AWS Storage Blog
Tag: HAQM Kinesis
Prime Video improved stream analytics performance with HAQM S3 Express One Zone
HAQM Prime Video provides a selection of original content and licensed movies and TV shows that you can stream or download as part of the HAQM Prime subscription. Prime Video’s telemetry platform serves as the backbone for monitoring playback performance, saving data snapshots for failure recovery, providing business analytics, and generating real-time insights across its […]
How Vivian Health is using HAQM S3 Express One Zone to accelerate healthcare hiring
Vivian Health connects travel nurses with job opportunities across the country. To do that, the platform has innovated not just the job search itself, but also the tooling used by recruiters and hiring managers to get qualified candidates matched to the right job and placed as quickly and as seamlessly as possible. However, the process […]
Automatic monitoring of actions taken on objects in HAQM S3
Administrators may need to monitor and audit actions, like uploads, updates, and deletes, taken on files and other data to comply with regulations or company policies. A scalable and reliable method of tracking and saving actions taken on files can reduce manual work and operational overhead while helping to ensure compliance. An event-based fanout architectures […]
Point-in-time restore for HAQM S3 buckets
Enterprises store increasing quantities of object data for use cases like data lakes, document management systems, and media libraries. Performing point-in-time restores for large datasets can be challenging, as existing approaches with full-restore from backup are time consuming and expensive. Alternatively, restoring individual objects to previous versions is prone to errors and delays the restore […]
Monitoring and reporting HAQM FSx user access events using Splunk
UPDATE 9/8/2021: HAQM Elasticsearch Service has been renamed to HAQM OpenSearch Service. See details. Monitoring end-user activity and access to data is core to any modern data security strategy. As customers migrate workloads to the cloud, logging end-user accesses of customer data is a key component of internal security policies and is required to meet […]