Three AWSome learnings from fellow innovators

A Full house at AWS Innovation Day 2019 in Sydney

There is no better place to get inspired than at the AWS Innovation Day 2019 event in Sydney! This post mentions some of the advice provided by fellow innovators.

Did you know Content Delivery Networks are not only for static sites?

You probably know that you can speed up static web content delivery using a content delivery network (or CDN). But, in case you don’t know – a CDNs stores your static web content closer to your customer so that your content loads faster. But did you know that a CDN can also speed up dynamic content?

You can use the AWS CloudFront CDN to make your dynamic web content faster. AWS CloudFront does this by providing persistent TCP Connections, enhanced compression, and a super-fast (uncongested) global network. Visit to see just how extensive the AWS global network is!

You can go serverless with PHP on AWS Lambda!

Node.js is fantastic, but you can innovate with PHP too! AWS Lambda provides native support for Node.js and many other languages, but not so for PHP. PHP developers also want to write code and upload it to Lambda. No developer wants to provision or manage servers.

Why run PHP in Lambda? Well, that’s easy to answer! All service providers support PHP. PHP is super easy to use and often requires much less code (my opinion).  The most significant benefit is the ability to port existing PHP code to the Lambda platform. Who likes to rework existing code? Just use a custom Lambda runtime to run your existing PHP code.

It is easy to know if you have been hacked!

Innovating new ideas can be hard when you have been hacked. Security is most definitely everyone’s concern and, as AWS says, β€œa shared responsibility”.  Security is quite a broad topic, can be complicated, and sometimes requires specialized skills. Hackers love scanning IP ranges looking for vulnerable instances.

In comes AWS GuardDuty! This tool will help you to find hacked instances. AWS GuardDuty continuously monitors for malicious activity and strange behavior. It uses threat intelligence feeds, such as lists of malicious IPs and domains, and machine learning to identify unexpected and potentially malicious activity.

You may also be interested in

About the Authors

Anto's editorial team loves the cloud as much as you! Each member of Anto's editorial team is a Cloud expert in their own right. Anto Online takes great pride in helping fellow Cloud enthusiasts. Let us know if you have an excellent idea for the next topic! Contact Anto Online if you want to contribute.

Support the Cause

Support Anto Online and buy us a coffee. Anything is possible with coffee and code.

Buy me a coffee

About Anto Online

Having started his career in 1999 as a Desktop Support Engineer, Anto soon changed paths and became a developer. After several years of development experience, he transitioned into a consultant. As an enterprise application consultant for a leading SaaS software provider, Anto specializes in AWS's serverless technologies. By day, Anto focuses on helping customers leverage the power of serverless technologies. By night, he indulges his passion for cloud computing by playing with Python and trying out things that are currently beyond the scope of his work. Sometimes Anto needs help as there are not enough hours at night. So Anto relies on a team of fellow Cloud enthusiasts to help him out. Each one is a Cloud expert in their own right, and Anto takes great pride in helping them learn and grow.

View all posts by Anto Online →

One Comment on “Three AWSome learnings from fellow innovators”

  1. Thanks for sharing such a pleasant thought, article is fastidious, that’s why i have read it completely.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.