Chapters 1, 2 - Intro and 10,00 Feet Overview Which statement best describes Availability Zones? Distinct locations from within an AWS region that are engineered to be isolated from failures. Fill in the Blanks: AWS ___________________ allows organizations to do complex analysis on large volumes of data. Elastic Map Reduce What does an AWS Region consist of? An independent collection of AWS computing resources in a defined geography. AWS NoSQL product offering is known as... DynamoDB An AWS VPC is a component of which AWS service? Networking Service. In what year did Amazon move Amazon.com to AWS? 2010 What is the difference between Elastic Beanstalk &CloudFormation? Elastic Beanstalk automatically handles the deployment, from capacity provisioning, load balancing, auto-scaling to application health monitoring based on the code you upload to it, where as CloudFormation is an automated provisioning engine designed to deploy entire cloud environments via a JSON ...
The Netflix Tech Blog: Linux Performance Analysis in 60,000 Milliseconds : You login to a Linux server with a performance issue: what do you check in the first minute? At Netflix we have a massive EC2 Linux cloud,...
As we all know by now, the partly successful attempt to hack Google's corporate network was accomplished by exploiting the Zero-Day IE flaw and in the case Adobe the Zero-Day vulnerability in Adobe's Reader was used. Once the hacker(s) gained control of workstations inside the networks of Google and Adobe they installed a Trojan program called Trojan.Hydraq in order to siphon credentials and other data to further infiltrate the company networks and spread the attack. Adobe isn't saying much other than acknowledging and that no customer / employee data was compromised. All in all , no one really knows the whole truth. However it is clear these were "highly coordinated and sophisticated" attacks originating from China, as was described by a Google spokesperson. THIS IS YET ANOTHER REASON NOT TO USE THE IE BROWER -- DOWNLOAD FIREFOX TODAY! Read Entire Story @ ThreatLevel
Comments
Post a Comment