AWS Architecture Blog

Category: AWS Lambda

Figure 1. Automated form data extraction architecture

Automate your Data Extraction for Oil Well Data with Amazon Textract

Traditionally, many businesses archive physical formats of their business documents. These can be invoices, sales memos, purchase orders, vendor-related documents, and inventory documents. As more and more businesses are moving towards digitizing their business processes, it is becoming challenging to effectively manage these documents and perform business analytics on them. For example, in the Oil […]

Figure 1. User interface communicating with API Gateway to upload a file to a S3 bucket using a presigned URL

Deploying Sample UI Forms using React, Formik, and AWS CDK

Companies in many industries use UI forms to collect customer data for account registrations, online shopping, and surveys. It can be tedious to create form fields. Proper use of input validation can help users easily find and fix mistakes. Best practice is that users should not see a form filled with “this field is required” […]

Figure 1. Architecture diagram of an anomaly detection solution for ecommerce traffic

Automating Anomaly Detection in Ecommerce Traffic Patterns

Many organizations with large ecommerce presences have procedures to detect major anomalies in their user traffic. Often, these processes use static alerts or manual monitoring. However, the ability to detect minor anomalies in traffic patterns near real-time can be challenging. Early detection of these minor anomalies in ecommerce traffic (such as website page visits and […]

Figure 1. Connect data streaming automation workflow

Automate Amazon Connect Data Streaming using AWS CDK

Many customers want to provision Amazon Web Services (AWS) cloud resources quickly and consistently with lifecycle management, by treating infrastructure as code (IaC). Commonly used services are AWS CloudFormation and HashiCorp Terraform. Currently, customers set up Amazon Connect data streaming manually, as the service is not available under CloudFormation resource types. Customers may want to […]

Figure 1. Pulse ingestion module architecture

Codacy Measures Developer Productivity using AWS Serverless

Codacy is a DevOps insights company based in Lisbon, Portugal. Since its launch in 2012, Codacy has helped software development and engineering teams reduce defects, keep technical debt in check, and ship better code, faster. Codacy’s latest product, Pulse, is a service that helps understand and improve the performance of software engineering teams. This includes […]

Figure 2. Control plane architecture

How Ribbon Built a Scalable, Resilient Robocall Mitigation Platform

Ribbon provides communications software, and IP and optical networking end-to-end solutions that deliver innovation, unparalleled scale, performance, and agility to service providers and enterprise. Ribbon is helping customers modernize their networks. In today’s data-hungry, 24/7 world, this equates to improved competitive positioning and business outcomes. Companies are migrating from on-premises equipment for telephony services and looking […]

Figure 2. Credit application – technical solution using Amazon SageMaker and Experian CaaS ML models

How Experian uses Amazon SageMaker to Deliver Affordability Verification 

Financial Service (FS) providers must identify patterns and signals in a customer’s financial behavior to provide deeper, up-to-the-minute, insight into their affordability and credit risk. FS providers use these insights to improve decision making and customer management capabilities. Machine learning (ML) models and algorithms play a significant role in automating, categorising, and deriving insights from […]

Figure 3. Choreography monitoring with AWS Step Functions

Use AWS Step Functions to Monitor Services Choreography

Organizations frequently need access to quick visual insight on the status of complex workflows. This involves collaboration across different systems. If your customer requires assistance on an order, you need an overview of the fulfillment process, including payment, inventory, dispatching, packaging, and delivery. If your products are expensive assets such as cars, you must track […]

Figure 4. High-level architecture pattern for discovering public IPs

Find Public IPs of Resources – Use AWS Config for Vulnerability Assessment

Systems vulnerability management is a key component of your enterprise security program. Its goal is to remediate OS, software, and applications vulnerabilities. Scanning tools can help identify and classify these vulnerabilities to keep the environment secure and compliant. Typically, vulnerability scanning tools operate from internal or external networks to discover and report vulnerabilities. For internal […]

Figure 2. Modernized queuing architecture using Amazon SQS

Modernized Database Queuing using Amazon SQS and AWS Services

This blog post was last reviewed/updated August, 2022. The updated version shown below is based on working backwards from a customer need to ensure data consistency post migration, to a modernized microservice architecture. A queuing system is composed of producers and consumers. A producer enqueues messages (writes messages to a database) and a consumer dequeues […]