Amazon API Gateway is now available in the Asia Pacific (Mumbai) AWS region

Amazon API Gateway is a fully managed service that makes it easy for developers to create, publish, maintain, monitor, and secure APIs at any scale. With a few clicks in the AWS Management Console, you can create an API that acts as a “front door” for applications to access data, business logic, or functionality from your back-end services, such as workloads running on Amazon Elastic Compute Cloud (Amazon EC2), code running on AWS Lambda, or any Web application. Amazon API Gateway handles all the tasks involved in accepting and processing up to hundreds of thousands of concurrent API calls, including traffic management, authorization and access control, monitoring, and API version management.
Amazon API Gateway is also available in the US East (N. Virginia), US East (Ohio), US West (Oregon), US West (N. California), EU (Ireland), EU (Frankfurt), Asia Pacific (Singapore), Asia Pacific (Tokyo), Asia Pacific (Sydney), Asia Pacific (Seoul) and Europe (London) AWS regions. Please visit our product page for more information about Amazon API Gateway.
Quelle: aws.amazon.com

Amazon EC2 and Amazon EBS add support for tagging resources upon creation and additional resource-level permissions

You can now tag your Amazon EC2 Instances and Amazon EBS Volumes upon creation. You can do this from the EC2 Instance launch wizard or through the RunInstances or CreateVolume APIs. By tagging resources at the time of creation, you can eliminate the need to run custom tagging scripts after resource creation. In addition, you can now set resource-level permissions on the CreateVolume, CreateTags, DeleteTags, and the RunInstances APIs. This allows you to implement stronger security policies by giving you more granular control over who has access to these APIs. You can also enforce the use of tagging and control which tag keys and values are set on your resources. 
Quelle: aws.amazon.com

Congress Votes To Gut Internet Privacy Rules

The House voted Tuesday to repeal landmark internet privacy rules that required broadband companies to first get consent before sharing their customers&; sensitive information, including browsing history and location data, with advertisers and other third party companies. The vote comes a week after the Senate approved the repeal. Now President Trump&039;s signature is the final step needed to abolish the privacy protections.

Passed by the Federal Communications Commission in October, the rules also forced broadband providers to tell customers about the data they collect, why they collect it, and to identify the kinds of third party companies that might be given access to that information. Parts of the internet privacy rules were scheduled to take effect later this year. Others, including a provision that required broadband companies to protect consumer information from hackers and data breaches, had already kicked in. FCC Commissioner Ajit Pai, however, moved to block the data security rules earlier this month.

Republican lawmakers and the telecom industry have staunchly opposed the regulations. They have argued that the rules unfairly target internet providers, like Comcast and AT&T, and offer an advantage to other web companies that regularly harvest and sell customer information. Since businesses like Facebook and Google are not bound by the FCC rules, critics say the privacy regulations singled out broadband companies.

“These rules varied from the industry principles developed last year and established a double-standard by creating different sets of regulation for internet service providers on the one hand and the rest of the internet ecosystem on the other,” US Telecom CEO Jonathan Spalter said in a statement last week.

But a coalition of consumer and privacy groups have argued that internet providers occupy a powerful position in people&039;s internet use. Groups including the ACLU, the Electronic Frontier Foundation, and Free Press say that the rules are a crucial protection in the digital age.

“We are one step closer to a world where ISPs can snoop on our traffic, sell our private information to the highest bidder, and pre-install spyware on our mobile phones,” Jeremy Gillula, a senior staff technologist for the Electronic Frontier Foundation, told BuzzFeed News.

Unlike social media companies, and other kinds of advertisers and web trackers, broadband providers can monitor all unencrypted internet traffic. Democratic lawmakers have also pointed out that many Americans only have a single internet provider serving their community, leaving them no choice but to accept whatever data collection practices are in place if they want internet service.

3 Invasive Things Your ISP Could Do If the Privacy Rules Are Repealed

1. Selling Your Browsing History

“The consequences of repeal are simple: ISPs like Comcast, AT&T, and Charter will be free to sell your personal information to the highest bidder without your permission — and no one will be able to protect you,” wrote Gigi Sohn, counselor to former FCC chairman Tom Wheeler, in an op-ed at the Verge Monday.

While Americans can use free browser tools to block many types of web tracking, monitoring by internet providers is much harder to prevent. “Your ISP is in a privileged position, where they can see everything,” said Gillula, who has written about the “creepy” data collection that ISPs can conduct if the regulations are gutted.

“Any attempt to block the ISP from monitoring you, they have the power to override,” Ernesto Falcon legislative counsel at EFF, told BuzzFeed News.

2. Compiling Internet Profiles And Injecting Targeted Ads

“There are major medical, financial, and legal websites — like the US Courts, for example — that are largely unencrypted. ISPs will be able to build detailed profiles of their customers — knowing when they&039;re at vulnerable points in their lives — and sell that information to practically whomever they wish,” Gaurav Laroia, policy counsel at Free Press, told BuzzFeed News. If someone is visiting a medical website, for instance, third parties can infer what illnesses they may suffer from, revealing sensitive health information.

“It&039;s well-established that these internet companies are looking hungrily at companies like Facebook and Google; they want in on that advertising action,” Jay Stanley, a senior policy analyst with the ACLU, told BuzzFeed News. “This is an effort by them to preserve the ability to monetize people&039;s information. And without these rules, they are going to plow forward.”

3. Deploying Hidden Tracking Cookies On Our Phones

Following a 15-month investigation, the FCC settled with Verizon Wireless last year over the company&039;s use of so called “supercookies” — tracking code that could not be deleted, which Verizon used to monitor customers&039; online activity without their permission.

“It didn’t matter if you were browsing in Incognito or Private Browsing mode, using a tracker-blocker, or had enabled Do-Not-Track: Verizon ignored all this and inserted a unique identifier into all your unencrypted outbound traffic anyway,” the EFF&039;s Gillula wrote. The browsing history, according to the FCC, was collected for several years without consent; Verizon and other third party companies used it for targeted advertising.

For privacy advocates, pervasive data collection of your internet activity can be enormously invasive. “The websites you visit can indicate information about your financial life, you sexual life, your medical life, what disease you have, what diseases you might be worried you have,” said Stanley.

“We don&039;t even know what other derivative uses exist, because no one has ever had this type of information on consumers,” Falcon said, referring to new types of data collection and novel forms of the sale of personal data. “That&039;s what&039;s most frightening.”

Quelle: <a href="Congress Votes To Gut Internet Privacy Rules“>BuzzFeed

AWS Batch now supports Job Retries

AWS Batch now supports Job Retries. Previously jobs would be marked as failed, if they experienced an error or the EC2 instance they were executing on failed. Now, you can define a retry strategy for a job as part of the Job Definition or when submitting a Job. By default, all jobs are attempted once and are marked as failed if they do not succeed. The retry strategy allows you to set a number of attempts for a job, which will result in a job being retried if it does not succeed. You can define up to 10 attempts for a job.
Read more about how to configure and use Job Retries in the AWS Batch documentation. Please visit our product page for more information on AWS Batch.
Quelle: aws.amazon.com