If an insider could leak me a copy of the AWS Approved bone-in ham, that would be terrific.

Thank you in advance.
“I can’t give you a copy of it; it wouldn’t be kosher.”
If I give a talk using The Ham then AWS might pressure Twitter to bánh mì.
This terrible pun was endorsed by Amazon Snowball.
(Yes, that’s a reference to George Orwell’s “Animal Device Farm.”)

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with HydroxyCoreyQuinn

HydroxyCoreyQuinn Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @QuinnyPig

3 Nov
The @LastWeekinAWS annual charity t-shirt fundraiser wrapped up yesterday. You wonderful, amazing people helped us raise $15,225 for @826National with exactly 500 shirts sold. The check is on the way, 826 folks.
I was out on parental leave for most of this. Some amazing people stepped up to help make this possible. Their work happened behind the scenes, though you clearly saw the results of it.
First, our delightful copywriter Lianna (@punchlinecopy). She's the only writer I've ever worked with where I have to say "that's HILARIOUS, but it's a bit TOO edgy." She's incredible.
Read 8 tweets
3 Nov
Middle of the night alert from my @Synology. "Security risk found!"

The risk in question: I haven't bound SSH to a non-standard port.
Security myth: binding SSH to a non-standard port is somehow safer.

In practice, use keypair auth only; then the only benefit of a non-standard port is that your logs don't fill up with brute force attempts.
Security myth: rotate your @awscloud IAM credentials frequently so your console doesn't yell at you.

In practice, compromised keys are exploited in less time than it takes to microwave a burrito. Use role assumption if you can, but rotating keys is busywork.
Read 29 tweets
22 Oct
It's time again for a "Cooking with Corey" tweet thread, since I still have to eat while out on parental leave.

I'm no @darth, but today's episode focuses on potato chips. Let's begin.
We start with the noble potato. Scrub it thoroughly; it's been in the dirt for way longer than five seconds. Image
Next it's time for the Deadly Mandoline. Wear hand protection unless you don't want to have that hand intact anymore. Image
Read 10 tweets
22 Oct
In which @monkchips tries to convince us that Giraffes (along with their query language) are real. Image
The search for a multi-cloud success story continues. Image
My computer grows scared of what @monkchips might say next. Image
Read 14 tweets
25 Sep
Anomaly Detection for @awscloud bills is stupidly hard to get right. I’m optimistic about what they’ve built—now let’s see how it works in the wild! aws.amazon.com/blogs/aws-cost…
Me: “How hard could it possibly be?!”
@mike_julian, monitoring wizard: “Oh my sweet summer child.”
...there might be some @awscloud UX teething issues. ImageImage
Read 11 tweets
24 Sep
I'm about to make fun of everything sacred when I commandeer a @ChaosSearch webinar. chaossearch.io/data-lakes-2.0…
Judging by the pictures, one of us enjoys this. The other enjoys this not at all. Image
The platypus in the corner is the only image on this slide that has any spirit whatsoever. Image
Read 5 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!

Follow Us on Twitter!