AWS Compute Blog
Category: Compute
ICYMI: Serverless Q1 2018
This post courtesy of Paul Johnston, AWS Senior Developer Advocate – Serverless Welcome to the first edition of the AWS Serverless ICYMI (In case you missed it) quarterly recap! Every quarter we’ll share all of the most recent product launches, feature enhancements, blog posts, webinars, Twitch live streams, and other interesting things that you might have […]
Using AWS Lambda and Amazon Comprehend for sentiment analysis
This post courtesy of Giedrius Praspaliauskas, AWS Solutions Architect Even with best IVR systems, customers get frustrated. What if you knew that 10 callers in your Amazon Connect contact flow were likely to say “Agent!” in frustration in the next 30 seconds? Would you like to get to them before that happens? What if your […]
Node.js 8.10 runtime now available in AWS Lambda
This post courtesy of Ed Lima, AWS Solutions Architect We are excited to announce that you can now develop your AWS Lambda functions using the Node.js 8.10 runtime, which is the current Long Term Support (LTS) version of Node.js. Start using this new version today by specifying a runtime parameter value of nodejs8.10 when creating or […]
Tag Amazon EBS Snapshots on Creation and Implement Stronger Security Policies
This blog was contributed by Rucha Nene, Sr. Product Manager for Amazon EBS AWS customers use tags to track ownership of resources, implement compliance protocols, control access to resources via IAM policies, and drive their cost accounting processes. Last year, we made tagging for Amazon EC2 instances and Amazon EBS volumes easier by adding the […]
Innovation Flywheels and the AWS Serverless Application Repository
At AWS, our customers have always been the motivation for our innovation. In turn, we’re committed to helping them accelerate the pace of their own innovation. It was in the spirit of helping our customers achieve their objectives faster that we launched AWS Lambda in 2014, eliminating the burden of server management and enabling AWS […]
Managing Cross-Account Serverless Microservices
This post courtesy of Michael Edge, Sr. Cloud Architect – AWS Professional Services Applications built using a microservices architecture typically result in a number of independent, loosely coupled microservices communicating with each other, synchronously via their APIs and asynchronously via events. These microservices are often owned by different product teams, and these teams may segregate their […]
Message Filtering Operators for Numeric Matching, Prefix Matching, and Anything-But Matching in Amazon SNS
This blog was contributed by Otavio Ferreira, Software Development Manager for Amazon SNS Message filtering simplifies the overall pub/sub messaging architecture by offloading message filtering logic from subscribers, as well as message routing logic from publishers. The initial launch of message filtering provided a basic operator that was based on exact string comparison. For more […]
Application Tracing on Kubernetes with AWS X-Ray
This post was contributed by Christoph Kassen, AWS Solutions Architect With the emergence of microservices architectures, the number of services that are part of a web application has increased a lot. It’s not unusual anymore to build and operate hundreds of separate microservices, all as part of the same application. Think of a typical e-commerce […]
Applying the Twelve-Factor App Methodology to Serverless Applications
The Twelve-Factor App methodology is twelve best practices for building modern, cloud-native applications. With guidance on things like configuration, deployment, runtime, and multiple service communication, the Twelve-Factor model prescribes best practices that apply to a diverse number of use cases, from web applications and APIs to data processing applications. Although serverless computing and AWS Lambda […]
Sharing Secrets with AWS Lambda Using AWS Systems Manager Parameter Store
This post courtesy of Roberto Iturralde, Sr. Application Developer- AWS Professional Services Application architects are faced with key decisions throughout the process of designing and implementing their systems. One decision common to nearly all solutions is how to manage the storage and access rights of application configuration. Shared configuration should be stored centrally and securely with […]