Glen Knight

NYC Based IT Professional

Get insights from multimodal content with Amazon Bedrock Data Automation, now generally available

Many applications need to interact with content available through different modalities. Some of these applications process complex documents, such as insurance claims and medical bills. Mobile apps need to analyze user-generated media. Organizations need to build a semantic index on top of their digital assets that include documents, images, audio, and video files. However, getting […]

0 Comments

Read More

AWS Weekly Roundup: Anthropic Claude 3.7, JAWS Days, Cross-account access, and more (March 3, 2025)

I have fond memories of the time I built an application live at the AWS GenAI Loft London last September. AWS GenAI Lofts are back in locations such as San Francisco, Berlin, and more, to continue providing collaborative spaces and immersive experiences for startups and developers. Find a loft near you for hands-on access to […]

0 Comments

Read More

Opus Security Platform Assigns DevSecOps Tasks to AI Agents

Opus Security today unveiled a platform that employs artificial intelligence (AI) agents to its vulnerability management platform that are trained to discover known issues and suggest remediations. Source: DevOps.com

0 Comments

Read More

OpenSSF Defines Baseline for Securing Open Source Software

The Open Source Security Foundation (OpenSSF) has launched an initiative to provide maintainers of open source software projects with a set of baseline security requirements that can be realistically attained and maintained by small teams. Source: DevOps.com

0 Comments

Read More

Managing AI APIs: Best Practices for Secure and Scalable AI API Consumption

By adopting a structured AI API management strategy, organizations can harness AI’s full potential while maintaining security, compliance and efficiency. Source: DevOps.com

0 Comments

Read More

7 Critical API Protection Strategies to Fortify Your API Security

Against a backdrop of escalating threats and costly consequences, organizations need a comprehensive, multilayered approach to API security. Source: DevOps.com

0 Comments

Read More