Data Theft and AWS Deployments

9 years ago

Data theft: no one's immune Because, in conformance with their Shared Responsibility Model, AWS does such a good job protecting…

AWS Costs: the 5 Most Common Mistakes

9 years ago

(Mis)managing your AWS Costs We all know that AWS lets us deploy applications in ways that would have been unimaginable…

New Website Features at Cloud Academy

9 years ago

(Update) We’ve recently released some new product features to further enhance your training experience: Hands-on Labs, live cloud environments for…

AWS Elastic MapReduce: a Hands-on Guide to Big Data on Amazon

9 years ago

AWS Elastic MapReduce: a guided lab Amazon's Elastic MapReduce (EMR) is a managed Hadoop framework that allows enterprise and academic…

Continuous Integration with Docker Deployments: the Players

9 years ago

Docker is a relatively new open platform for building, shipping, and running distributed applications. Initially, it was mainly used for…

AWS CLI: 10 Useful Commands You May Not Know

9 years ago

The AWS CLI should be your best friend The AWS console is certainly very well laid out and, with time,…

How to Prepare for the Cloud Services Revolution

9 years ago

Infrastructure as a Service (IaaS) Infrastructure as a Service (IaaS) provides a completely encapsulated infrastructure for building and running applications.…

Docker Security: Making Sure You Get it Right

9 years ago

How to fix the great Docker security mess Success story: Linux software package management When thinking about security in general,…

Cloud Academy Webinar: AWS Certifications And You

9 years ago

(Update March 2019) For an up-to-date list of Cloud Academy’s webinars, please visit Cloud Academy’s webinars page. Note: you can…