AWS Compute Blog

ICYMI: Serverless Q1 2019

Welcome to the fifth edition of the AWS Serverless ICYMI (in case you missed it) quarterly recap. Every quarter, we share all of the most recent product launches, feature enhancements, blog posts, webinars, Twitch live streams, and other interesting things that you might have missed! If you didn’t see them, check our previous posts for what […]

Read More

Upcoming updates to the AWS Lambda and AWS Lambda@Edge execution environment

AWS Lambda was first announced at AWS re:Invent 2014. Amazon CTO Werner Vogels highlighted the aspect of needing to run no servers, no instances, nothing, you just write your code. In 2016, we announced the launch of Lambda@Edge, which lets you run Lambda functions to customize content that CloudFront delivers, executing the functions in AWS […]

Read More

Creating an AWS Batch environment for mixed CPU and GPU genomics workflows

This post is courtesy of Lee Pang – AWS Technical Business Development  I recently worked with a customer who needed to process a bunch of raw sequence files (FastQs) into Hi-C format (*.hic), which is used for the structural analysis of DNA/chromatin loops and sequence accessibility. The tooling they were interested in using was the Juicer […]

Read More

Running the most reliable choice for Windows workloads: Windows on AWS

Some of you may not know, but AWS began supporting Microsoft Windows workloads on AWS in 2008—over 11 years ago. Year over year, we have released exciting new services and enhancements based on feedback from customers like you. AWS License Manager and Amazon CloudWatch Application Insights for .NET and SQL Server are just some of […]

Read More

Enabling DNS resolution for Amazon EKS cluster endpoints

This post is contributed by Jeremy Cowan – Sr. Container Specialist Solution Architect, AWS By default, when you create an Amazon EKS cluster, the Kubernetes cluster endpoint is public. While it is accessible from the internet, access to the Kubernetes cluster endpoint is restricted by AWS Identity and Access Management (IAM) and Kubernetes role-based access […]

Read More

Optimizing Network Intensive Workloads on Amazon EC2 A1 Instances

This post courtesy of Ali Saidi, AWS, Principal Engineer At re:Invent 2018, AWS announced the Amazon EC2 A1 instance. The A1 instances are powered by our internally developed Arm-based AWS Graviton processors and are up to 45% less expensive than other instance types with the same number of vCPUs and DRAM. These instances are based […]

Read More

Using partition placement groups for large distributed and replicated workloads in Amazon EC2

This post is contributed by Ankit Jain – Sr. Product Manager, Amazon EC2 and Harsha Warrdhan Sharma – Global Account Solutions Architect at AWS Before we introduced partition placement groups, customers deployed large distributed and replicated workloads across multiple Availability Zones to reduce correlated failures. This new Amazon EC2 placement strategy helps reduce the likelihood […]

Read More

From Poll to Push: Transform APIs using Amazon API Gateway REST APIs and WebSockets

This post is courtesy of Adam Westrich – AWS Principal Solutions Architect and Ronan Prenty – Cloud Support Engineer Want to deploy a web application and give a large number of users controlled access to data analytics? Or maybe you have a retail site that is fulfilling purchase orders, or an app that enables users to […]

Read More

Fact-checking the truth on TCO for running Windows workloads in the cloud

We’ve been talking to many customers over the last 3–4 months who are concerned about the total cost of ownership (TCO) for running Microsoft Windows workloads in the cloud. For example, Infor is a global leader in enterprise resource planning (ERP) for manufacturing, healthcare, and retail. They’ve moved thousands of their existing Microsoft SQL Server […]

Read More

Anatomy of CVE-2019-5736: A runc container escape!

This post is courtesy of Samuel Karp, Senior Software Development Engineer — Amazon Container Services. On Monday, February 11, CVE-2019-5736 was disclosed.  This vulnerability is a flaw in runc, which can be exploited to escape Linux containers launched with Docker, containerd, CRI-O, or any other user of runc.  But how does it work?  Dive in! […]

Read More