understanding-aws-cloudhsm-cluster-synchronization/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_cloudhsm&linkId=50579720
Feb 17, 2025: This blog post references AWS CloudHSM Client SDK 3, which is no longer the recommended version. AWS recommends that you use the latest version, AWS CloudHSM Client SDK 5, which provides updated functionality and commands. We are currently working on an updated blog post for CloudHSM Client SDK 5. See the AWS […]
Added 1 month ago
https://aws.amazon.com/blogs/security/how-to-manage-amazon-guardduty-security-findings-across-multiple-accounts/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_guard_duty_multiple_accounts&linkId=50540054
https://aws.amazon.com/blogs/security/how-to-manage-amazon-guardduty-security-findings-across-multiple-accounts/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_guard_duty_multiple_accounts&linkId=50540054
September 9, 2021: Amazon Elasticsearch Service has been renamed to Amazon OpenSearch Service. See details. Introduced at AWS re:Invent 2017, Amazon GuardDuty is a managed threat detection service that continuously monitors for malicious or unauthorized behavior to help you protect your AWS accounts and workloads. In an AWS Blog post, Jeff Barr shows you how to […]
https://www.aws.training/?sc_channel=sm&sc_campaign=AWS_Training&sc_publisher=TWITTER&sc_country=Global&sc_geo=APAC&sc_outcome=awareness&trk=_TWITTER&sc_content=DLP&linkId=50495410
https://www.aws.training/?sc_channel=sm&sc_campaign=AWS_Training&sc_publisher=TWITTER&sc_country=Global&sc_geo=APAC&sc_outcome=awareness&trk=_TWITTER&sc_content=DLP&linkId=50495410
https://aws.amazon.com/compliance/gdpr-center/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_gdpr_center&linkId=50238985
https://aws.amazon.com/compliance/gdpr-center/?sc_channel=sm&sc_campaign=AWS_Security&sc_publisher=TWITTER&sc_country=Security%20&%20Identity&sc_geo=GLOBAL&sc_outcome=awareness&trk=_TWITTER&sc_content=security_blog_gdpr_center&linkId=50238985
Added 1 month ago