Starts with a prepared video set to "Balance in the Universe" by Evandro Marconi Rocco.
And @stephenschmidt takes the stage with an "ADHD is not a disability" shirt.
Respect.
266 sessions over 2 days, or roughly half a session per @awscloud service.
Here are the 5 #reInforce tracks. Not to be confused with the 6 pillars of the Well Architected Framework, or the 4 million dollars you lost on deploying the first version of Macie.
Now @StephenSchmitd refuses to shut the hell up about CrossFit.
"Challenge Coins" is the best description ever for the money you pay for your AWS bill overages.
Now a slide with Singapore and Laramie (Wyoming) on a globe to juxtapose a megacity with a hick town that nobody could possibly give less of a shit about.
Apologies to both of the people in Laramie angrily riding their horses to Nebraska to find wifi so they can yell at me.
Talking about the value of scale; the things they learn from one company apply to other customers globally.
Also highlighting the defense in depth approach that AWS takes. He's correct; they're very very good at this.
Now talking about GuardDuty; apparently the people in the front row look like they have extra money or something.
"Products and services aren't shipped without a security review first."
Azure should take notes here.
And now "some lessons I have learned at CISO of AWS before becoming Amazon's CSO" says @stephenschmidt.
Wrong answers only?
Talking about the immoral invasion of Ukraine by Russia. Good on him for not shying away from calling that out.
Steve pronounces it a "See Eye Ess Oh."
CJ pronounces it as "Sizz-oh."
CISO is pronounced "See-Soh" and nobody at @awscloud can pronounce acronyms properly to save their lives. #amihasthreesyllables
Talking about how important security is, which... is all well and good, yes, but the audience has ponied up $1099 a head to be at the AWS security conference in Boston. I think we can kinda accept that the audience gets that this matters by this point.
First time I can recall seeing "Neurodiversity" on a slide from @awscloud.
Four best practices to go with the five tracks and six pillars of the Well Architected Framework.
"If you're on vacation, your access should be as well."
*laughs in startup and being owned by your job*
It's not ransomware, it's a post-paid penetration test. #branding
"Security is very important. This one time we weren't secure enough and this jackhole company offered a crappy rebranded substandard version of our product for sale. Can you imagine that?" (Not really.)
WHOA. She just said "multi-cloud" on stage at an AWS keynote. AMAZING.
Oh no MongoDB tried to catch all the AWS services as if they were Pokemon!
Three parts of the management cycle to go with the four best practices, five tracks and six pillars of the Well Architected Framework.
Now Kurt Kufeld, VP of Platform at AWS. How the hell he follows someone as awesome on stage as @LenaSmart8 is beyond me.
I'd just give up and go home in his shoes.
A bold aspiration quote from a man who owns the entirety of the @awscloud billing system within his purview. It's a technical marvel that shows in exacting detail exactly where the puck was two days ago.
Now @awscloud is selling both sides of the arms race: post-quantum cryptography as well as the quantum computers (Braket) to break the crypto.
KMS, ACM, and Secrets Manager support hybrid post-quantum key agreement today.
"What about Systems Manager Parameter Store?"
"What about you not being such a cheap bastard, Quinnypig?"
I missed the launch of AWS LibCrypto last year, probably because I'm nowhere near smart enough to know how that stuff works.
Kurt is now talking about using automated reasoning to determine things like "is this S3 bucket open to the public."
That sounds hard. I use the red screamy warning in the @awscloud S3 console instead, it's way easier.
AWS uses "Provable Security."
I use "Probable Security" as in "it's probably fine."
Now Kurt is talking about IAM. OH MY GOD IT'S FULL OF STARS
"Please, turn on Block Public Access."
Cool, let me move this ONE SPECIFIC PUBLIC BUCKET to another account without breaking all of my shit and I absolutely would.
"Please, enable MFA."
Okay, please enable multiple MFA devices per account and I absolutely will.
You can order free MFA keys from @awscloud if you spend more than $100 a month. If you don't spend that much, don't enable MFA and wait a bit.
IAM Roles Anywhere launched two weeks ago. Lost opportunity to call it "AWS Bakery." Because there will be... rolls everywhere.
I'm here all week.
It lets you get IAM credentials for anything that has a signed certificate. We know how to manage those already (we don't but we trick ourselves into believing otherwise). Great for off-prem stuff / using IAM as a free database.
Launch today: Amazon Detective for Elastic Kubernetes Service (EKS).
The first issue is Amazon Detective and the Case of Where Did All The Money Go?
1. Horizontal integration at Amazon scale of a company that now has the right to access my medical records under HIPAA opens up a huge problem for abuse.
2. Amazon has a policy against using seller-specific data to “aid [its'] private label business,” but Jeff Bezos testified to Congress that he “can't guarantee” that such a policy has “never been violated.”
Now extend that to your medical data.
3. With access to health care now under attack in a variety of states, do you want your medical data handled by a company who has warehouses and customers in those states (read as: vulnerable to pressure)?
I've been meaning to tear apart a job description to lay bare its subtext for a while now--and what luck! We're hiring a Principal Cloud Economist, and @mike_julian is asleep and thus unable to stop me.
Job descriptions start with the most important things first, so when a job description starts with basically jerking the company off, you kinda know what to expect.
This talks about the client work, and it's accurate. "Recommending RI / SP purchases," this is not.
Hello, New York. I'm here in person at the #awssummit, and this is my keynote livetweet thread.
Thanks for joining me. We'll get started in a few minutes.
The usual sponsor scroll slides are up. I hope to one day be sponsored to the point where these companies all slap their logos on me until I'm decked out like a race car.
And we're starting with a video talking about how deeply important the @awscloud and @intel partnership is. Since Intel is sponsoring this keynote surely they won't tell a Graviton3 story that makes Intel look bad!
On this Friday afternoon I have something to show you folks regarding my "Last Tweet in AWS" threading Twitter client.
Of course this is a thread, and of course I'm using the client to do it.
Last week I went to @Monitorama and attempted to livetweet while also providing alt-text for images. It was frankly a disaster; talks move way too fast for me to be able to competently do that–but I also wasn't willing to pull a "eh, that's hard, screw accessibility."
Note the new checkbox at the bottom of the image. That's right, by default it will auto-populate on image upload with alt-text powered by Machine Learning®.
Specifically, @Azure's Computer Vision API. It's the best of the ones I've sampled so far.
With the general availability of M1 Mac instances on EC2 as of today, I want to clear up some confusion I've seen about running macOS on EC2.
Thread time!
You need to reserve a "Dedicated Host" before you can launch a macOS AMI. Once reserved, you cannot unreserve it for 24 hours. This is an Apple license restriction that @awscloud cannot avoid.
The Intel Macs thus cost a minimum of $26 to instantiate, and will cost that much per day.
"Wait, does that mean it's a rip-off since a few months of that easily pays for the Mac itself?"