News

To regenerate the architecture diagram, follow the instructions in the Generating Architecture Diagrams section.
A targeted campaign exploited Server-Side Request Forgery (SSRF) vulnerabilities in websites hosted on AWS EC2 instances to extract EC2 Metadata, which could include Identity and Access Management ...
In today’s digital-first world, the demand for fast, responsive, and reliable web applications has never been higher. Whether ...
Why AWS best practices matter for a well-architected environmentIssued by BBDJohannesburg, 08 Apr 2025Visit our press officeEnsure your cloud architecture is resilient, secure and built for long-term ...
India finds itself a watershed moment with its urban evolution. With the United Nations projecting urbanization to reach 68% by 2050, the country's metropolitan regions needs to adapt to ...
This project automates the deployment of an Apache web server on AWS using Terraform. It includes an Auto Scaling Group (ASG) of EC2 instances behind an Application Load Balancer (ALB). Each instance ...
We also look at plants and the Alsomitra vine. From here we move onto two examples of metamorphosis - a butterfly and a frog - and finally we see the life cycles of a bird and a human. This clip ...