Serverless computing

Serverless computing is all the rage right now—and for several good reasons:

  • It removes you from having to provision a server yourself; you simply write functions, and the resources you need are automatically allocated to that function.
  • You pay only for the resources you use. No more leaving servers up and running, then getting a big cloud bill at the end of the month.
  • It can automatically scale, determining what cloud services need to scale with demand and then making it happen.

[ A developer’s guide: Get started with serverless computing. Then learn how to use Microsoft‘s Azure Functions and how to use AWS Lambda for serverless computing. | Build ’em now! 5 uses for serverless frameworks. ]

Amazon Web Services’ AWS Lambda and Microsoft’s Azure Functions are the best-known examples of serverless computing, and both have existed for a few years. Still, although we’ve had some great success in some serverless areas, there are other serverless areas that need work.

It’s not the technology that’s falling short with serverless computing, but its use. You can’t blame this one on AWS or Microsoft—enterprise development shops simply picked the wrong applications to apply serverless computing to.

For example, while new applications are a good fit for serverless computing, old applications often are not—and migrating those old applications to serverless could be more work than enterprises bargained for. One big reason is the fact that serverless computing systems don’t support all programming languages.

Even if the languages are supported, it takes a huge effort to refactor an application to properly take advantage of serverless computing. That refactoring means redoing the application as sets of functions, which essentially means developing the application anew. The advantages of serverless may not justify that refactoring effort, especially if that effort delays the creation of new applications that could add significant business value to focus on refactoring old applications that may not be optimal but nonetheless provide sufficient value as is.

This high refactoring effort in no way take anything away from the potential of serverless computing. It imply reinforces that fact that you need to prioritize where you spend your development resources. I’ve seen too many development shops, drawn by the promise of serveless computing, underestimate the effort to make old applications serverless, and thus delaying efforts that make better business sense for their organizations.

Enterprise development shops made these mistakes before, such as with the “everything must be a container” guys who quickly found out that’s not the case. For whatever reason, the IT community keeps forgetting these past errors in judgment when an enticing new technology comes along.

The inability to correctly apply technology seems to be in our genes, a human frailty that keeps repeating itself. Maybe one day we’ll really understand the saying “Those who fail to learn from history are doomed to repeat it.”


要查看或添加评论,请登录

Sean O'Connor的更多文章

  • Cyber Security Awareness Tips

    Cyber Security Awareness Tips

    Phishing Emails · Never respond to requests for personal information via email. Businesses will never ask for personal…

  • What is Ransomware

    What is Ransomware

  • Cybercrime: Profitable Business Model

    Cybercrime: Profitable Business Model

    Overview Top reasons why cybercriminals love the new business model Mass distribution, victim profiling and outsourcing…

  • AVOIDING SOCIAL ENGINEERING AND PHISHING ATTACKS

    AVOIDING SOCIAL ENGINEERING AND PHISHING ATTACKS

    What is a social engineering attack? In a social engineering attack, an attacker uses human interaction (social skills)…

  • CISO’S GUIDE TO SECURELY HANDLING LAYOFFS

    CISO’S GUIDE TO SECURELY HANDLING LAYOFFS

    To limit the potential for a security incident as layoffs occur, follow these 10 best practices: Be part of the…

  • Microsoft data backup in Office 365

    Microsoft data backup in Office 365

    How Office 365 data is protected against loss On Microsoft’s Trust Center, you can read a bit about how data is…

  • Top 5 Common misconceptions about working from home

    Top 5 Common misconceptions about working from home

    During the current COVID-19 crisis, Usherwood, along with most all of our clients have gone to a remote workforce…

  • Remote Workplace Security

    Remote Workplace Security

    Considerations for Remote Workplace Security Usherwood is committed helping clients to enable their remote workforce…

  • Overlooked Security Risks

    Overlooked Security Risks

    As a security professional, when you think about digital security, you think of traditional security tools—firewall…

    1 条评论
  • Top 10 Tips for Cybersecurity

    Top 10 Tips for Cybersecurity

    INSIDE THREATS Cyberthreats to your business are usually blamed on outsiders—nefarious programmers writing malicious…

社区洞察

其他会员也浏览了