PinnedReflecting on Serverless: Current State, Community Thoughts, and Future ProspectsLately, I’ve seen many serverless outtakes and mixed opinions online. They stirred up the community and started a discussion, which is…Jul 242Jul 242
Published inAWS in Plain EnglishAWS WAF Essentials: Securing Your SaaS Services Against Cyber ThreatsLearn about the AWS Web Application Firewall (WAF), what it is for, tips, and insights for visibility, ownership, governance and more2d ago2d ago
Published inAWS TipUnderstanding AWS Availability Zones: Boosting SaaS Resilience and UptimeResilience and availability are critical aspects of every SaaS application. By building your SaaS Serverless services on AWS’…Oct 21Oct 21
AWS re:Invent 2024 — My Selection Of SessionsIn this post, you will find my opinionated list of AWS re:Invent 24 breakout sessions, workshops, builder sessions, code-talks, dev chats…Oct 2Oct 2
Guide to AWS re:Invent — Tips & Tricksmy top tips for making the most out of the AWS re:Invent conference while navigating it like a pro.Sep 23Sep 23
Published inAWS in Plain EnglishA Critical Look at AWS Lambda Extensions: Pros, Cons, and Recommended Use CasesIn this post, I will share my thoughts about AWS Lambda extensions, the good and the bad, and when you should use or should not use themSep 10Sep 10
Published inAWS in Plain EnglishBuild a Serverless Web Application on Fargate ECS with AWS CDKBuild a secure Fargate ECS cluster with an application load balancer and a web application using Python CDK code.Aug 13Aug 13
Build a Chatbot with Amazon Bedrock: Automate API Calls Using Powertools for AWS Lambda and CDKBedrock and LLMs are the cool kids in town. I decided to figure out how easy it is to build a chatbot using Bedrock agents’ capability to…Jul 8Jul 8
Amazon CloudFormation Custom Resources Best Practices with CDK and Python ExamplesLearn of CloudFormation custom resources, their types, and best practices using AWS CDK, Powertools for AWS, Pydantic, and crhelper.Jun 18Jun 18
AWS Security Best Practices: Leveraging IAM for Service-to-Service Authentication and AuthorizationA critical aspect of cloud services is service-to-service communication, and it’s essential to do it securely. As an architect who designed…Jun 3Jun 3