In part 3, we extended our Lambda to communicate with an API, using a secret key; and in this part, we’ll explore the logs created when the Lambda runs.
In part 2, we build a Lambda function, deployed and invoked it; and in this part, we’ll extend it to communicate with an API using a secret key.
In part 1, we set up the basic infrastructure to support a new Lambda function on AWS; and n this part, we’ll build a Lambda function, deploy it to AWS, and invoke it with some input.
At first glance, Amazon Web Services (AWS) can seem impenetrably complex, but it’s not so bad once you’ve found your way around it…
There are a many ways to peek inside a data file and reason about its contents.
Anyone can code. This is a short exploration of the choices for coding beginners out there.
My Mac likes to go to sleep to save power, and that means any long-running processes I have underway will be suspended when it does.
I learned to code on a computer called the BBC Micro, released by the BBC in 1981.
Cleaning up data from volunteer groups across the UK. We’re only human In the previous post, we took a tour of the open data available that tells the story of volunteerism across the UK since the coronavirus crisis began.
What can we learn about grass-roots COVID-19 volunteer groups from open data?