Cloud Infrastructure Management

First Time Twitter Leverages Public Cloud to Deliver Real-Time Service

Amazon Web Services said Tuesday that Twitter has endorsed on to utilize AWS for its worldwide cloud infrastructure to convey Twitter timetables. Under the multi-year bargain, Twitter will utilize AWS infrastructure and products across compute, containers, storage, and security, denoting the first run through Twitter has utilized the public cloud to convey its real-time service.

Twitter has utilized AWS for quite a long time as a component of its general cloud strategy, depending on AWS stockpiling, process, information base, and substance conveyance administrations to help its dispersion of pictures, recordings and promotion content.

Twitter CTO Parag Agrawal said the company's new collaboration with AWS will improve the performance of Twitter's service by enabling the company to "serve Tweets from data centers closer to our customers at the same time as we leverage the Arm-based architecture of AWS Graviton2 instances. In addition to helping us scale our infrastructure, this work with AWS enables us to ship features faster as we apply AWS's diverse and growing portfolio of services."

Talking about Arm, AWS reported a week ago that the chipmaker would depend on AWS for its cloud use, including for most of its electronic plan computerization (EDA) outstanding burdens. As per Amazon, running EDA in the cloud at creation scale is a semiconductor industry first.

The client wins come as AWS covers off its weeks-long re:Invent engineer gathering. The organization utilized the all-virtual occasion to introduce a large number of item declarations, including new compartment contributions, contact focus benefits and process occurrences.

Spotlight

Excessive permissions in your AWS environment is a common pitfall that exposes your organization to unnecessary risk. IAM policies alone are not enough to achieve the Principle of Least Privilege. Our white paper, "10 Steps to Eliminating Access Risks in AWS," provides a clear step-by-step guide to evaluating permissions and ach


Other News

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Spotlight

Excessive permissions in your AWS environment is a common pitfall that exposes your organization to unnecessary risk. IAM policies alone are not enough to achieve the Principle of Least Privilege. Our white paper, "10 Steps to Eliminating Access Risks in AWS," provides a clear step-by-step guide to evaluating permissions and ach

Resources