"Buckets and objects can be created, listed, and retrieved using either a
HTTP interface or a
SOAP interface. Additionally, objects can be downloaded using the HTTP GET interface and the
Bucket names and keys are chosen so that objects are addressable using HTTP
http://bucket/key (where bucket is a
DNS CNAME record pointing to )
Because objects are accessible by unmodified HTTP clients, S3 can be used to replace significant existing (static)
web hosting infrastructure.
The Amazon AWS Authentication mechanism allows the bucket owner to create an authenticated URL with time-bounded validity. That is, someone can construct a URL that can be handed off to a third-party for access for a period such as the next 30 minutes, or
the next 24 hours.
Every item in a bucket can also be served up as a
BitTorrent feed. The S3 store can act as a seed host for a torrent and any BitTorrent client can retrieve the file. This drastically reduces the bandwidth costs for the download of popular objects. While the use of BitTorrent does reduce bandwidth, AWS
does not provide native bandwidth limiting and as such users have no access to automated cost control. This can lead to users on the 'free-tier' S3 or small hobby users amassing dramatic bills. AWS representatives have previously stated that such a feature
was on the design table from 2006 to 2010 but have recently stated the feature is no longer in development.
A bucket can be configured to save HTTP log information to a sibling bucket; this can be used in later
data mining operations. This feature is currently still in beta."
^_^ Windows Insider MVP (Security)
67 people were helped by this reply
Did this solve your problem?
Sorry this didn't help.
Great! Thanks for marking this as the answer.
How satisfied are you with this reply?
Thanks for your feedback, it helps us improve the site.