In this Q&A, I had the chance to sit down with Cloud Academy’s Content Lead for AWS, Andrew Larkin. Andrew…
The announcement that Mesosphere is going to incorporate Kubernetes into DC/OS has generated a fair amount of buzz in the…
AWS security best practices begin with the AWS Shared Responsibility Model that dictates which security controls are AWS's responsibility and…
It’s all about Amazon Web Services databases in our second episode of Inside the Cloud! In case you missed the…
The User Modeling, Adaptation, and Personalization (UMAP) conference brings together a wide community of researchers and experts working on systems that adapt…
Some of the questions by journalists about encryption prove they don't get it. Politicians don't seem to get it either (most of…
To learn something well requires practice, and ethical hacking is no exception. Unlike say, practicing the trumpet, practicing hacking has…
This week on Cloud Academy, we’ve added new learning paths and hands-on labs in networking, serverless, big data, storage, and…
Considering the importance of security in everything digital, the role of Security Architect/Specialist is a growing specialization in the cloud…