Remove .Net Remove Course Remove Microsoft Remove Web Services
article thumbnail

Protesters block entrances at Amazon HQ, objecting to planned use of fossil fuels in Oregon

GeekWire

Last week, the Troublemakers sent a letter to Amazon CEO Andy Jassy, asking him to cancel plans to tap into the GTN Xpress gas pipeline and use the fuel for its data centers, which house powerful computers that create the backbone for Amazon Web Services (AWS).

article thumbnail

Bechtle: Pursuing a Multi-Faceted Sustainability Strategy

CIO Business Intelligence

Providing hardware, software, and IT solutions and services, the company also delivers an extensive array of cloud offerings from dedicated private clouds to deployments with the world’s largest hyperscalers, including Amazon Web Services, Google Cloud, and Microsoft Azure.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Jeff Bezos to hand over Amazon CEO role to Andy Jassy on July 5, anniversary of company’s creation

GeekWire

Jassy, the longtime leader of the Amazon Web Services cloud business, “is going to be an outstanding leader, and he has my full confidence,” Bezos said. And the IT industry too, of course, is thriving. And of course, we recognize that with success comes scrutiny, and we welcome it.

Retail 144
article thumbnail

Amazon renewable power leader on AI’s energy strain, a political dust-up in Oregon, and more

GeekWire

As the retail, cloud and entertainment giant strives to reach net zero carbon emissions by 2040, most of its carbon cuts so far have come from its shift to renewables. ” Charley Daitch, the Amazon Web Services director of energy and water strategy. “And we moved in a really meaningful way to do that.”

Energy 81
article thumbnail

Deception and Forensics for the Next Generation – Part 7: Device Forensics in a Deception Environment

SecureWorld News

It is a challenge because the deception net is, or should be, configured to prevent access to the outside—including the internet, as well as local networks—by any code running inside the device. We need a better solution for this problem and, fortunately, we have one: device memory forensics is built into the deception net.

article thumbnail

Best IT and Tech Blogs – Must Read Information Technology Resources 2019

Galido

Of course we might be a little biased as our first pick is our very own Information Technology Blog , a portal to several of our other favorite Information Technology Blogs and a collection of articles that we’ve found to be useful for a variety of vistors, both beginners and experts alike. Help Net Security. Building Clouds.

Resources 113
article thumbnail

Tech Blogs – Best Must Read Tech Resources 2019

Galido

Of course, we might be a little biased as our first pick is our very own Information Technology Blog , a portal to several of our other favorite Tech Blogs and a collection of articles that we’ve found to be useful for a variety of visitors, both beginners and experts alike. Help Net Security. Zone Alarm Cyber Security Blog.

Resources 107