There is no better place to get inspired than at the AWS Innovation Day 2019 event in Sydney! This post mentions some of the advice provided by fellow innovators.
Did you know Content Delivery Networks are not only for static sites?
You probably know that you can speed up static web content delivery using a content delivery network (or CDN). But, in case you don’t know – a CDNs stores your static web content closer to your customer so that your content loads faster. But did you know that a CDN can also speed up dynamic content?
You can use the AWS CloudFront CDN to make your dynamic web content faster. AWS CloudFront does this by providing persistent TCP Connections, enhanced compression, and a super-fast (uncongested) global network. Visit https://infrastructure.aws/ to see just how extensive the AWS global network is!
You can go serverless with PHP on AWS Lambda!
Node.js is fantastic, but you can innovate with PHP too! AWS Lambda provides native support for Node.js and many other languages, but not so for PHP. PHP developers also want to write code and upload it to Lambda. No developer wants to provision or manage servers.
Why run PHP in Lambda? Well, that’s easy to answer! All service providers support PHP. PHP is super easy to use and often requires much less code (my opinion). The most significant benefit is the ability to port existing PHP code to the Lambda platform. Who likes to rework existing code? Just use a custom Lambda runtime to run your existing PHP code.
It is easy to know if you have been hacked!
Innovating new ideas can be hard when you have been hacked. Security is most definitely everyone’s concern and, as AWS says, “a shared responsibility”. Security is quite a broad topic, can be complicated, and sometimes requires specialized skills. Hackers love scanning IP ranges looking for vulnerable instances.
In comes AWS GuardDuty! This tool will help you to find hacked instances. AWS GuardDuty continuously monitors for malicious activity and strange behavior. It uses threat intelligence feeds, such as lists of malicious IPs and domains, and machine learning to identify unexpected and potentially malicious activity.
Thanks for sharing such a pleasant thought, article is fastidious, that’s why i have read it completely.