Both SSH key and password authentication have their pros and cons. Understand them to make the right choice for your company. Which is better for user authentication on an SFTP server – SSH keys or passwords? This has been a debate for decades. Both have their pros and cons, and … | Continue reading
Make sure you know the requirements you need to meet to ensure your file transfers are PCI-compliant. | Continue reading
Putting big data in the cloud can lead to insights that can improve your products and business. | Continue reading
Serverless and containers are often viewed as competing development technologies. But when integrated, they can be a powerful combination. | Continue reading
Use this CloudFormation template to launch Redshift in a public subnet with S3 as the data source | Continue reading
Here's how you can use CloudFormation to have EC2, IAM, and S3 work together | Continue reading
Here’s an in-depth walkthrough of how CloudFormation works and an analysis of a template that creates a VPC This is the fifth article in our Infrastructure as Code blog series. You can read the first four here: Infrastructure as Code: 5 Reasons Why You Should Implement IaC Now In … | Continue reading
CloudFormation is a powerful Infrastructure as Code tool that can help automate and manage your AWS deployments. | Continue reading