Blog

Our Latest News

ITAR: AWS IAM Best Practices

Lock Away Your AWS Account Root User Access Keys You use an access key (an access key ID and secret access key) to make programmatic requests to AWS. However, do not use your AWS account root user access key. The access key for your AWS account root user gives full...

Will Capital One’s 106M Name Data Breach Cut Into AWS’s Growth?

Should you own Amazon stock? It would certainly be a better investment if its most profitable business, AWS, was growing faster. And the odds of that happening would be better if the industry in which it competes — cloud services — was accelerating. But news that...

Download Duplicator – WordPress Migration Plugin

With over 15 million downloads Duplicator successfully gives WordPress users the ability to migrate, copy, move or clone a site from one location to another and also serves as a simple backup utility. Duplicator handles serialized and base64 serialized replacements....