Q&A on Cloud Migration, Security in the Cloud, and more with Andrew Larkin, AWS Expert

7 years ago

In this Q&A, I had the chance to sit down with Cloud Academy’s Content Lead for AWS, Andrew Larkin. Andrew…

Mesosphere to Incorporate Kubernetes into DC/OS

7 years ago

The announcement that Mesosphere is going to incorporate Kubernetes into DC/OS has generated a fair amount of buzz in the…

AWS Shared Responsibility Model: Cloud Security

7 years ago

AWS security best practices begin with the AWS Shared Responsibility Model that dictates which security controls are AWS's responsibility and…

Inside the Cloud – Episode 2: Amazon DynamoDB, Redshift, and RDS

7 years ago

It’s all about Amazon Web Services databases in our second episode of Inside the Cloud! In case you missed the…

5 Key Takeaways From UMAP 2017

7 years ago

The User Modeling, Adaptation, and Personalization (UMAP) conference brings together a wide community of researchers and experts working on systems that adapt…

On ‘the public understanding of encryption’ Tweet by Paul Johnston

7 years ago

Some of the questions by journalists about encryption prove they don't get it. Politicians don't seem to get it either (most of…

How to Set up a Web Application Hacking Lab

7 years ago

To learn something well requires practice, and ethical hacking is no exception. Unlike say, practicing the trumpet, practicing hacking has…

New on Cloud Academy: Networking, Serverless, Big data, and more

7 years ago

This week on Cloud Academy, we’ve added new learning paths and hands-on labs in networking, serverless, big data, storage, and…

3 Steps to Becoming an AWS Security Specialist

7 years ago

Considering the importance of security in everything digital, the role of Security Architect/Specialist is a growing specialization in the cloud…