LLM Inference with Bedrock
If you're curious about building with LLMs, but you want to skip the hype and learn what it takes to ship something reliable in production, this episode is for...
7/7 ποΈ So, if you are building with LLMs on AWS, or trying to turn a promising prototype into something production-ready, I think youβll enjoy this one:
awsbites.com/153-llm-infe...
Would love to hear what Bedrock surprises you have run into so far π
#AWS #AmazonBedrock #LLM #AI
06.03.2026 14:30
π 1
π 0
π¬ 0
π 0
6/7 π§± One of my favourite parts of the episode is the discussion around structured outputs.
Because in many real applications, the challenge is not βcan the model answer?β
It is βcan the model answer in a format my system can reliably use?β
06.03.2026 14:30
π 0
π 0
π¬ 1
π 0
5/7 βοΈ Bedrock is interesting because it gives you a more unified way to work with models inside AWS, with things like IAM, monitoring, auditing, and private networking options.
That makes a big difference when you start thinking beyond a prototype.
06.03.2026 14:30
π 0
π 0
π¬ 1
π 0
4/7 β οΈ There is a lot of AI content that stops at βlook, it worksβ.
But once you want to ship something, the questions change very quickly:
Can we trust it?
Can we keep it under control?
Can we integrate it safely?
Can we make it robust?
06.03.2026 14:30
π 0
π 0
π¬ 1
π 0
3/7 π We get into:
β’ what inference actually means
β’ how to think about model selection
β’ how token pricing affects cost
β’ quotas and throttling surprises
β’ IAM and access gotchas
β’ why structured outputs are so important
06.03.2026 14:30
π 0
π 0
π¬ 1
π 0
2/7 π§ We have been building AI-powered applications on AWS for ourselves and with customers, and along the way we picked up a decent collection of battle scars.
So this episode is not about hype.
It is about the practical stuff that shows up when you try to build something real.
06.03.2026 14:30
π 0
π 0
π¬ 1
π 0
AWS Bites Podcast cover art showing a bed in a grassy field with a huge rock resting on top of it, under the title βgetting started with Amazon Bedrock.β Eoin appears on the left behind the rock, shading his eyes, while Luciano stands on the right. The scene is warm, playful, and photorealistic.
1/7 π Getting an LLM demo to work is not the hard part anymore.
The hard part is making it reliable, predictable, and affordable in production.
Thatβs what @eoinshanaghy and I focus on in the latest AWS Bites episode, all about LLM inference with Amazon Bedrock π
06.03.2026 14:30
π 0
π 0
π¬ 1
π 0
Very good point. I'll add that to the article! Thanks a million
03.02.2026 12:20
π 2
π 0
π¬ 0
π 0
I wrote a guide on preventing path traversal in Node.js:
β Why path.join() won't save you
β Attack vectors (double encoding, null bytes, symlinks)
β A safeResolve() function with detailed explanation
β Lots of code examples
β How to test it
03.02.2026 10:47
π 0
π 0
π¬ 1
π 0
Here's the thing about becoming a senior engineer:
It's not about writing clever code.
It's about knowing what can go wrong.
Security, edge cases, failure modes. The stuff that doesn't show up in most tutorials.
03.02.2026 10:47
π 0
π 0
π¬ 1
π 0
Path traversal has been one of the most exploited vulnerabilities in recent years.
Apache, Rails, popular npm packages, even Node.js itself have all been bitten by it.
Yet it's still way too easy to write vulnerable code.
03.02.2026 10:47
π 0
π 0
π¬ 1
π 0
The developer who wrote it had years of experience.
They just never had to think about path traversal before.
This wasn't a junior mistake. It's a knowledge gap.
03.02.2026 10:47
π 0
π 0
π¬ 1
π 0
Database credentials. SSH keys. Application secrets.
All accessible with a simple HTTP request.
If that doesn't sound scary, I don't know what does.
03.02.2026 10:47
π 0
π 0
π¬ 1
π 0
The code joined a user-provided filename with an uploads directory and served the file.
Looks safe, right?
But the input `../../etc/passwd` sailed right through `path.join()` and exposed everything.
03.02.2026 10:47
π 0
π 0
π¬ 1
π 0
I almost approved a security hole last year.
A simple image server. Clean code. Worked perfectly.
It also let anyone read any file on our filesystem.
Here's what happened π§΅
03.02.2026 10:47
π 0
π 0
π¬ 1
π 0
Thank you very much!
This conversation lead me to do a bit more research and I think there's still value in using http/https or undici directly when performance matter.
I have just updated the article to reflect these findings! :)
Thanks once again for providing feedback!
30.01.2026 09:45
π 1
π 0
π¬ 1
π 0
I thought they had resolved a good chunk of the performance issues from the initial implementation. Is there any official documentation or benchmark that tracks this?
Also, isn't undici the default fetch implementation in Node.js?
29.01.2026 23:44
π 0
π 0
π¬ 1
π 0
Feedback welcome.
Whatβs your default HTTP client in 2026: built-in `fetch()`, `http`/`https`, axios, got, ry, or something else?
#nodejs #javascript #backend #webdev #testing
29.01.2026 17:55
π 1
π 0
π¬ 0
π 0
And also:
β’ safe query params (goodbye string concatenation)
β’ streaming requests (uploads) and streaming responses (downloads)
β’ mocked requests with undiciβs MockAgent + `node:test`
29.01.2026 17:55
π 0
π 0
π¬ 1
π 0
More:
β’ reading JSON, text, bytes, and streams properly
β’ timeouts (no more forever-pending requests)
β’ retries + backoff
29.01.2026 17:55
π 0
π 0
π¬ 1
π 0
What it covers:
β’ `fetch()` vs `http`/`https` (and when you might still need the latter)
β’ why `await fetch(url)` returns a `Response`, not the body
29.01.2026 17:55
π 0
π 0
π¬ 1
π 0
Itβs beginner-friendly.
No assumptions about the tricky bits.
I call out what can bite you and what you can do about it.
29.01.2026 17:55
π 0
π 0
π¬ 1
π 0
Thatβs why I wrote a detailed blog post about it.
A practical guide to using `fetch()` in Node.js without getting surprised in production.
29.01.2026 17:55
π 1
π 0
π¬ 1
π 0
Cartoon illustration in flat colors: a smiling developer in a blue hoodie points upward while holding a green βNode.js FETCH GUIDEβ book. Above him, speech bubbles read βnpm axiosβ, βhttp/httpsβ, and βfetch()β with a question mark. On the right, a cool turtle wearing sunglasses rides a rocket labeled βV8β; a checklist and stopwatch sit on the desk against a soft, patterned sky background.
Confession: my fingers still type `npm i axios` on autopilot from time to time π
...And yet⦠Node.js has shipped a built-in `fetch()` since v18 (2022)!
Still, I keep running into the same questions:
- Should we use it?
- When is it a good fit?
- How do we avoid the usual footguns?
29.01.2026 17:55
π 1
π 1
π¬ 2
π 0
Crafting Lambda Functions in Rust - eBook by Luciano Mammino and James Eastham
A practical guide on how to build efficient, sustainable, cost-effective serverless AWS solutions with the Rust programming language.
Thrilled to announce chapter 09 of the Rust Lambda book.
In this one, we cover all things observability. If you're struggling to really understand your serverless applications, this one's the one for you.
@loige.co π
#serverless #rust #rustlang
rust-lambda.com
24.01.2026 12:38
π 10
π 3
π¬ 0
π 0
cool idea, but i see zero entries right now :/ did a last minute deployment go wrong?
19.01.2026 11:45
π 5
π 0
π¬ 1
π 0
151. EC2 β€οΈ Lambda - Lambda Managed Instances
YouTube video by AWS Bites
AWS Lambda just got less #serverless π¨
@loige.co and @eoin.sh explore Lambda Managed Instances - #Lambda functions running on #EC2
We built a video processing app to test it. The verdict? No more cold starts (kinda), concurrent invocations, and a new scaling model!
β‘οΈ youtu.be/i-Nr0cqrdDk?...
16.01.2026 16:56
π 1
π 1
π¬ 0
π 0