AWS Compute Blog

Category: Compute

CodeWhisperer full function generation

Introducing Amazon CodeWhisperer in the AWS Lambda console (In preview)

This blog post is written by Mark Richman, Senior Solutions Architect. Today, AWS is launching a new capability to integrate the Amazon CodeWhisperer experience with the AWS Lambda console code editor. Amazon CodeWhisperer is a machine learning (ML)–powered service that helps improve developer productivity. It generates code recommendations based on their code comments written in […]

Lambda concurrency at particular times

Understanding AWS Lambda scaling and throughput

AWS Lambda provides a serverless compute service that can scale from a single request to hundreds of thousands per second. When designing your application, especially for high load, it helps to understand how Lambda handles scaling and throughput. There are two components to consider: concurrency and transactions/requests per second. Concurrency of a system is the […]

putProduct trace view

Simplifying serverless best practices with AWS Lambda Powertools for TypeScript

This blog post is written by Sara Gerion, Senior Solutions Architect. Development teams must have a shared understanding of the workloads they own and their expected behaviors to deliver business value fast and with confidence. The AWS Well-Architected Framework and its Serverless Lens provide architectural best practices for designing and operating reliable, secure, efficient, and cost-effective […]

architecture used in this post

Automating Amazon EC2-Windows EBS Volumes monitoring and creating alarms

This blog post is written by, Santhosh Kumar Adapa, Database Consultant,  AWS WWCO ProServe,  Jeevan Shetty, Database Consultant, AWS WWCO ProServe, and Bhanu Ganesh Gudivada, Consultant  Databases, AWS WWCO ProServe. Customers who are running fleets of Amazon Elastic Compute Cloud (Amazon EC2) instances use advanced monitoring techniques to observe their operational performance. Capabilities like aggregated and […]

Performance results

Optimizing Node.js dependencies in AWS Lambda

In this post, you learn how to improve Node.js cold start performance by up to 70% by bundling and minifying your code. You also learned how to provide a different version of AWS SDK for JavaScript and that dependencies and how they are imported affects the performance of Node.js Lambda functions. To achieve the best performance, use AWS SDK V3, bundle and minify your code, and avoid top-level imports.

Configuring low latency connectivity between AWS Outposts rack and on-premises data using CoIP

This blog post is written by, Leonardo Azize Martins, Cloud Infrastructure Architect, Professional Services. AWS Outposts rack enables applications that need to run on-premises due to low latency, local data processing, or local data storage needs by connecting Outposts rack to your on-premises network via the local gateway (LGW). Each Outpost rack includes a local […]

Understanding the lifecycle of Amazon EC2 Dedicated Hosts

This post is written by Benjamin Meyer, Sr. Solutions Architect, and Pascal Vogel, Associate Solutions Architect. Amazon Elastic Compute Cloud (Amazon EC2) Dedicated Hosts enable you to run software on dedicated physical servers. This lets you comply with corporate compliance requirements or per-socket, per-core, or per-VM licensing agreements by vendors, such as Microsoft, Oracle, and […]

ICYMI: Serverless Q2 2022

Welcome to the 18th edition of the AWS Serverless ICYMI (in case you missed it) quarterly recap. Every quarter, we share all the most recent product launches, feature enhancements, blog posts, webinars, Twitch live streams, and other interesting things that you might have missed! In case you missed our last ICYMI, check out what happened […]

Overall workflow of POC

Use AWS Nitro Enclaves to perform computation of multiple sensitive datasets

This blog post is written by, Jeff Wisman, Principal Solutions Architect and Andrew Lee, Solutions Architect. Introduction Many organizations have sensitive datasets that they do not want to share with others because of stringent security and compliance requirements. However, they would still like to use each other’s data to perform processing and aggregation. For example, […]