a

The Daily Dose

Our regularly updated blog on all the things that we think you will find interesting. AWS, Cloud, Healthcare, Mobile apps, tutorials and more.

Top AWS Services

Top 25 AWS Services

Learn about our Top AWS Services for 2023 and prepare your journey through the cloud with precision and confidence.

Read more ➞

Top 10 AWS Migration Services

Discover our top services for helping you migrate over to the AWS cloud.

Read more ➞

AWS Business Continuity Plan

Learn how to create an effective business continuity plan for your AWS stack.

Read more ➞

AWS Web Application Firewall

AWS Web Application Firewall

If your web apps or APIs are at risk of being hacked or compromised by bots, AWS Web Application Firewall (WAF) is a virtual firewall that can assist defend you from these threats. AWS WAF gives you comprehensive control over traffic accessing your applications by allowing you to set security rules that restrict bot traffic and stop classic attack types like SQL injection and cross-site scripting. Additionally, you have the option of creating rules that only allow certain types of traffic.

Amazon CloudFront vs. Cloudflare

Amazon CloudFront vs. Cloudflare

Content Delivery Networks (CDN) are a series of global servers installed with the intention of streamlining and optimizing content delivery to end users. This is accomplished by localizing the information being accessed in a region near the user to reduce the time it takes for that information to travel to and from the servers. There are plenty of moving parts to this system and AWS does provide its own set of tools for ensuring distribution of your content.

AWS Amplify

AWS Amplify

At its core, AWS Amplify is a suite of purpose-built tools and capabilities meant to make building full-stack applications on AWS a breeze for front-end web and mobile developers. Using Amplify’s web and mobile app backends, you can create an app’s front end graphically, connect your app in minutes, and manage content outside of Amazon’s UI.. With no knowledge of cloud computing, you may more quickly get your items to market and expand your company. In order to construct a complete application, encompassing front-end user interfaces and back-end systems, you must utilize a visual programming language like Java or C++. You can link your web and mobile apps to new and current AWS resources with just a few lines of code. Within minutes, static websites, single-page web applications, and server-side rendered applications can all be built and hosted.

Amazon Rekognition

Amazon Rekognition

Computer vision (CV) capabilities provided by Amazon Rekognition are pre-trained and programmable, making it easy to extract data and insights from images and videos. Pre-trained or configurable computer vision APIs can be swiftly integrated into your apps without the need to build machine learning (ML) models and infrastructure from scratch. Images and videos are analyzed in minutes using artificial intelligence to assist people in visual assessment tasks that would otherwise be performed manually (AI).

Amazon Redshift vs. Snowflake

Amazon Redshift vs. Snowflake

Intelligent decision-making based on data is the soul of today’s successful companies. Cloud data warehouses are used by most businesses to store operational data and facilitate business intelligence and data analysis.

AWS CloudFormation vs. Terraform

AWS CloudFormation vs. Terraform

The term “infrastructure as code” (IaC) has been popular recently, and for good reason. IaC, or software-defined infrastructure, is an IT setup where developers or operations teams continuously manage and provision the technological stack for an application via software, rather than manually configuring separate hardware devices and operating systems. As an essential part of DevOps, it attempts to boost productivity, quality, and timeliness in organizations.
AWS CloudFormation or the open-source Terraform tool is frequently the first two options that come to mind when looking for tools to implement infrastructure as code on AWS. In order to help you decide which is best for your situation, we’ll go over the differences between them.

10 AWS Security Tools to Implement in Your Environment

10 AWS Security Tools to Implement in Your Environment

Amazon Web Services (AWS) scale very easily and securely with your application of choice. That’s not to say it is completely safe against intrusions. At least 70 percent of IT enterprise leaders are concerned about how secure the cloud is according to this report. As time progresses, there will be no end to those looking to exploit whatever loophole they can find in your security.

Making More with Less on AWS

Making More with Less on AWS

Is operational efficiency the biggest undermining factor for your AWS environment?  Do you need a helping hand to ensure that each cent spent goes towards maximizing production?  Here at AllCode, our expertise with AWS can help you see increased savings month over month.  In just the first month of use alone, you can expect to see as much as 10% saved on your AWS bill.

How to Reduce Your AWS Bill

How to Reduce Your AWS Bill

The extensive range of services and pricing options provided by AWS gives you the freedom to successfully control your costs while still maintaining the performance and capacity necessary for your organization. In this blog post, I will take a more tactical approach to reduce costs with changes in user demand. While the fundamental process of cost optimization on AWS remains the same – monitoring your AWS costs and usage, analyzing the data to find savings, and taking action to realize the savings is crucial in saving you money.

Creating A New AWS EC2 Key For A 3rd Party Developer

Creating A New AWS EC2 Key For A 3rd Party Developer

When you create a new EC2 instance you automatically download a ppk (or pem) key for that instance. This only happens once and generating a new one can be complicated so please take care to put it somewhere secure. As such you might want to give your developer team another key which you can delete if the need arises without risking access to your services.

What is Tigera?

What is Tigera?

An AWS Advanced Technology Partner, Tigera delivers Calico and Calico Enterprise for security and networking on EKS, both of which are AWS Containers Competency certified.

Vezt

Vezt

Blockchain technology has the potential to be a windfall for musicians, filmmakers, and video game developers. With the advent of new technology, the way we consume entertainment is changing. Vezt assists artists in distributing their tracks on digital channels and in promoting their work.

Top Platforms for NFTs: Polygon and Flow

Top Platforms for NFTs: Polygon and Flow

As blockchain technology continues to develop, we are seeing an increase in the number of platforms, languages, and applications. Your works of art and collectables can now be presented and traded in the form of non-fungible tokens (NFTs), which are a relatively new development.

What are NFTs? Understanding Non-Fungible Tokens

What are NFTs? Understanding Non-Fungible Tokens

If you’ve been following the tech news lately, you’ve probably come across terms like Bitcoin, blockchain, and, more recently, non-fungible tokens (NFTs). Stories of multi-million dollar auctions for digital assets have piqued the interest of artists and collectors alike. However, what exactly are NFTs? And how do they operate?

How to Mint NFTs on Polygon

How to Mint NFTs on Polygon

Why should you learn how to mint NFTs on Polygon? Well, there is a rumor floating around that Coinbase is going to leverage Polygon for their NFT platform. Why would Coinbase use Polygon, the L2 layer that sits on top of Ethereum? The gas prices on Polygon are cheap and the protocol works.

Download our 10-Step Cloud Migration ChecklistYou'll get direct access to our full-length guide on Google Docs. From here, you will be able to make a copy, download the content, and share it with your team.