AWS Architecture Blog

ML lifecycle

Optimize AI/ML workloads for sustainability: Part 1, identify business goals, validate ML use, and process data

Training artificial intelligence (AI) services and machine learning (ML) workloads uses a lot of energy—and they are becoming bigger and more complex. As an example, the Carbontracker: Tracking and Predicting the Carbon Footprint of Training Deep Learning Models study estimates that a single training session for a language model like GPT-3 can have a carbon footprint […]

Figure 1. Architecture diagram for autonomous driving simulation

How to Run Massively Scalable ADAS Simulation Workloads on CAEdge

This post was co-written by Hendrik Schoeneberg, Sr. Global Big Data Architect, The An Binh Nguyen, Product Owner for Cloud Simulation at Continental, Autonomous Mobility – Engineering Platform, Rumeshkrishnan Mohan, Global Big Data Architect, and Junjie Tang, Principal Consultant at AWS Professional Services. AV/ADAS simulations processing large-scale field sensor data such as radar, lidar, and […]

Let's architect! logo

Let’s Architect! Architecting for Machine Learning

Though it seems like something out of a sci-fi movie, machine learning (ML) is part of our day-to-day lives. So often, in fact, that we may not always notice it. For example, social networks and mobile applications use ML to assess user patterns and interactions to deliver a more personalized experience. However, AWS services provide […]

Figure 1. Multi-Region Amazon Cognito machine-to-machine architecture

How UnitedHealth Group Improved Disaster Recovery for Machine-to-Machine Authentication

This blog post was co-authored by Vinodh Kumar Rathnasabapathy, Senior Manager of Software Engineering, UnitedHealth Group.  Engineers who use Amazon Cognito for machine-to-machine authentication select a primary Region where they deploy their application infrastructure and the Amazon Cognito authorization endpoint. Amazon Cognito is a highly available service in single Region deployments with a published service-level […]

Figure 1. Architecture diagram of an anomaly detection solution for ecommerce traffic

Automating Anomaly Detection in Ecommerce Traffic Patterns

Many organizations with large ecommerce presences have procedures to detect major anomalies in their user traffic. Often, these processes use static alerts or manual monitoring. However, the ability to detect minor anomalies in traffic patterns near real-time can be challenging. Early detection of these minor anomalies in ecommerce traffic (such as website page visits and […]

Figure 1. Connect data streaming automation workflow

Automate Amazon Connect Data Streaming using AWS CDK

Many customers want to provision Amazon Web Services (AWS) cloud resources quickly and consistently with lifecycle management, by treating infrastructure as code (IaC). Commonly used services are AWS CloudFormation and HashiCorp Terraform. Currently, customers set up Amazon Connect data streaming manually, as the service is not available under CloudFormation resource types. Customers may want to […]

Architecture diagram

Enhance Your Contact Center Solution with Automated Voice Authentication and Visual IVR

Recently, the Accenture AWS Business Group (AABG) assisted a customer in developing a secure and personalized Interactive Voice Response (IVR) contact center experience that receives and processes payments and responds to customer inquiries. Our solution uses Amazon Connect at its core to help customers efficiently engage with customer service agents. To ensure transactions are completed […]

AWS architecture for sustainable IoT devices

Optimizing Your IoT Devices for Environmental Sustainability

To become more environmentally sustainable, customers commonly introduce Internet of Things (IoT) devices. These connected devices collect and analyze data from commercial buildings, factories, homes, cars, and other locations to measure, understand, and improve operational efficiency. (There will be an estimated 24.1 billion active IoT devices by 2030 according to Transforma Insights.) IoT devices offer […]

Figure 2. Architecture diagram for financial crime discovery

Financial Crime Discovery using Amazon EKS and Graph Databases

Discovering and solving financial crimes has become a challenge due to an increasing amount of financial data. While storing transactional payment data in a structured table format is useful for searching, filtering, and calculations, it is not always an ideal way to represent transactional data. For example, determining if there is a suspicious financial relationship […]

Figure 2. Simulated RLN architecture in the AWS Cloud

Scaling DLT to 1M TPS on AWS: Optimizing a Regulated Liabilities Network

SETL is an open source, distributed ledger technology (DLT) company that enables tokenisation, digital custody, and DLT for securities markets and payments. In mid-2021, they developed a blueprint for a Regulated Liabilities Network (RLN) that enables holding and managing a variety of tokenized value irrespective of its form. In a December 2021 collaboration with Amazon […]