1. Spotlight: Advancing IT Leadership
  2. Videos
  3. Newsletters
  4. Resources

About

  • About Us
  • Advertise
  • Contact Us
  • Foundry Careers
  • Newsletters
  • Contribute to InfoWorld
  • Reprints

Policies

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright Notice
  • Member Preferences
  • About AdChoices
  • E-commerce Affiliate Relationships
  • Your California Privacy Rights

Our Network

  • CIO
  • Computerworld
  • CSO
  • Network World

More

  • News
  • Features
  • Blogs
  • BrandPosts
  • Events
  • Videos
  • Enterprise Buyer’s Guides
  • Analytics
  • Artificial Intelligence
  • Generative AI
  • Careers
  • Cloud Computing
  • Data Management
  • Databases
  • Emerging Technology
  • Technology Industry
  • Security
  • Software Development
  • Microsoft .NET
  • Development Tools
  • Devops
  • Open Source
  • Programming Languages
  • Java
  • JavaScript
  • Python
  • IT Leadership
  • Enterprise Buyer’s Guides
Popular Topics
  • Artificial Intelligence
  • Cloud Computing
  • Data Management
  • Software Development
  • Spotlight: Advancing IT Leadership
  • Videos
  • Newsletters
  • Resources

Topics

  • Analytics
  • Artificial Intelligence
  • Generative AI
  • Careers
  • Cloud Computing
  • Data Management
  • Databases
  • Emerging Technology
  • Technology Industry
  • Security
  • Software Development
  • Microsoft .NET
  • Development Tools
  • Devops
  • Open Source
  • Programming Languages
  • Java
  • JavaScript
  • Python
  • IT Leadership
  • Enterprise Buyer’s Guides

About

  • About Us
  • Advertise
  • Contact Us
  • Foundry Careers
  • Newsletters
  • Contribute to InfoWorld
  • Reprints

Policies

  • Terms of Service
  • Privacy Policy
  • Cookie Policy
  • Copyright Notice
  • Member Preferences
  • About AdChoices
  • E-commerce Affiliate Relationships
  • Your California Privacy Rights

Our Network

  • CIO
  • Computerworld
  • CSO
  • Network World

More

  • News
  • Features
  • Blogs
  • BrandPosts
  • Events
  • Videos
  • Enterprise Buyer’s Guides
    1. Home
    2. Cloud Computing
    3. How to make the most of AWS Lambda
    Isaac Sacolick
    by Isaac Sacolick
    Contributing Writer

    How to make the most of AWS Lambda

    feature
    Jun 8, 20208 mins
    Cloud ComputingServerless Computing

    AWS Lambda’s serverless functions shine for event-driven data processing and machine learning, connecting cloud services and external APIs, and even triggering builds in a CI/CD pipeline

    ifw ts cloud  by ivanastar getty and sam schooler via unsplash
    Credit: Ivanastar / Getty Images / Sam Schooler

    There are many options for deploying cloud-native applications and services. Organizations developing large numbers of applications and services on different platforms and with varying compliance requirements are likely to consider containers and CaaS (containers as a service). Other organizations with few development stacks and operational restrictions looking for a simpler path to production often select PaaS options as they require less configuration and technical expertise.

    Then there is FaaS, or functions as a service, which abstracts the underlying infrastructure setup and configuration and provides simple mechanisms to deploy and run code. Functions are ideally suited to executing code in response to events, and they can be used as infrastructure for lightweight microservices. 

    In a previous article examining PaaS, CaaS, and FaaS, I share guidelines from architects and cloud experts on some of the considerations when selecting a cloud architecture. In this article, I’ll share more specific requirements for using serverless functions and provide several example use cases.

    While I focus on AWS Lambda here, the same general principles will apply to using Microsoft Azure Functions, Google Cloud Functions, IBM Cloud Functions, Oracle Functions, and other FaaS platforms. 

    Technical requirements for AWS Lambda functions

    AWS Lambda is one option for deploying serverless functions on public clouds. It’s important to consider the key technical requirements before implementing these services.

    Tech Spotlight: Cloud Computing

    • The 2020 IDG Cloud Computing Survey (InfoWorld)
    • Reskilling IT for the cloud (CIO)
    • The pros and cons of cloud storage (Network World)
    • 3 big SaaS challenges for IT (Computerworld)
    • A 10-point plan to vet SaaS provider security (CSO)
    • How to make the most of AWS Lambda (InfoWorld)

    AMS Lambda functions can be developed in Java, Go, PowerShell, Node.js, C#, Python, and Ruby. AWS has a list of events that can trigger a Lambda function with the most simple ones triggered as API calls through Amazon API Gateway. Events can also be triggered by code commits, CI/CD pipelines, Kinesis data streams, cloud system monitors, and IoT Events. You can also schedule the running of functions using CloudWatch events. Functions operate synchronously or asynchronously, depending on the type of trigger.

    AWS Lambda functions can run up to fifteen minutes per execution. They can be configured to have 3GB of memory and access up to 500MB on non-persistent disk. Lambda functions must be stateless and inbound TCP/IP connections are restricted, but they can use environment variables and create threads or processes. This AWS Lambda FAQ provides a lot more details on the technical capabilities and restrictions.

    Developers can configure individual functions as well as serverless applications with AWS Serverless Application Model. This option allows developers to conveniently bundle, deploy, and manage a group of services that collectively operate as applications.

    Serverless functions and serverless applications reduce costs

    I spoke to Hitesh Chitalia, an experienced cloud solutions architect, about how he uses AWS Lambda to rapidly develop and easily support microservices and applications.

    “I like to use Lambda because it reduces the focus on infrastructure when supporting microservices or simple operational maintenance tasks,” Chitalia replied. “It has matured now to the point where I can orchestrate batch jobs through step functions, execute ETLs, and run full-featured web applications.”

    Chitalia has succeeded in lowering costs by migrating applications from dedicated Amazon EC2 servers to serverless functions and applications. The cost savings can be significant, especially for applications and services that have episodic usage patterns.

    Chitalia shared a specific example:

    The cost structure for FaaS also makes it an attractive option. Its pay-per-use approach combined with the reduction in infrastructure overhead allows businesses to closely track costs based on product utilization. A basic example is an API at a previous company was migrated from two small EC2 instances to Lambda and saw a reduction of 90% in costs. As the usage grew, Lambda automatically scales to support the increased usage. Roughly 6x growth in calls resulted in 2x in increased costs for the Lambda service.

    Chitalia also shared some of the development considerations. “Because FaaS requires smaller, shorter-running functions to be effective, code will need to be re-written to take advantage,” he said. “There is also the issue of cold starts where the first call to a function that has been idle for a while may take seconds to respond.”

    Examples of serverless functions and serverless applications

    To better understand how developers are using serverless functions and applications, I looked through Amazon’s Serverless Application Directory and other sources to identify some common use cases. These may serve as coding examples and also illustrate areas where there are some easy first projects.

    • “How to” functions often illustrate how to connect two or more different Amazon or other external web services. Python and Node.js are the two most popular development languages used in these examples. Several example services connect S3, DynamoDB, API Gateway, SNS, and CloudFront.
    • Alexa skill cartridges and other examples that connect to the Alexa APIs are the most frequently downloaded services in the directory.
    • System administrators are using serverless functions to process log files, compress files in S3 buckets, monitor web services, and handle web server redirects.
    • Manipulating images and other media files is a common need in web applications. Several examples use ImageMagick and other image and media utilities to convert file types, resize images, create galleries, and compress image files.
    • There are several examples of connecting to SaaS applications, vendor APIs, and other services including Slack, Elasticsearch, Sumo Logic, and Selenium.
    • Data processing and machine learning services are also prevalent in the directory. There are examples of connecting Amazon Kinesis to input and output data streams, and several examples of using Amazon Lex for speech and natural language processing. Data scientists will also find services for TensorFlow and Scikit-learn.
    • DevOps examples include integrations with CI/CD pipelines to trigger builds or to capture event information and push it to other tools.

    Microsoft currently lacks a directory of serverless functions and applications, but there are many good examples to review elsewhere. You can review a full serverless billing application, take in a guide for getting started with JavaScript functions, or check out these Python examples, guides, and quickstarts.

    The promise of serverless computing

    There is a school of thought that serverless computing represents a niche use case because of technical limitations or a mix of compliance and security constraints. Serverless functions are hosted in containers where you surrender infrastructure setup, configuration, management, and control over to the cloud provider. For regulated companies, serverless functions running on public clouds may not be an option.

    Other organizations that already have to set up large-scale applications and services using containers or with PaaS might debate the benefits of having a separate hosting service for functions. For these groups, it might be just as easy to use infrastructure as code and deploy functions directly to an optimally selected infrastructure.

    But there is another school of thought that puts serverless functions in the mainstream of enterprise software development. First, developers should be excited about the simplicity of deploying functions without the steps to plan and implement the infrastructure. At a minimum, serverless functions can be used during development phases and ported to PaaS or container options only when required.

    Second, developers should be excited about the potential of serverless functions to vastly simplify software library selection and code reuse. Developers often scour GitHub and other open repositories for code libraries, development kits, and other code samples that can be leveraged in their applications. Once a component is found, tested for its capabilities, reviewed for performance considerations, and validated for security issues, the developer is then left with the task of incorporating the code into their application.

    The integration can be done in several different ways depending on the coding platform, application architecture, philosophy on optimizing builds, and deployment considerations.

    But when these code libraries can be deployed as serverless functions, then the developer has to do a lot less work to utilize its capabilities. This option also enables system engineers to size and scale services based on their consumption and processing requirements. This is part of the promise of microservices.

    It’s interesting to think of a future based on serverless functions. Instead of searching GitHub for code samples, developers will search directories of serverless functions. Organizations with many development teams may also create internal directories of repurposable serverless functions and other microservices.

    As cloud providers continue to simplify infrastructure and deployment options, we can expect serverless compute offerings to create new avenues for developers to repurpose functions, deploy capabilities faster, and enable cloud operations to optimize costs.

    Related content

    news

    Mistral unveils Mistral Agents API

    By Lynn Greiner
    May 27, 2025 3 mins
    APIs Generative AI PaaS
    analysis

    IT leadership lessons from Leeroy Jenkins

    By David Linthicum
    May 27, 2025 5 mins
    Artificial Intelligence Generative AI Technology Industry
    feature

    Multicloud developer lessons from the trenches

    By Josh Fruhlinger
    May 26, 2025 11 mins
    Cloud Computing Developer Multicloud
    news

    Google I/O 2025: All eyes on AI and Gemini

    By Dan Muse
    May 23, 2025 4 mins
    Artificial Intelligence Generative AI Google Cloud Platform

    Other Sections

    • Resources
    • Videos
    • Spotlight: Advancing IT Leadership
    Isaac Sacolick
    by Isaac Sacolick
    Contributing Writer
    1. Follow Isaac Sacolick on X
    2. Follow Isaac Sacolick on LinkedIn

    Isaac Sacolick, President of StarCIO, a digital transformation learning company, guides leaders on adopting the practices needed to lead transformational change in their organizations. He is the author of Digital Trailblazer and the Amazon bestseller Driving Digital and speaks about agile planning, devops, data science, product management, and other digital transformation best practices. Sacolick is a recognized top social CIO, a digital transformation influencer, and has over 900 articles published at InfoWorld, CIO.com, his blog Social, Agile, and Transformation, and other sites.

    Isaac's opinions are his own.

    More from this author

    • analysis

      What we know now about generative AI for software development

      May 27, 2025 9 mins
    • analysis

      How to use genAI for requirements gathering and agile user stories

      May 13, 2025 6 mins
    • analysis

      5 ways generative AI boosts cloud and IT operations

      Apr 29, 2025 9 mins
    • analysis

      Measuring success in dataops, data governance, and data security

      Apr 15, 2025 12 mins
    • analysis

      How to start developing a balanced AI governance strategy

      Apr 1, 2025 10 mins
    • analysis

      How to simplify app migration with generative AI tools

      Mar 18, 2025 10 mins
    • analysis

      Improving intelligent document processing with generative AI

      Mar 4, 2025 10 mins
    • analysis

      3 reasons to consider a data security posture management platform

      Feb 18, 2025 8 mins

    Show me more

    news

    Reports of Deno’s demise ‘greatly exaggerated,’ Deno creator says

    By Paul Krill
    May 28, 20254 mins
    JavaScriptTypescriptWeb Development
    Image
    feature

    AI didn’t kill Stack Overflow

    By Matthew Tyson
    May 28, 20259 mins
    DeveloperGenerative AITechnology Industry
    Image
    opinion

    How to hire software developers

    By Nick Hodges
    May 28, 20255 mins
    CareersDeveloperIT Leadership
    Image
    video

    How to use the new Python Installation Manager tool for Python 3.14

    May 27, 20254 mins
    Python
    Image
    video

    How to use Marimo | A better Jupyter-like notebook system for Python

    May 13, 20254 mins
    Python
    Image
    video

    How to prettify command line output in Python with Rich

    May 7, 20254 mins
    Python
    Image

    Sponsored Links

    • Empower your cybersecurity team with expert insights from Palo Alto Networks.
    • Secure AI by Design: Unleash the power of AI and keep applications, usage and data secure.
    About
    • About Us
    • Advertise
    • Contact Us
    • Foundry Careers
    • Reprints
    • Newsletters
    • BrandPosts
    Policies
    • Terms of Service
    • Privacy Policy
    • Cookie Policy
    • Copyright Notice
    • Member Preferences
    • About AdChoices
    • E-commerce Affiliate Relationships
    • Your California Privacy Rights
    • Privacy Settings
    Our Network
    • CIO
    • Computerworld
    • CSO
    • Network World
    • Facebook
    • X
    • YouTube
    • Google News
    • LinkedIn
    © 2025 IDG Communications, Inc. All Rights Reserved.
`, cio: `

🚀 The new CIO.com hybrid search: 🔍 Explore CIO content smarter, faster and AI powered. ✨

`, nww: `

🚀 The new NetworkWorld.com hybrid search: 🔍 Explore NetworkWorld content smarter, faster and AI powered. ✨

`, cw: `

🚀 The new Computerworld.com hybrid search: 🔍 Explore Computerworld content smarter, faster and AI powered. ✨

` }; const sharedStyles = ` `; const publisher = foundry_get_publisher(); const htmlContent = contentSwitch[publisher]; if (!htmlContent || !document.body) return; document.body.insertAdjacentHTML("afterbegin", htmlContent + sharedStyles); const bar = document.querySelector(".section-block--announcementbar"); if (bar) { requestAnimationFrame(() => { bar.classList.add("section-block--announcementbar--visible"); }); } const btn = document.querySelector(".section-block--announcementbar .reset-button"); const searchIcon = document.querySelector('.header__icon-button[data-menu-trigger="search"] svg'); const searchTrigger = document.querySelector('[data-menu-trigger="search"]'); if (searchIcon) { searchIcon.innerHTML = ''; } if (btn && searchTrigger) { btn.addEventListener("click", () => searchTrigger.click()); } console.log("[MISO SCRIPT] Conditions met, initializing Miso search announcements."); }; initMisoSearchAnnouncements(); }); document.addEventListener('consentManagerReady', () => { const hasConsentYouTube = consentManager.checkConsentByVendors([ 'YouTube', 'YT' ]); if (hasConsentYouTube.some(vendor => vendor['Has Consent'] === false)) { console.log('[YOUTUBE SCRIPT] Consent not given for YouTube.'); } else { console.log('[YOUTUBE SCRIPT] Consent given for YouTube. Loading script...'); } }); document.addEventListener('consentManagerReady', () => { const hasConsentGAM = consentManager.checkConsentByVendors([ 'Google Ad Manager', 'GAM' ]); if (hasConsentGAM.some(vendor => vendor['Has Consent'] === false)) { console.log('[GAM SCRIPT] Consent not given for GAM.'); } else { console.log('[GAM SCRIPT] Consent given for GAM. Loading script...'); } }); document.addEventListener('consentManagerReady', () => { const hasConsentGoogleFonts = consentManager.checkConsentByVendors([ 'Google Fonts', 'Google Web Fonts' ]); if (hasConsentGoogleFonts.some(vendor => vendor['Has Consent'] === false)) { console.log('[GOOGLE FONTS SCRIPT] Consent not given for Google Fonts.'); } else { console.log('[GOOGLE FONTS SCRIPT] Consent given for Google Fonts. Loading script...'); } }); document.addEventListener('consentManagerReady', () => { const hasConsentAdobeTypekit = consentManager.checkConsentByVendors([ 'Adobe Typekit' ]); if (hasConsentAdobeTypekit.every(vendor => vendor['Has Consent'] === true)) { if (foundry_is_edition('kr')) { const link = document.createElement('link'); link.rel = 'stylesheet'; link.href = 'https://use.typekit.net/ysx4dcu.css'; document.head.appendChild(link); } } }); document.addEventListener('consentManagerReady', () => { const vendors = ['Subscribers']; const hasConsentSubscribers = consentManager.checkConsentByVendors(vendors); if (hasConsentSubscribers.some(vendor => vendor['Has Consent'] === false)) { return; } else { if (foundry_is_language('en')) { console.log('Language is English'); // subscribers english .. } if (foundry_is_edition('kr')) { console.log('Edition is Korean'); // subscribers in korean .. } if (foundry_is_edition('ja')) { console.log('Edition is Japanese'); // subscribers in japanese .. } } });