AWS Blog
AWS Webinars – October and November 2016
Are you keeping up with the latest developments in AWS-land? Do you have a good understanding of Amazon Redshift, Amazon ECS, and Amazon Cognito? Do you know what IoT is all about, and do you have firm grasp of the best security practices for your cloud workloads? Do you understand the EC2 Spot Market, and do you know how to use it to your advantage?
In pursuit of our focus on training and education, I am pleased to share the webinars that we have on tap for October and November. These are free, but they do fill up and I suggest that you register ahead of time. All times are PT and each webinar runs for one hour:
October 25
- 9:00 AM – Amazon ECS Deep Dive.
- 10:30 AM – Real-time Data Processing using AWS Lambda.
- Noon – Fast Data at Scale with Amazon ElastiCache for Redis.
October 26
- 9:00 AM – Add User Sign-In and Management to Your Apps with Amazon Cognito.
- 10:30 AM – Getting Started: Storage with Amazon S3 and Amazon Glacier.
- Noon – Build Scalable and Secure Mobile Applications with AWS.
- 1:30 PM – Amazon Redshift Deep Dive.
October 27
- 9:00 AM – Migrate your Existing Express Applications to AWS Lambda.
- 10:30 AM – The Lifecycle of an AWS IoT Thing – From Manufacture to Retirement.
- Noon – Best Practices for IoT Security in the Cloud.
November 8
- 9:00 AM – Getting Started with AWS.
- 10:30 AM – Setup Preconfigured Protections on AWS WAF.
- Noon – RDS for Oracle and SQL Server: Simplifying Your Database Management and Reducing Total Cost of Ownership.
November 9
- 9:00 AM – Configuration Management with AWS OpsWorks.
- Noon – Best Practices for Protecting Cloud Workloads.
November 10
- 9:00 AM – Getting Started with Amazon EC2 Spot: Save up to 90% on your EC2 Bill.
- 10:30 AM – Introduction to Three AWS Security Services: AWS IAM, AWS Config Rules, and AWS CloudTrail Services.
- Noon – Streamline Your Desktop Operations and Improve Security with Amazon WorkSpaces.
— Jeff;
PS – Don’t forget our upcoming re:Invent 2016 Preparation Webinars!
X1 Instance Update – X1.16xlarge + More Regions
Earlier this year we made the x1.32xlarge instance available. With nearly 2 TiB of memory, this instance type is a great fit for memory-intensive big data, caching, and analytics workloads. Our customers are running the SAP HANA in-memory database, large-scale Apache Spark and Hadoop jobs, and many types of high performance computing (HPC) workloads.
Today we are making two updates to the X1 instance type:
- New Instance Size – The new x1.16xlarge instance size provides another option for running smaller-footprint workloads.
- New Regions – The X1 instances are now available in three additional regions, bringing the total to ten.
New Instance Size
Here are the specifications for the new x1.16xlarge:
- Processor: 2 x Intel™ Xeon E7 8880 v3 (Haswell) running at 2.3 GHz – 32 cores / 64 vCPUs.
- Memory: 976 GiB with Single Device Data Correction (SDDC+1).
- Instance Storage: 1,920 GB SSD.
- Network Bandwidth: 10 Gbps.
- Dedicated EBS Bandwidth: 5 Gbps (EBS Optimized at no additional cost).
Like the x1.32xlarge, this instance supports Turbo Boost 2.0 (up to 3.1 GHz), AVX 2.0, AES-NI, and TSX-NI. They are available as On-Demand Instances, Spot Instances, or Dedicated Instances; you can also purchase Reserved Instances and Dedicated Host Reservations.
New Regions
Both sizes of X1 instances are available in the following regions:
- US East (Northern Virginia)
- US West (Oregon)
- Europe (Ireland)
- Europe (Frankfurt)
- Asia Pacific (Tokyo)
- Asia Pacific (Singapore)
- Asia Pacific (Sydney)
- Asia Pacific (Mumbai) – New
- AWS GovCloud (US) – New
- Asia Pacific (Seoul) – New
AWS Blog Usability Panel (Seattle or Remote)
In order to make sure that the AWS Blog is meeting your information and entertainment needs, we are planning to conduct some usability panels later this month. We are looking for a mix or local (Seattle) and remote participants with any level of experience reading the blog and/or using AWS. If you participate in a usability panel, you’ll receive an Amazon.com gift card as a token of our appreciation.
If you are interested in participating, sign up today.
— Jeff;
AWS Week in Review – October 3, 2016
Twenty external and internal contributors worked together to create this edition of the AWS Week in Review. If you would like to join the party (with the possibility of a free lunch at re:Invent), please visit the AWS Week in Review on GitHub.
New AWS Marketplace Products
New & Notable Open Source
- elastic-ci-stack-for-aws is a simple, flexible, auto-scaling cluster of build agents running in your own VPC.
- aws-lambda-ebs-backups contains Python scripts to be run using AWS’s Lambda service to Backup and Delete Snapshots of EBS Volumes.
- load-dyno-table is a DynamoDB table loader.
- letsencrypt-iam-lambda is an AWS Lambda function to take a received S3 event, and update a related certificate in AWS IAM.
- sundial is a job system for Amazon EC2 Container Service that manages dependencies and scheduling.
- jrestless is a frakework to help you build JAX-RS applications with serverless architectures using AWS Lambda.
- AWSLambda_CloudFrontMetaData is a Lambda Function to extract meta data (IP version, HTTP version, and Edge location) from customer visits to CloudFront.
- hologram implements easy, painless AWS credentials on developer laptops.
- og-aws is a practical guide to AWS.
- aws-secrets helps to manage secrets on EC2 instances with KMS encryption, IAM roles, and S3 storage.
New YouTube Videos
- Fusionex Migrates its Traditional Infrastructure and Goes to Market10 Times Faster.
- Toyota Tsusho Embraces AWS’s Cloud Technology to Empower its Traffic Monitoring Service in Bangkok.
- ClearScale: Continuous Automation with Docker on AWS.
Upcoming Events
- October 11 (Lyon, France) – AWSome Day Lyon in France.
- October 11 (Redwood City, California, USA) – AWS Bay Area Meetup #21. A focus on Spinnaker from Netflix.
- October 13 (Stuttgart, Germany) – Meetup #27 of the Stuttgart AWS User Group.
- October 13 (Edinburgh, Scotland) – 7th AWS User Group Edinburgh Meetup.
- October 13 (Birmingham, England) – AWS User Group West Midlands #8.
- October 13 (Warsaw, Poland) – Meetup of the Public Cloud User Group in Warsaw, Poland.
- October 14 (Seoul, Korea) – AWS Lambda Zombie Workshop.
- October 18-20 (San Francisco, California, USA) – Database week at the AWS Loft.
- October 19 (Seoul, Korea) – AWS Korea User Group Monthly Seminar – Database Service.
- October 19 (Lyon, France) – Meetup #4 of the Lyon AWS User Group.
- October 20 (Wellington, New Zealand) – AWS Wellington User Group – #11 – IoT and Serverless in the Enterprise.
- October 26 (Cambridge, England) – Meetup #9 of the Cambridge AWS User Group: Everything Mobile.
- October 26 (Dublin, Ireland) – Meetup #16 of the AWS User Group Network in Dublin.
- November 8 (London, England) – AWS Enterprise Summit London.
- November 23 (Cardiff, Wales) – Meetup #4 of the AWS South Wales User Group.
Help Wanted
- Linux Cloud Engineer at Red Wire Services (100% AWS Role, AWS Advanced Consulting Partner).
- Teridion Sales Engineer (Cloud Optimized Routing for SaaS).
- AWS Careers.
Stay tuned for next week! In the meantime, follow me on Twitter and subscribe to the RSS feed.
Snowball HDFS Import
If you are running MapReduce jobs on premises and storing data in HDFS (the Hadoop Distributed File System), you can now copy that data directly from HDFS to an AWS Import/Export Snowball without using an intermediary staging file. Because HDFS is often used for Big Data workloads, this can greatly simplify the process of importing large amounts of data to AWS for further processing.
To use this new feature, download and configure the newest version of the Snowball Client on the on-premises host that is running the desired HDFS cluster. Then use commands like this to copy files from HDFS to S3 via Snowball:
$ snowball cp -n hdfs://HOST:PORT/PATH_TO_FILE_ON_HDFS s3://BUCKET-NAME/DESTINATION-PATH
You can use the -r option to recursively copy an entire folder:
$ snowball cp -n -r hdfs://HOST:PORT/PATH_TO_FOLDER_ON_HDFS s3://BUCKET_NAME/DESTINATION_PATH
To learn more, read Using the HDFS Client.
— Jeff;IPv6 Support Update – CloudFront, WAF, and S3 Transfer Acceleration
As a follow-up to our recent announcement of IPv6 support for Amazon S3, I am happy to be able to tell you that IPv6 support is now available for Amazon CloudFront, Amazon S3 Transfer Acceleration, and AWS WAF and that all 60+ CloudFront edge locations now support IPv6. We are enabling IPv6 in a phased rollout that starts today and will extend across all of the networks over the next few weeks.
CloudFront IPv6 Support
You can now enable IPv6 support for individual Amazon CloudFront distributions. Viewers and networks that connect to a CloudFront edge location over IPv6 will automatically be served content over IPv6. Those that connect over IPv4 will continue to work as before. Connections to your origin servers will be made using IPv4.
Newly created distributions are automatically enabled for IPv6; you can modify an existing distribution by checking Enable IPv6 in the console or setting it via the CloudFront API:

Here are a couple of important things to know about this new feature:
- Alias Records – After you enable IPv6 support for a distribution, the DNS entry for the distribution will be updated to include an AAAA record. If you are using Amazon Route 53 and an alias record to map all or part of your domain to the distribution, you will need to add an AAAA alias to the domain.
- Log Files – If you have enabled CloudFront Access Logs, IPv6 addresses will start to show up in the c-ip field; make sure that your log processing system knows what to do with them.
- Trusted Signers -If you make use of Trusted Signers in conjunction with an IP address whitelist, we strongly recommend the use of an IPv4-only distribution for Trusted Signer URLs that have an IP whitelist and a separate, IPv4/IPv6 distribution for the actual content. This model sidesteps an issue that would arise if the signing request arrived over an IPv4 address and was signed as such, only to have the request for the content arrive via a different, IPv6 address that is not on the whitelist.
- CloudFormation – CloudFormation support is in the works. With today’s launch, distributions that are created from a CloudFormation template will not be enabled for IPv6. If you update an existing stack, the setting will remain as-is for any distributions referenced in the stack..
- AWS WAF – If you use AWS WAF in conjunction with CloudFront, be sure to update your WebACLs and your IP rulesets as appropriate in order to whitelist or blacklist IPv6 addresses.
- Forwarded Headers – When you enable IPv6 for a distribution, the X-Forwarded-For header that is presented to the origin will contain an IPv6 address. You need to make sure that the origin is able to process headers of this form.
To learn more, read IPv6 Support for Amazon CloudFront.
AWS WAF IPv6 Support
AWS WAF helps you to protect your applications from application-layer attacks (read New – AWS WAF to learn more).
AWS WAF can now inspect requests that arrive via IPv4 or IPv6 addresses. You can create web ACLs that match IPv6 addresses, as described in Working with IP Match Conditions:

All existing WAF features will work with IPv6 and there will be no visible change in performance. The IPv6 will appear in the Sampled Requests collected and displayed by WAF:

S3 Transfer Acceleration IPv6 Support
This important new S3 feature (read AWS Storage Update – Amazon S3 Transfer Acceleration + Larger Snowballs in More Regions for more info) now has IPv6 support. You can simply switch to the new dual-stack endpoint for your uploads. Simply change:
https://BUCKET.s3-accelerate.amazonaws.com
to
https://BUCKET.s3-accelerate.dualstack.amazonaws.com
Here’s some code that uses the AWS SDK for Java to create a client object and enable dual-stack transfer:
AmazonS3Client s3 = new AmazonS3Client();
s3.setS3ClientOptions(S3ClientOptions.builder().enableDualstack().setAccelerateModeEnabled(true).build());
Most applications and network stacks will prefer IPv6 automatically, and no further configuration should be required. You should plan to take a look at the IAM policies for your buckets in order to make sure that they will work as expected in conjunction with IPv6 addresses.
To learn more, read about Making Requests to Amazon S3 over IPv6.
Don’t Forget to Test
As a reminder, if IPv6 connectivity to any AWS region is limited or non-existent, IPv4 will be used instead. Also, as I noted in my earlier post, the client system can be configured to support IPv6 but connected to a network that is not configured to route IPv6 packets to the Internet. Therefore, we recommend some application-level testing of end-to-end connectivity before you switch to IPv6.
New – CloudWatch Plugin for collectd
You have had the power to store your own business, application, and system metrics in Amazon CloudWatch for quite some time (see New – Custom Metrics for Amazon CloudWatch to learn more). As I wrote way back in 2011 when I introduced this feature, “You can view graphs, set alarms, and initiate automated actions based on these metrics, just as you can for the metrics that CloudWatch already stores for your AWS resources.”
Today we are simplifying the process of collecting statistics from your system and getting them in to CloudWatch with the introduction of a new CloudWatch plugin for collectd. By combining collectd‘s ability to gather many different types of statistics with the CloudWatch features for storage, display, alerting, and alarming, you can become better informed about the state and performance of your EC2 instances and your on-premises hardware and the applications running on them. The plugin is being released as an open source project and we are looking forward to your pull requests.
The collectd daemon is written in C for performance and portability. It supports over one hundred plugins, allowing you to collect statistics on Apache and Nginx web server performance, memory usage, uptime, and much more.
Installation and Configuration
I installed and configured collectd and the new plugin on an EC2 instance in order to see it in action.
To get started I created an IAM Policy with permission to write metrics data to CloudWatch:

Then I created an IAM Role that allows EC2 (and hence the collectd code running on my instance) to use my Policy:

If I was planning to use the plugin to collect statistics from my on-premises servers or if my EC2 instances were already running, I could have skipped these steps, and created an IAM user with the appropriate permissions instead. Had I done this, I would have had to put the user’s credentials on the servers or instances.
With the Policy and the Role in place, I launched an EC2 instance and selected the Role:

I logged in and installed collectd:
$ sudo yum -y install collectd
Then I fetched the plugin and the install script, made the script executable, and ran it:
$ chmod a+x setup.py
$ sudo ./setup.py
I answered a few questions and the setup ran without incident, starting up collectd after configuring it:
Installing dependencies ... OK
Installing python dependencies ... OK
Copying plugin tar file ... OK
Extracting plugin ... OK
Moving to collectd plugins directory ... OK
Copying CloudWatch plugin include file ... OK
Choose AWS region for published metrics:
1. Automatic [us-east-1]
2. Custom
Enter choice [1]: 1
Choose hostname for published metrics:
1. EC2 instance id [i-057d2ed2260c3e251]
2. Custom
Enter choice [1]: 1
Choose authentication method:
1. IAM Role [Collectd_PutMetricData]
2. IAM User
Enter choice [1]: 1
Choose how to install CloudWatch plugin in collectd:
1. Do not modify existing collectd configuration
2. Add plugin to the existing configuration
Enter choice [2]: 2
Plugin configuration written successfully.
Stopping collectd process ... NOT OK
Starting collectd process ... OK
$
With collectd running and the plugin installed and configured, the next step was to decide on the statistics of interest and configure the plugin to publish them to CloudWatch (note that there is a per-metric cost so this is an important step).
The file /opt/collectd-plugins/cloudwatch/config/blocked_metrics contains a list of metrics that have been collected but not published to CloudWatch:
$ cat /opt/collectd-plugins/cloudwatch/config/blocked_metrics
# This file is automatically generated - do not modify this file.
# Use this file to find metrics to be added to the whitelist file instead.
cpu-0-cpu-user
cpu-0-cpu-nice
cpu-0-cpu-system
cpu-0-cpu-idle
cpu-0-cpu-wait
cpu-0-cpu-interrupt
cpu-0-cpu-softirq
cpu-0-cpu-steal
interface-lo-if_octets-
interface-lo-if_packets-
interface-lo-if_errors-
interface-eth0-if_octets-
interface-eth0-if_packets-
interface-eth0-if_errors-
memory--memory-used
load--load-
memory--memory-buffered
memory--memory-cached
I was interested in memory consumption so I added one line to /opt/collectd-plugins/cloudwatch/config/whitelist.conf:
memory--memory-.*
The collectd configuration file (/etc/collectd.conf) contains additional settings for collectd and the plugins. I did not need to make any changes to it.
I restarted collectd so that it would pick up the change:
$ sudo service collectd restart
I exercised my instance a bit in order to consume some memory, and then opened up the CloudWatch Console to locate and display my metrics:

This screenshot includes a preview of an upcoming enhancement to the CloudWatch Console; don’t worry if yours doesn’t look as cool (stay tuned for more information on this).
If I had been monitoring a production instance, I could have installed one or more of the collectd plugins. Here’s a list of what’s available on the Amazon Linux AMI:
$ sudo yum list | grep collectd
collectd.x86_64 5.4.1-1.11.amzn1 @amzn-main
collectd-amqp.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-apache.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-bind.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-curl.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-curl_xml.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-dbi.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-dns.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-email.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-generic-jmx.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-gmond.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-ipmi.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-iptables.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-ipvs.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-java.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-lvm.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-memcachec.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-mysql.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-netlink.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-nginx.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-notify_email.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-postgresql.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-rrdcached.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-rrdtool.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-snmp.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-varnish.x86_64 5.4.1-1.11.amzn1 amzn-main
collectd-web.x86_64 5.4.1-1.11.amzn1 amzn-main
Things to Know
If you are using version 5.5 or newer of collectd, four metrics are now published by default:
- df-root-percent_bytes-used – disk utilization
- memory–percent-used – memory utilization
- swap–percent-used – swap utilization
- cpu–percent-active – cpu utilization
You can remove these from the whitelist.conf file if you don’t want them to be published.
The primary repositories for the Amazon Linux AMI, Ubuntu, RHEL, and CentOS currently provide older versions of collectd; please be aware of this change in the default behavior if you install from a custom repo or build from source.
Lots More
There’s quite a bit more than I had time to show you. You can install more plugins and then configure whitelist.conf to publish even more metrics to CloudWatch. You can create CloudWatch Alarms, set up Custom Dashboards, and more.
To get started, visit AWS Labs on GitHub and download the CloudWatch plugin for collectd.
— Jeff;
Running Express Applications on AWS Lambda and Amazon API Gateway
Express is a web framework for Node.js . It simplifies the development of “serverless” web sites, web applications, and APIs. In a serverless environment, most or all of the backend logic is run on-demand in a stateless fashion (see Mike Roberts’ article on Serverless Architectures for a more detailed introduction). AWS Lambda, when used in conjunction with the new Amazon API Gateway features that I blogged about earlier this month (API Gateway Update – New Features Simplify API Development), allows existing Express applications to be run in serverless fashion. When you use API Gateway you have the opportunity to take advantage of additional features such as Usage Plans which allow you to build a developer ecosystem around your APIs, and caching which allows you to build applications that are responsive and cost-effective.
In order to help you to migrate your Express applications to Lambda and API Gateway, we have created the aws-serverless-express package. This package contains a working example that you can use as a starting point for your own work.
I have two resources that you can use to migrate your Express code and applications to API Gateway and Lambda:
- Running Express Apps in AWS Lambda shows you how to use Claudia.js and the aws-serverless-express module to deploy your application. You simply remove the existing TCP listener, create a Lambda proxy wrapper, and deploy!
- Going Serverless: Migrating an Express Application to Amazon API Gateway and AWS Lambda goes in to a bit more depth than the previous post. For example, it shows you how to set up environment variables, manage database connections, and provides some guidance on efficient hosting of static assets. The post also details the entire release process and introduces some other Lambda and API Gateway features that might be of interest to you.
AWS Week in Review – September 27, 2016
Fourteen (14) external and internal contributors worked together to create this edition of the AWS Week in Review. If you would like to join the party (with the possibility of a free lunch at re:Invent), please visit the AWS Week in Review on GitHub.
New & Notable Open Source
- dynamodb-continuous-backup sets up continuous backup automation for DynamoDB.
- lambda-billing uses NodeJS to automate billing to AWS tagged projects, producing PDF invoices.
- vyos-based-vpc-wan is a complete Packer + CloudFormation + Troposphere powered setup of AMIs to run VyOS IPSec tunnels across multiple AWS VPCs, using BGP-4 for dynamic routing.
- s3encrypt is a utility that encrypts and decrypts files in S3 with KMS keys.
- lambda-uploader helps to package and upload Lambda functions to AWS.
- AWS-Architect helps to deploy microservices to Lambda and API Gateway.
- awsgi is an WSGI gateway for API Gateway and Lambda proxy integration.
- rusoto is an AWS SDK for Rust.
- EBS_Scripts contains some EBS tricks and triads.
- landsat-on-aws is a web application that uses Amazon S3, Amazon API Gateway, and AWS Lambda to create an infinitely scalable interface to navigate Landsat satellite data.
New SlideShare Presentations
- AWS Enterprise Summit Toronto:
- Keynote – Future of Enterprise IT.
- Getting Started with Amazon Aurora.
- Getting Started with The Hybrid Cloud – Enterprise Backup and Recovery.
- Cost Optimization at Scale.
- Protecting Your Data in AWS.
- Getting Started with Amazon Redshift.
- DevOps on AWS – Deep Dive on Continuous Delivery.
- DevOps on AWS – Deep Dive on Infrastructure as Code.
- AWS Business Essentials.
- Database Migration.
- Getting Started with Amazon WorkSpaces.
- Creating Your Virtual Data Center.
- Breaking Down the Economics and TCO of Migrating to AWS.
- Keeping Cloud Transformations on Track.
- Getting Started with AWS Security.
- Architecting Microservices on AWS.
- Getting Started with Windows Workloads on EC2.
- Another Day, Another Billion Packets.
- AWS September 2016 Webinars:
- AWS Services Overview.
- Amazon Aurora New Features.
- Building Real-Time Data Analytics Applications on AWS.
- Getting Started with Managed Database Services on AWS.
- Getting Started with AWS IoT.
- Serverless Geospatial Mobile Apps with AWS.
- Coding Apps in the Cloud to Reduce Costs up to 90%.
- Addressing Amazon Inspector Assessment Findings.
- Automating Compliance Defense in the Cloud.
- Overview and Best Practices for Amazon Elastic Block Store.
- AWS Infrastructure as Code.
- Building a Recommendation Engine Using Amazon Machine Learning in Real-time.
- Create Cloud Services on AWS.
- Alexa IoT Skills Workshop.
- Connecting to AWS IoT.
- Best Practices of IoT in the Cloud.
- Programming the Physical World with Device Shadows and Rules Engine.
- Overview of IoT Infrastructure and Connectivity at AWS & Getting Started with AWS IoT.
- Optimize Developer Agility & App Delivery on AWS.
- The New Normal: Benefits of Cloud Computing and Defining your IT Strategy.
- Security and Compliance.
New AWS Marketplace Listings
- Application Development:
- KloudGin Mobile and Web Cloud Platform, sold by KloudGin Inc
- LAMP Stack With Virtualmin, sold by Aurora
- SmartAMI SQLSplitter powered by MarioDB MaxScale, sold by AT-NET
- WinDocks Community Edition with SQL Server 2014 Express (HVM), sold by Code Creator
- Business Intelligence:
- Simego Data Synchronisation Studio, sold by Simego Ltd
- WebFOCUS Business User Edition, sold by Information Builders
- Content Management:
- Microsoft SharePoint Enterprise 2016 for AWS Business, sold by Data Resolution
- CRM:
- SuiteCRM powered by Symetricore, sold by Symetricore
- Databases:
- HR:
- Sentrifugo (HRMS), sold by Code Creator
- Network Infrastructure:
- FreePBX powered by Symetricore (Centos Edition), sold by Symetricore
- Security:
- Database Security and Compliance – On Demand, sold by HexaTier
Upcoming Events
- October 6 (Hull, England) – AWS User Group Hull: Running Containerised Apps on AWS.
- October 10 (Oslo, Norway) – AWS User Group Norway: Say Hello to Alexa!.
- October 10 (Seoul, Korea) – AWS Partner-led Hands-on Labs.
- October 11 (Redwood City, California, USA) – AWS Bay Area Meetup #21. A focus on Spinnaker from Netflix.
- October 13 (Edinburgh, Scotland) – 7th AWS User Group Edinburgh Meetup.
- October 13 (Seoul, Korea) – AWS Enterprise Summit.
- October 13 (Warsaw, Poland) – Meetup of the Public Cloud User Group in Warsaw, Poland.
- October 14 (Seoul, Korea) – AWS Lambda Zombie Workshop.
- October 19 (Seoul, Korea) – AWS Korea User Group Monthly Seminar – Database Service.
- October 26 (Cambridge, England) – Meetup #9 of the Cambridge AWS User Group: Everything Mobile.
- October 26 (Dublin, Ireland) – Meetup #16 of the AWS User Group Network in Dublin.
- November 23 (Cardiff, Wales) – Meetup #4 of the AWS South Wales User Group.
Help Wanted
- Linux Cloud Engineer at Red Wire Services (100% AWS Role, AWS Advanced Consulting Partner).
- Teridion Sales Engineer (Cloud Optimized Routing for SaaS).
- AWS Careers.
Stay tuned for next week! In the meantime, follow me on Twitter and subscribe to the RSS feed.
Prepare for re:Invent 2016 – Attend our Upcoming Webinars!
We are 60 days away from AWS re:Invent 2016! I’m already working on a big pile of blog posts and my colleagues are working night and day to make sure that you have plenty of opportunities to learn about our services. With two new venues, hands-on labs, certification exams, a full day of additional content, and the re:Source Mini Con (full day technical deep dives), and twice as many breakout sessions as last year, I am confident that you will have plenty to do during the day. After that, we have some great after-hours experiences on the agenda, including the famous wing eating contest, and expanded Pub Crawl, a Harley Ride, the re:Play party, and the re:Invent 5k (that’s kilometers, not kilobytes).
In order to make sure that you are fully prepared before you arrive in Las Vegas, we have put together three webinars. These are free and optional, but I’d recommend attending in order to make sure that you are positioned to make the most of your trip.
Here’s what we have:
How to Reserved Your Seats -We expect to have over 450 breakout sessions spread across 20 or so tracks. This year, based on your feedback, you will be able to reserve your seats ahead of time. That way you can make better plans and remove some uncertainty. In the webinar, you’ll learn how to reserve seats and build your calendar using our online tool. Here are the webinar sessions (all times are PT):
- October 12, 2016 – 9 to 10 AM.
- October 12, 2016 – 6 to 7 PM.
Deep Dive on AWS re:Invent 2016 Breakout Sessions – Each of the tracks that I mentioned above will contain sessions at the introductory, advanced, and expert levels. This webinar will help you to learn more about the tracks and the sessions so that you can start to prepare your schedule. Again, the sessions, with times in PT:
- October 17, 2016 – 9 to 10 AM.
- October 17, 2016 – 6 to 7 PM.
Know Before You Go – The webinar will provide you with the big picture: keynotes, breakout sessions, training and certification, re:Invent Central, networking opportunities, and our popular after-hours activities.
- November 16, 2016 – 9 to 10 AM.
- November 16, 2016 – 5 to 6 PM.
PS -As we get closer to the big event, I know that many past attendees and AWS Partners will be publishing how-to guides of their own. Time permitting (hah!) I’ll put together a round-up of these posts.
