T-Rex Supports First-Ever Online U.S. Census with Help from AWS Customer Enablement Services

T-Rex Supports First-Ever Online U.S. Census with Help from AWS Customer Enablement Services

Date: April 25, 2022
  • Home
  • >
  • We're on point
  • >
  • T-Rex Supports First-Ever Online U.S. Census with Help from AWS Customer Enablement Services

The 2020 Census was successfully conducted using an online response option, for the first time in U.S. history. T-Rex collaborated closely with Amazon Web Services (AWS) to ensure the U.S. Census Bureau’s systems were architected for security, scalability, and reliability. T-Rex leveraged various AWS Customer Enablement services that contributed to this success.

Click here to read the full story of T-Rex and AWS’ partnership on the 2020 Census.


recently posted
The Path to Zero Trust Maturity

The Path to Zero Trust Maturity

As the world continues to battle the pandemic, a remote workforce persists. Given the sudden and continued need for remote capabilities, organizations are forced to assess and consider strengthening their security measures to meet an entirely new set of demands […]

DataOps: Toward an Incremental Data Process

DataOps: Toward an Incremental Data Process

Data science projects are known to have a high failure rate of up to 85% despite the nature of their important role to business. Integrating data analytics into core Information Technology (IT) capabilities can be elusive and daunting. “If we […]

FinOps: Modernizing Cost Planning and Management in Hybrid IT Environments

FinOps: Modernizing Cost Planning and Management in Hybrid IT Environments

According to the latest forecast from Gartner, Inc Worldwide, end-user spending on public cloud services is forecast to grow 23.1% in 2021 to total $332.3 billion, up from $270 billion in 2020. While cloud spending is increasing at a rapid […]

What is Zero Trust and Why Do I Need It?

What is Zero Trust and Why Do I Need It?

The traditional approach to cybersecurity, known as perimeter and defense in depth models, are not enough. Bad actors continue to evolve their methods of attack to access an organization’s most mission critical systems. How can your business withstand a cyber-attack?