Multimodal evaluators: MLLM-as-a-judge for image-to-text tasks in Strands Evals

TutoSartup excerpt from this article:
If you’re building visual shopping, image or document understanding, or chart analysis, you need a way to verify whether your model’s response is actually grounded in the source image... A text-only evaluator cannot tell you whether a caption faithfully describes an image, whether an extracted invoice total matches the document, or whether a screen summary hallucinated a button that was never ...

AWS Security Hub Extended: Why enterprise security products should sell themselves

TutoSartup excerpt from this article:
Our largest security services customers started the same way every customer does – with a click... We believe customers should have this same frictionless adoption experience and flexibility for all best-in-class security products and that’s why we developed Security Hub Extended... In our second post, we walked through how it works technically, including the onboarding flow, the pricin...

Cyber resilience on AWS: A reference approach for recovery from ransomware and destructive events

TutoSartup excerpt from this article:
Cyber resilience is the ability to recover workloads to a known-good state after an adversary has affected the environment... Cyber resilience focuses on recovery: restoring a trustworthy environment when backups, credentials, or parts of the infrastructure can no longer be assumed to be safe... For organizations running critical workloads on AWS, ransomware, data extortion, and other destructive...

Build real-time voice applications with Amazon SageMaker AI and vLLM

TutoSartup excerpt from this article:
Voice agents, live captioning, contact center analytics, and accessibility tools all depend on real-time speech-to-text, where your application streams audio in and receives transcription back simultaneously over a single persistent connection... Starting November 2025, you can stream data continuously in both directions between your clients and model containers using Amazon SageMaker AI bidirect...

Real Yields Near 20-Year Highs As Energy Shock Continues

TutoSartup excerpt from this article:
The 10‑year real US Treasury yield is hovering near a 20‑year high, with the 5‑year not far behind... Whether this is a good moment to lock in inflation‑indexed yields may hinge on how the Gulf crisis evolves in the months ahead...The recent surge in Treasury yields has strengthened the case for holding bonds, and real yields are no exception... After years of volatility—including ...

CIRT insights: How to help prevent unauthorized account removals from AWS Organizations

TutoSartup excerpt from this article:
This post examines a new approach we’re seeing threat actors use after they gain control of a customer account, which is to remove it from the customer’s AWS Organizations implementation and the policies and protections that structure provides... The described tactic doesn’t take advantage of vulnerabilities within AWS services, instead it uses an unexpected opportunity created by a speci...

Governing infrastructure as code using pattern-based policy as code

TutoSartup excerpt from this article:
In one environment, a workload might be deployed in an AWS Region that was never approved for that class of data... A pattern-based policy model makes those checks more straightforward to review, maintain, and explain... Teams can organize policy checks around recurring control patterns such as required metadata, allowed configuration, exposure restriction, protection enforcement, and privilege ...