background preloader

AWS Free Usage Tier

AWS Free Usage Tier
* These free tier offers are only available to new AWS customers, and are available for 12 months following your AWS sign-up date. When your 12 month free usage term expires or if your application use exceeds the tiers, you simply pay standard, pay-as-you-go service rates (see each service page for full pricing details). Restrictions apply; see offer terms for more details. ** These free tier offers do not automatically expire at the end of your 12 month AWS Free Tier term, but are available to both existing and new AWS customers indefinitely. † The following Windows variants are not eligible for the free tier: Microsoft Windows Server 2008 R2 with SQL Server Web, Microsoft Windows Server 2008 R2 with SQL Server Standard, Microsoft Windows 2008 R2 64-bit for Cluster Instances and Microsoft Windows 2008 R2 SQL Server 64-bit for Cluster Instances. The Amazon AWS Free Tier applies to participating services across our global regions.

https://aws.amazon.com/s/dm/optimization/server-side-test/free-tier/free_np/

Understanding Access Credentials for AWS/EC2 Amazon Web Services (AWS) has a dizzying proliferation of credentials, keys, ids, usernames, certificates, passwords, and codes which are used to access and control various account and service features and functionality. I have never met an AWS user who, when they started, did not have trouble figuring out which ones to use when and where, much less why. Amazon is fairly consistent across the documentation and interfaces in the specific terms they use for the different credentials, but nowhere have I found these all listed in one place.

Do-It-Yourself PR: 13 Things You Must Do Every entrepreneur is a self-promoter, but some are lucky enough to be able to pay for help in that department. If that's not you and spreading the word is your task and yours alone, here are a few things to put on your must-do list: Advertising

Managing Your AWS Credentials (Part 1) Anyone who has deployed a production system in the Amazon Web Services infrastructure has grappled with the challenge of securing the application. The majority of the issues you face in an AWS deployment are the same issues you would face in deploying your application in any other environment, e.g. In fact, some of the tools provided by AWS such as the distributed firewall in EC2 can actually make the process even more secure because everything can be controlled via API's. So, for example, you can shut down SSH traffic completely at the EC2 firewall and write scripts that automatically enable SSH access for your current IP and then shut that port down as soon as you have closed your SSH session with the instance. This series of articles focuses on an aspect of security that is very specific to AWS: managing your AWS credentials.

50 Tips for Starting Your Own Company Starting your own business isn’t for the faint of heart. It’s stressful and pretty much demands your complete focus. On the plus side, it can also be a fulfilling experience professionally and personally. Here are 50 tips on how to make your business come to life: Related: How McDonald's Made Me a Better Businessman 1. Product Advertising API Signed Requests Helper : Sample Code & Libraries This helper is available online at Alternatively, you may download the ZIP file, extract the contents to a folder and open index.html in a browser. This tool works best with Mozilla Firefox; other browsers including Internet Explorer have not been tested. This tool allows you to provide a Product Advertising API request URL, your AWS Access Key ID and your AWS Secret Key. It then displays the corresponding signed URL.

A call to all Data Engineers and BI workers In the last two years I had the chance to get my hands on some very exciting Data Analytics projects and I wanted to take the chance to recap and to reach out to Data Engineers and BI Consultants. Why? In the area of IT we see lot’s of trends coming up every year.

What Does It Take To Become a Chief Data Officer The Chief Data Officer (CDO) should be responsible for the overall big data strategy within an organisation. If big data is implemented throughout the organisation, at all different levels and departments, the Chief Data Officer will have the responsibility to ensure the strategy is implemented correctly, the data is correct and secure and the customers’ privacy is governed correctly. As data-driven decision-making becomes increasingly important in organisations, the CDO should be a member of the executive board, reporting directly to the Chief Executive Office. Data in itself does not bring any value. It only becomes valuable when analysed and turned into information.

Analytics Start-up Series My articles/posts on analytics start-up series that I started writing way back in 2007. Will try and aggregate it sequentially here, as I continue to write more. Article 1

Related: