Skip to content
Learn The Content
Learn The Content
Home
About Us
Login
Register
Profile
Home
Profile
Conchita Moya
This user account status is Approved
About
About
Posts
Posts
Comments
Comments
Public data is meant for everyone to see, while confidential data is restricted to certain individuals or groups due to…
On
Data classification based on requirements
Can someone help with an issue where IAM policy simulator says access is allowed but I'm still getting denied?
On
How to troubleshoot authentication issues (for example, by using CloudTrail, IAM Access Advisor, and IAM policy simulator)
Insightful post. However, it would be helpful to include more on budgeting the cost of log storage.
On
Configuring network monitoring and logging by using AWS solutions
Has anyone here used both AWS Glue and Amazon EMR for batch processing? Which one do you find more efficient?
On
Orchestrate data ingestion pipelines (batch-based ML workloads and streaming-based ML workloads) – Amazon Kinesis , Amazon Kinesis Data Firehose , Amazon EMR , AWS Glue , Amazon Managed Service for Apache Flink
Good insights. Implementing controls through AWS Control Tower made our compliance checks easier.
On
Implementing SCPs as a technical solution to enforce a policy (for example, limitations on the use of a root account, implementation of controls in AWS Control Tower)
The part about visualizing logs was a bit unclear. Can someone explain?
On
Creating metric filters and dashboards to detect anomalous activity (for example, by using Amazon CloudWatch)
Appreciate the effort put into this blog post. Very informative.
On
Change management processes
Great post, really helpful tips on handling outliers.
On
Analyze and evaluate feature engineering concepts (for example, binning, tokenization, outliers, synthetic features, one-hot encoding, reducing dimensionality of data).
Just a suggestion, but including a couple of case studies could be really useful.
On
Performing data transfer modeling and selecting services to reduce data transfer costs
I appreciate the breakdown of services related to compute workload security.
On
Services that scan for vulnerabilities in compute workloads (for example, Amazon Inspector, Amazon Elastic Container Registry [Amazon ECR])
load more comments
Search for: