SHOW

Filter (clear filters)

Domains

Companies

Technologies

Functions


Overview for best practices



Changing the Way the Intelligence Community Moves Data

Learn how NGA uses AWS Snowball Edge to support War Fighter, utilizing imagery from NGA’s Open Data Store and implementing geospatial applications on the edge. AWS Snowball Edge allows NGA to directly support its mission, providing products and services to decision makers, warfighters, and first responders when they need it most. Enabling the edge changes NGA’s ability to share critical resources, data to facilitate user access meets NGA’s mission needs, and support the IC and Department of Defense as a whole.

Links


Fannie Mae Processes over a Quarter Million Loans per Day w/ Amazon S3

Fannie Mae discusses how they completely re-architected a mission-critical application using AWS native services that process hundreds of thousands of mortgage loans every day in a highly scalable and reliable manner. The transaction-heavy workload uses over 20+ million Amazon S3 transactions a day, each within 150-millisecond response times, thus providing increased uptime and faster response. 

Links


Moody’s: Deploying Cloud-Native Architectures with Automation

Moody’s has chosen Terraform as their tool of choice to define and deploy their application and security infrastructure for a range of different use cases on AWS. In this session, you will learn about Moody's range of automation use cases, including: AWS infrastructure creation; deployment of a shared service environment; onboarding of new/existing lines-of-business; and Integration with threat intelligence services such as Amazon GuardDuty. 

Links


Policy Verification and Enforcement at Scale with AWS

Learn how Goldman Sachs uses  AWS Config, AWS Lambda, Amazon DynamoDB, and Amazon Simple Notification Service (Amazon SNS) as distributed infrastructure that help catch security issues early and remediate those that happen unexpectedly. You will also learn how they use distributed serverless logging pipelines and leverages AWS formal verification tools to help enforce access policy in the process.

Links