AWS Public Sector Blog
Category: Amazon Cognito
How to build a multilingual document summarization application using Amazon Bedrock
In this post, we showcase a Retrieval-Augmented Generation (RAG) application that can search and query across multiple Indian languages using the Cohere Embed – Multilingual model and Anthropic Claude 3 on Amazon Bedrock. This post focuses on Indian languages, but you can use the approach with other languages that are supported by the large language model.
Streamlining naturalization applications with Amazon Bedrock
Public sector organizations worldwide face a common challenge: processing an ever-growing volume of document-heavy applications across various services. From naturalization procedures to asylum applications and university admissions, many crucial processes still rely on manual or partially manual methods, leading to significant backlogs, extended processing times, and increased costs. This post explores how Amazon Bedrock can be used to address these challenges, focusing on streamlining naturalization applications.
Singapore’s NHG Cares App uses AWS to support a healthier population
The National Healthcare Group (NHG) is a leader in public healthcare in Singapore and is recognized for delivering high-value patient care. Its clinical services are provided through an integrated system of polyclinics, acute care tertiary hospitals, community hospitals, national specialty centers, and community-based care centers. Read this post to learn how NHG has collaborated with Amazon Web Services (AWS) to develop an intuitive and engaging mobile application called the NHG Cares App, which engages residents and spurs them to take charge of their health through personalized care plans, wellness coaching, health and social care programs, digital health education resources, and many other healthcare services.
Using Login.gov as an OIDC IdP with Amazon Cognito user pools
As federal agencies strive to enhance digital services and create a seamless customer experience, integrating robust identity and access management (IAM) solutions has become paramount. Amazon Cognito, a robust user identity management service offered by Amazon Web Services (AWS), provides a secure and scalable solution for managing user authentication and authorization. When combined with Login.gov, a trusted identity platform developed by the U.S. General Services Administration (GSA), federal agencies can unlock a powerful combination that streamlines user access while maintaining the highest levels of security and compliance.
Using AWS CDK to build an extensible file-scanning solution for Amazon S3 buckets
In today’s digital world, ensuring the security of information is essential. One common scenario where data security is crucial is when files from external sources are received by an organization. While Amazon Simple Storage Service (Amazon S3) provides robust security features like the default encryption of all uploaded files, there are scenarios where it’s important to ensure that the incoming files are free from any kind of malware, such as viruses, before they are processed or stored inside the organization. Read this post to learn more.
UNSW students build an all-electric race car with AWS
In 2023, the students from Redback Racing at the University of New South Wales (UNSW) wove together their many disciplines of engineering prowess to create their latest cars: RB23 and RB21-D. After developing and going live with their real-time telemetry system on Amazon Web Services (AWS), the team has placed as the highest-ranking Australian squad in the electric vehicle (EV) division of the Australasia Formula SAE competition, placing second overall. Read this post to learn more.
4 common IoT protocols and their security considerations
With the Internet of Things (IoT), selecting the right communication protocol ensures efficient data exchange and seamless connectivity between devices and the cloud. With a multitude of IoT protocols available, choosing the one that best suits your specific use case can be challenging. In this blog, we explore four common protocols used to connect IoT devices to the cloud and shed light on when and where to deploy them for optimal results.
How to use AWS Wickr to enable healthcare workers to interact with generative AI
Amazon Web Services (AWS) Wickr is an end-to-end encrypted messaging and collaboration service with features designed to keep internal and external communications secure, private, and compliant. In this post, we present an architecture that uses the Wickr messaging solution for protected communication with a generative AI backend system, which uses an existing open source project: the AWS GenAI Chatbot. Read this post to learn more.
Reducing transcription costs by 60% using AWS AI/ML services
The process of transcribing video or audio files has traditionally been manual and time-consuming. Beyond the need for accurate and cost-effective transcriptions, attorneys have determined a need for timestamping capabilities, speaker identification, search and replace capabilities, the highlighting of specific words, editing capabilities, and most importantly, shortened turnaround times.To address the need for quicker and more accurate transcription of audiovisual files, the Contra Costa County (CCC) District Attorney’s (DA) Office reached out to Amazon Web Services (AWS) and partnered with AWS Partner ScaleCapacity to develop a solution that would automate the manual transcription process. Read this post to learn more.
Generative AI as a force for good in facilitating cyber-resiliency in public sector organizations
The Digital Transformation Hub (DxHub) at California Polytechnic State University (Cal Poly) in San Luis Obispo – powered by Amazon Web Services (AWS) and part of the AWS Cloud Innovation Centers (CIC) program – collaborated with the City of San Diego and the San Diego Cyber Center of Excellence (CCOE) to create ‘My eCISO,’ a generative artificial intelligence (AI)-based application that propels public and private organizations on a path to cyber resiliency. This post explores the technology behind My eCISO and its implications for organizations looking to protect against attacks.