Is serverless overpriced? What can we learn from the PrimeVideo team?

Last week, PrimeVideo posted a headline-grabbing article that broke tech Twitter. The article is a case study of how a PrimeVideo team cut the running cost of its service by 90% by moving away from a microservice architecture running on Lambda and Step Functions. The team didn’t expect the service to run at a high …

Is serverless overpriced? What can we learn from the PrimeVideo team? Read More »

Are You Ready for This? Top 5 Earth-Shattering Pros and Cons of AWS CDK

Ask most developers why they like the CDK and they will say “It lets me write infrastructure in my favourite programming language”. That’s nice, but why should that be a consideration for an Infra-as-Code (IaC) tool? That’s like saying “I like Strepsils because it tastes like candy”. ps. if you mention candy, pharmacy staff would …

Are You Ready for This? Top 5 Earth-Shattering Pros and Cons of AWS CDK Read More »

The Sky’s the Limit: Debating the Benefits of AWS Spending Restrictions

Yesterday, I posted a tweet with an imaginary conversation that is sadly based on many real conversations I have had. The tweet received some interesting replies, and the point about spending limits came up multiple times. So as a thought experiment, let’s think about the pros and cons of a spending limit and if it …

The Sky’s the Limit: Debating the Benefits of AWS Spending Restrictions Read More »

The Old Faithful: Why SSM Parameter Store still reigns over Secrets Manager

Managing and securing application secrets is a crucial part of any cloud-native application. AWS offers two primary services: the Systems Manager (SSM) Parameter Store and the more recent Secrets Manager. You might think Secrets Manager is the better choice for managing secrets because it’s a newer service and offers more advanced features such as cross-region …

The Old Faithful: Why SSM Parameter Store still reigns over Secrets Manager Read More »

Implementing Magic Links with Amazon Cognito: A Step-by-Step Guide

Last week, we looked at implementing passwordless authentication using one-time passwords (OTPs) using Cognito. Another popular passwordless authentication method is magic links where: The user initiates the sign-in process by entering their email in your application. They receive an email with a time-limited URL. The user clicks on the URL and is authenticated into the …

Implementing Magic Links with Amazon Cognito: A Step-by-Step Guide Read More »

Passwordless Authentication made easy with Cognito: a step-by-step guide

Password-based authentication has long been the norm for securing user accounts. However, it is becoming increasingly clear that password-based authentication has several drawbacks. Such as the risk of password theft, the need for users to remember complex passwords, and the time and effort required to reset forgotten passwords. Fortunately, more and more websites have started …

Passwordless Authentication made easy with Cognito: a step-by-step guide Read More »

The biggest problem with EventBridge Scheduler and how to fix it

The launch of EventBridge Scheduler was one of the highlights for me for re:Invent 2022. Finally, we have a scalable service that lets us schedule ad-hoc, one-off tasks in a serverless way! For longtime followers of my work, you might have read “Serverless Architectures on AWS, 2nd Edition”. In the book, I spent an entire …

The biggest problem with EventBridge Scheduler and how to fix it Read More »

3 ways to manage concurrency in serverless applications

Many software engineering concepts show up in different contexts. Modularity, the single-responsibility principle and separation of concerns are just a few examples that come to mind. They are equally applicable to how we write code, architect our systems and organize our teams. Similarly, there are many parallels between multithreaded programming and event-driven architectures. For example, …

3 ways to manage concurrency in serverless applications Read More »

How to handle serverful resources when using ephemeral environments

I’m a big fan of using ephemeral (or temporary) environments when I’m building serverless architectures. I have written about this practice before and I believe it’s one of the most important practices that have co-evolved with the rise of serverless technologies. It takes advantage of the pay-per-use pricing model offered by many serverless technologies such …

How to handle serverful resources when using ephemeral environments Read More »

By continuing to use the site, you agree to the use of cookies. more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close