It’s easy to add console.log statements to log information from a Lambda function into CloudWatch, but then it can be a challenge to find the information we want. Logs for each Lambda are broken out into different groups, and logs within each group are further broken out into different streams. CloudWatch is a powerful tool but has limited search capabilities. Looking at logs while editing Lambda functions can involve quite a lot of clicking around.[Read more…]
We mostly do software development on our laptops, which are obviously computers in a way that we are familiar with: screen, keyboard, and a CPU that heats up every time I need to create and test a build (i.e., compile our software so that you can load it in your browser). I often edit files on my hard drive, which are then compiled and loaded locally in my browser where, if I’m working on a user interface element, I can see if the code is working the way that I expect. But when I get to the point where I’m ready to submit my code for a code review, things move to the cloud.[Read more…]
You’ve likely heard about systems being compromised, allowing malicious actors to obtain usernames, passwords, and other sensitive data. For example, 3 billion Yahoo user accounts were compromised in 2014, the vast majority of which included passwords. Sensitive information for 150 million users of Under Armor’s MyFitnessPal application was exposed in 2018 including usernames, email addresses, and passwords for many accounts.
In the twentieth century, if you wanted to run a multi-user application, you generally had to buy dedicated servers and install them in a data center. These servers could do amazing things, but they were very expensive, and often you’d have to wait many months to get them delivered and installed in a data center.