This week, in collaboration with Geoscience Australia, we released our Sentinel-2 Cloud-Optimized GeoTIFF (COG) dataset on AWS Open Data. Our collection contains all 11.4 million scenes from the Sentinel-2 Public Dataset, except the JPEG2000 (JP2K) files are all converted to COGs. Our dataset is continuously updated to mirror the growth of the public Sentinel-2 data…
This week, in collaboration with Geoscience Australia, we released our Sentinel-2 Cloud-Optimized GeoTIFF (COG) dataset on AWS Open Data. Our collection contains all 11.4 million scenes from the Sentinel-2 Public Dataset, except the JPEG2000 (JP2K) files are all converted to COGs. Our dataset is continuously updated to mirror the growth of the public Sentinel-2 data…
Hanging just above the reception desk at our office in Alexandria are three framed posters–one for each of our company values. Now you may think that’s a bit cheesy–in a sort of team-rowing-motivational poster kind of way–but they truly drive our work, decision making and business outlook at Element 84. For me, our most important…
Testing Your IAM Policies As the complexity of your AWS environment grows, the need for more specific Identity and Access Management (IAM) roles, and policies increases. These IAM policies govern not only the users that are logging in to the AWS environment, but also the permissions that are granted to services, Lambda functions, EC2 instances, and…
Over the past few years, serverless design has taken the cloud community by storm. It is hard to ignore–with promises like “pay only for what you use”, “no security patching”, and “infinite scalability”. Being on the cutting edge can have drawbacks too, which in this case is what I would describe as an absence of…
There are many books that have influenced me as a software engineer. From the computer science textbooks I used in college, to the animal covered books from O’Reilly I used to pick up new languages and tools, to the Clean Code books from Uncle Bob Martin that helped shape the way I approach software development. However,…
We’re passionate about Earth Science Data and helping to solve the challenges in that field. At this year’s ESIP Summer Meeting, we have five E84 team members speaking and moderating across six different sessions, with an additional four of us out there to chat and support the event. Here’s where you can find us if…
Data stored in the cloud is an attractive target for hackers. High profile breaches like the recent exposure of images of license plates at a U.S. port of entry have become commonplace. These events justifiably alarm consumers. Every incident cements distrust toward the tech industry, causing technology users to demand better security from software creators.…
We’ve been heads down, hard at work tackling challenges in Earth Science and Disaster Response and are ready to share what we’re doing with all of you. June 11-12, we’ll be joining AWS at their Public Sector Summit in Washington, DC to talk about some of these challenges and how we’re working to solve them.…
With Functions as a Service (FaaS), cloud providers promise us the ability to deploy, run, and scale small pieces of application code without worrying about the underlying hardware or virtual machines. This comes with certain advantages, such as a pricing model that only charges for the amount of time the code is running, quick deployments,…
The Problem Recently, I needed to implement large file uploads to Amazon Web Services (AWS) from a web browser. We had some requirements with possible solutions: S3 is the ideal place to upload files but there are issues with uploading from a web browser to S3. You don’t want to give users free reign to…