Creating a 1.3 Million vCPU Grid on AWS using EC2 Spot Instances and TIBCO GridServer

This Amazon AWS blog post provides a great insight into the benefits of the cloud computing in general and Amazon AWS in particular.  The whole thing is well worth the read, but here are a few of my favorite bits.

The scale:

The grid grew to 61,299 Spot Instances (1.3 million vCPUs drawn from 34 instance types spanning 3 generations of EC2 hardware) as planned, with just 1,937 instances reclaimed and automatically replaced during the run, and cost $30,000 per hour to run, at an average hourly cost of $0.078 per vCPU. If the same instances had been used in On-Demand form, the hourly cost to run the grid would have been approximately $93,000.

The size of the Amazon AWS customers:

1.3 million vCPUs (5x the size of the largest on-premises grid)

The evolution of computing power over the last few years:

To give you a sense of the compute power, we computed that this grid would have taken the #1 position on the TOP 500 supercomputer list in November 2007 by a considerable margin, and the #2 position in June 2008. Today, it would occupy position #360 on the list.

Now, just for fun, exercise the idea of building something like this in house…

The Nightmare Letter: A Subject Access Request under GDPR

The Nightmare Letter: A Subject Access Request under GDPR” article features an example worst-case scenario (or so) of a Subject Access Request (SAR) under the General Data Protection Regulation (GDPR).

On one hand, the example letter is quite extreme.  On the other – it’s quite realistic, especially given the (almost) template.

So, who’s ready for this?  And who’s laughing now?

Found via the comments to this Slashdot thread, which is also worth a read.

PHP application logging with Amazon CloudWatch Logs and Monolog

AWS Developer Blog ran this post a while back – “PHP application logging with Amazon CloudWatch Logs and Monolog“, in which they show how to use Monolog and Amazon CloudWatch together in any PHP application.  It goes beyond a basic configuration of connecting the two, all the way into setting up log metrics, etc.

Get Started with Blockchain Using the new AWS Blockchain Templates

One of the greatest things about the Amazon AWS services is that they save a tonne of time on the reinventing the wheel.  There are numerous technologies out there and nobody has the time to dive deep, learn, and try all of them.  Amazon AWS often provides ready-made templates and configurations for people who just want to try a technology or a tool, without investing too much time (and money) into figuring out all the options and tweaks.

Get Started with Blockchain Using the new AWS Blockchain Templates” is one example of such predefined and pre-configured setup, for those who want to play around with Blockchain.  Just think of how much time it would have taken somebody who just wants to spin up their own Etherium network with some basic tools and services just to check the technology out.  With the predefined templates you can be up and running in minutes, and, once you are comfortable, you can spend more time rebuilding the whole thing, configuring and tweaking everything.

Useful payloads for security testing of web applications

This article (in Russian) lists a number of useful payloads (and some tools that work with them) for security testing of web applications.  Below is the list of handy GitHub repositories for web server path testing, cross-site scripting, SQL injection, and several other common types of vulnerabilities.  These payloads are much richer than basic hand-made tests and can help improve the security of the web application a great deal: