Understanding Access Credentials for AWS/EC2
Amazon Web Services (AWS) has a dizzying proliferation of credentials, keys, ids, usernames, certificates, passwords, and codes which are used to access and control various account and service features and functionality. I have never met an AWS user who, when they started, did not have trouble figuring out which ones to use when and where, much less why. Amazon is fairly consistent across the documentation and interfaces in the specific terms they use for the different credentials, but nowhere have I found these all listed in one place.
Do-It-Yourself PR: 13 Things You Must Do
Every entrepreneur is a self-promoter, but some are lucky enough to be able to pay for help in that department. If that's not you and spreading the word is your task and yours alone, here are a few things to put on your must-do list: Advertising
Managing Your AWS Credentials (Part 1)
Anyone who has deployed a production system in the Amazon Web Services infrastructure has grappled with the challenge of securing the application. The majority of the issues you face in an AWS deployment are the same issues you would face in deploying your application in any other environment, e.g. In fact, some of the tools provided by AWS such as the distributed firewall in EC2 can actually make the process even more secure because everything can be controlled via API's. So, for example, you can shut down SSH traffic completely at the EC2 firewall and write scripts that automatically enable SSH access for your current IP and then shut that port down as soon as you have closed your SSH session with the instance. This series of articles focuses on an aspect of security that is very specific to AWS: managing your AWS credentials.
50 Tips for Starting Your Own Company
Starting your own business isn’t for the faint of heart. It’s stressful and pretty much demands your complete focus. On the plus side, it can also be a fulfilling experience professionally and personally. Here are 50 tips on how to make your business come to life: Related: How McDonald's Made Me a Better Businessman 1.
Product Advertising API Signed Requests Helper : Sample Code & Libraries
This helper is available online at Alternatively, you may download the ZIP file, extract the contents to a folder and open index.html in a browser. This tool works best with Mozilla Firefox; other browsers including Internet Explorer have not been tested. This tool allows you to provide a Product Advertising API request URL, your AWS Access Key ID and your AWS Secret Key. It then displays the corresponding signed URL.
A call to all Data Engineers and BI workers
In the last two years I had the chance to get my hands on some very exciting Data Analytics projects and I wanted to take the chance to recap and to reach out to Data Engineers and BI Consultants. Why? In the area of IT we see lot’s of trends coming up every year.
What Does It Take To Become a Chief Data Officer
The Chief Data Officer (CDO) should be responsible for the overall big data strategy within an organisation. If big data is implemented throughout the organisation, at all different levels and departments, the Chief Data Officer will have the responsibility to ensure the strategy is implemented correctly, the data is correct and secure and the customers’ privacy is governed correctly. As data-driven decision-making becomes increasingly important in organisations, the CDO should be a member of the executive board, reporting directly to the Chief Executive Office. Data in itself does not bring any value. It only becomes valuable when analysed and turned into information.
Analytics Start-up Series
My articles/posts on analytics start-up series that I started writing way back in 2007. Will try and aggregate it sequentially here, as I continue to write more. Article 1