info@tutostartup.com | tutostartup.com is for sale!

AWS Security Profile: Ritesh Desai, GM, AWS Secrets Manager

TutoSartup excerpt from this article:
This interview features Ritesh Desai, General Manager, AWS Secrets Manager, and re:Inforce 2023 session speaker, who shares thoughts on data protection, cloud security, secrets management, and more…
How did you get started in the data protection and secrets management space? What about it piqued your interest?
I’ve always been excited at the prospect of solving complex customer problems wit…

Host ML models on Amazon SageMaker using Triton: CV model with PyTorch backend

TutoSartup excerpt from this article:
In this post, we dive deep to see how Amazon SageMaker can serve these PyTorch models using NVIDIA Triton Inference Server…
SageMaker provides several options for customers who are looking to host their ML models… For example, your business may rely on a model that must meet very strict SLAs for latency and throughput with predictable performance… In this case, SageMaker provides single-mo…

Configure and use defaults for Amazon SageMaker resources with the SageMaker Python SDK

TutoSartup excerpt from this article:
To ensure the SageMaker training and deployment of ML models follow these guardrails, it’s a common practice to set restrictions at the account or AWS Organizations level through service control policies and AWS Identity and Access Management (IAM) policies to enforce the usage of specific IAM roles, Amazon Virtual Private Cloud (Amazon VPC) configurations, and AWS Key Management Service (AWS K…

Large-scale digital biomarker computation with AWS serverless services

TutoSartup excerpt from this article:
This approach generates large amounts of data that requires processing…
Digital biomarker data is typically saved in different formats, and various sources require different (and often multiple) processing steps… The key component in re-designing the pipeline is flexibility so the platform can:

Handle various incoming data sources and different algorithms
Handle distinct sets of algori…

Managing data confidentiality for Scope 3 emissions using AWS Clean Rooms

TutoSartup excerpt from this article:

In this blog, we show how to use AWS Clean Rooms to share Scope 3 emissions data between a reporting company and two of their value chain partners (a raw material purchased goods supplier and a transportation provider)… Data confidentially requirements are specified by each organization before participating in the data AWS Clean Rooms collaboration (see Figure 1)…

Overview of solution
In…

Get custom data into Amazon Security Lake through ingesting Azure activity logs

TutoSartup excerpt from this article:

In this blog post, I will show you how to configure your Amazon Security Lake solution with cloud activity data from Microsoft Azure Monitor activity log, which you can query alongside your existing AWS CloudTrail data… I will walk you through the required steps — from configuring the required AWS Identity and Access Management (IAM) permissions, AWS Glue jobs, and Amazon Kinesis Data Stream…

Amazon Security Lake is now generally available

TutoSartup excerpt from this article:
Security Lake centralizes security data from Amazon Web Services (AWS) environments, software as a service (SaaS) providers, on-premises, and cloud sources into a purpose-built data lake that is stored in your AWS account… With Open Cybersecurity Schema Framework (OCSF) support, the service normalizes and combines security data from AWS and a broad range of security data sources… This helps p…