With a number of recent high-profile leaks of personal data on Amazon Web Services (AWS) S3 service, it seems like a good time to review the security mechanisms that govern storage and sharing of data from AWS. If your organization uses S3 for storage of PHI, PII, or other sensitive data, you should be aware that failure to properly secure and restrict access and log this information can carry hefty fines and even jail time. Leaking users’ personal data can also be detrimental to your business model. (Photo Credit: Flickr)
What we have to say, what you want us to hear.
That’s how our blog works. It’s interactive. Let’s learn together.
We’re over halfway through the 2017 ISE Coding Garage! This year 15 enthusiastic high school students from the Iowa City area are well on their way to creating Android Apps for judging at the end of the session.
Like a kid at Christmas, IoT nerds everywhere can hardly contain their excitement for the upcoming release of the MQTT 5.0 connectivity protocol. For those of you who are past setting out cookies and carrots for the fat man and his deer and prefer to scrooge things up a bit, read on and learn about some of the exciting new features in MQTT 5.0.
Welcome back to the Meet Our Team Q&A series. My name is Daniela Williams, Project Manager at ISE, and I’ll be asking ISE team members questions to help give insight into what makes us tick.
Each summer ISE hosts an internship program that has attracted highly qualified college students from around the state. This summer Tyler Bartleson, Kyle Miller, and Jordan Pohlman joined the ISE team. Today I chatted with the group to learn a bit more about each of them.