Starts with a prepared video set to "Balance in the Universe" by Evandro Marconi Rocco.
And @stephenschmidt takes the stage with an "ADHD is not a disability" shirt.
Respect.
266 sessions over 2 days, or roughly half a session per @awscloud service.
Here are the 5 #reInforce tracks. Not to be confused with the 6 pillars of the Well Architected Framework, or the 4 million dollars you lost on deploying the first version of Macie.
Now @StephenSchmitd refuses to shut the hell up about CrossFit.
"Challenge Coins" is the best description ever for the money you pay for your AWS bill overages.
Now a slide with Singapore and Laramie (Wyoming) on a globe to juxtapose a megacity with a hick town that nobody could possibly give less of a shit about.
Apologies to both of the people in Laramie angrily riding their horses to Nebraska to find wifi so they can yell at me.
Talking about the value of scale; the things they learn from one company apply to other customers globally.
Also highlighting the defense in depth approach that AWS takes. He's correct; they're very very good at this.
Now talking about GuardDuty; apparently the people in the front row look like they have extra money or something.
"Products and services aren't shipped without a security review first."
Azure should take notes here.
And now "some lessons I have learned at CISO of AWS before becoming Amazon's CSO" says @stephenschmidt.
Wrong answers only?
Talking about the immoral invasion of Ukraine by Russia. Good on him for not shying away from calling that out.
Steve pronounces it a "See Eye Ess Oh."
CJ pronounces it as "Sizz-oh."
CISO is pronounced "See-Soh" and nobody at @awscloud can pronounce acronyms properly to save their lives. #amihasthreesyllables
Talking about how important security is, which... is all well and good, yes, but the audience has ponied up $1099 a head to be at the AWS security conference in Boston. I think we can kinda accept that the audience gets that this matters by this point.
First time I can recall seeing "Neurodiversity" on a slide from @awscloud.
Four best practices to go with the five tracks and six pillars of the Well Architected Framework.
"If you're on vacation, your access should be as well."
*laughs in startup and being owned by your job*
It's not ransomware, it's a post-paid penetration test. #branding
"Security is very important. This one time we weren't secure enough and this jackhole company offered a crappy rebranded substandard version of our product for sale. Can you imagine that?" (Not really.)
WHOA. She just said "multi-cloud" on stage at an AWS keynote. AMAZING.
Oh no MongoDB tried to catch all the AWS services as if they were Pokemon!
Three parts of the management cycle to go with the four best practices, five tracks and six pillars of the Well Architected Framework.
Now Kurt Kufeld, VP of Platform at AWS. How the hell he follows someone as awesome on stage as @LenaSmart8 is beyond me.
I'd just give up and go home in his shoes.
A bold aspiration quote from a man who owns the entirety of the @awscloud billing system within his purview. It's a technical marvel that shows in exacting detail exactly where the puck was two days ago.
Now @awscloud is selling both sides of the arms race: post-quantum cryptography as well as the quantum computers (Braket) to break the crypto.
KMS, ACM, and Secrets Manager support hybrid post-quantum key agreement today.
"What about Systems Manager Parameter Store?"
"What about you not being such a cheap bastard, Quinnypig?"
I missed the launch of AWS LibCrypto last year, probably because I'm nowhere near smart enough to know how that stuff works.
Kurt is now talking about using automated reasoning to determine things like "is this S3 bucket open to the public."
That sounds hard. I use the red screamy warning in the @awscloud S3 console instead, it's way easier.
AWS uses "Provable Security."
I use "Probable Security" as in "it's probably fine."
Now Kurt is talking about IAM. OH MY GOD IT'S FULL OF STARS
"Please, turn on Block Public Access."
Cool, let me move this ONE SPECIFIC PUBLIC BUCKET to another account without breaking all of my shit and I absolutely would.
"Please, enable MFA."
Okay, please enable multiple MFA devices per account and I absolutely will.
You can order free MFA keys from @awscloud if you spend more than $100 a month. If you don't spend that much, don't enable MFA and wait a bit.
IAM Roles Anywhere launched two weeks ago. Lost opportunity to call it "AWS Bakery." Because there will be... rolls everywhere.
I'm here all week.
It lets you get IAM credentials for anything that has a signed certificate. We know how to manage those already (we don't but we trick ourselves into believing otherwise). Great for off-prem stuff / using IAM as a free database.
Launch today: Amazon Detective for Elastic Kubernetes Service (EKS).
The first issue is Amazon Detective and the Case of Where Did All The Money Go?
I'm at the AWS Summit in NYC, where I believe that nicknames are for friends--and Gennifer Artificial Intelligence is no friend of mine.
Good morning.
Thirsty much?
A game / challenge at the AWS Startups booth: how long can an AWS employee go without mentioning GenAI? Someone just made it all the way to one minute, ten seconds!
Okay. Let's do Networking Specialty. Practice question 1:
Correct answer is B.
"Wrong!" says the answer key, "it's B because network load balancers don't support client IP preservation."
Except that they do. They absolutely do. They have for the past year. I'm just a boy, standing in front of an AWS Cert team, asking them to do their damn jobs.
Today's cloud marketing story is called "The Tale of Hot Rebecca," and is a truthful recounting of dinner last night.
Strap in; it's a fun ride.
Back in my early 20s, I had a number of friends / acquaintances in my (primarily Jewish) social circle named "Rebecca." It was kind of a problem.
("Can't we spray for them?"
"…not since the 1940s.")
So every Rebecca got an adjective, much like the seven dwarves. One of them asked me once what her adjective was, and I responded in a fit of unadulterated honesty, "you're Hot Rebecca" because honestly? Damn.
Made it to the #GoogleCloudNext keynote seating finally. Let's see how this goes now that the world is starting to wake up to a "much of the AI hype is unwarranted" reality.
Boeing: "HOW ARE THEY DOING IT?!"
Airbus: "We bought a torque wrench?"
Boeing: "No, how are you being a featured customer testimonial at #GoogleCloudNext?"
Airbus: "Oh, that? We made a strategic decision to not be walking poster children for corporate negligence."
And now, some DevOps / SRE / Sysadmin / Ops / ENOUGH already tips I learned from early in my career--brought to us by our friends at Chex™ Mix. All of these are great ideas that you should implement immediately...
DNS is notoriously unreliable, so use configuration management to sync all of the servers' /etc/hosts files. Boom, no more single point of failure.
Future-proofing is an early optimization, so don't do it. Every network should be a /24 because that's how developers think. I mean come on, what are the odds you'll ever have more than 253 hosts in a network?
And the Amazon earnings are out for Q4. A miss on @awscloud revenue by $20 million because analysts didn't expect one of you to turn off a single Managed NAT Gateway.
Let's explore deeper into their press release.
For 2023, AWS sold $90.8 billion of services, most of which were oversized EC2 instances because you all refuse to believe Compute Optimizer when it tells you there are savings to be had if you're just a smidgen more reasonable.
Word frequency in the earnings release:
Customer: 87
Employee: 11
Generative: 16
Cloud: 24
Serverless: 3
DynamoDB: 2
Union: 0