Week 31, year 2022

Permalink | From 01 August 2022 to 07 August 2022 | Last updated on: Mon, 7 Aug 2023 22:06:33 GMT

Week 30, year 2022

  • Event Store at KCDC 2022 - Event Store is excited to be joining experienced Developers, Architects, UI/UX Designers, QA Professionals, PMs, and Technology Managers from Missouri, Kansas, Illinois, Nebraska, Iowa, Minnesota, Oklahoma, the Dakotas, and around the United States and the world, at KCDC, taking place on 8th - 10th August! [Event Store blog]
  • Union types in C# - In the article “How to effectively compose your business logic”, I explained how explicit types definition can help in making our codebase… [Event-Driven by Oskar Dudycz]
  • Securing Web APIs with Azure AD: Designing Authentication Schemes - In our last post, I walked through my real-world scenario of needing to follow Zero Trust principles in securing microservice-based APIs inside (and outside) Azure. [Jimmy Bogard]
  • Get started with Event Store Cloud - Getting your first project up and running in Event Store Cloud requires a little configuration upfront. Once this is done, provisioning and managing EventStoreDB clusters can be done with ease, all without the big overhead on DevOps that on-premise/self-managed servers cause. [Event Store blog]
  • Using the Axon Stack for the development of Locala’s retail application - Customers mean more than just a bottom line here at AxonIQ; for us, it’s a collaborative relationship – one that often leads to new insights into the transformative power of our products. Locala embarked on their journey with us after choosing Axon Framework & Axon Server to support their efforts with domain-driven design, CQRS, and Event Sourcing. Recently, Frédéric Gendebien (Solution Architect at AxonIQ) interviewed Laurent Thoulon (Senior Lead Engineer at Locala), in both English and French about Laurent’s experience with AxonIQ. [AxonIQ Blog]
  • Securing Web APIs with Azure AD: Designing Authentication Schemes - Posts in this series: A Case Study Designing Authentication Schemes Authorizing Client Applications Building the Server Enabling Local Development Connecting External Clients Connecting Azure Clients Full example In our last post, I walked through my real-world scenario of needing to follow Zero Trust principles in securing microservice-based APIs inside (and [Jimmy Bogard]
Permalink | From 25 July 2022 to 31 July 2022 | Last updated on: Mon, 7 Aug 2023 22:06:33 GMT

Week 29, year 2022

  • Sponsored Post - G-Core Labs, Close, Wynter, Pinecone, Kinsta, Bridgecrew, IP2Location, StackHawk, InterviewCamp.io, Educative, Stream, Fauna, Triplebyte [High Scalability]
  • Advocate, educator, and authorial stance - When I'm writing, or mentoring others in writing, about a particular technique I prefer to take the role of an educator rather than that of an advocate. When doing that, I see two main stances an author can take. One is to focus on the trade-offs between this technique and its alternatives, the other is to focus on the merits of the particular technique and not discuss the alternatives. [Martin Fowler]
  • How to effectively compose your business logic - Let’s say that we’d like to implement Shopping Cart. We have the following requirements: The customer may only add a product to the shopping… [Event-Driven by Oskar Dudycz]
  • 21.10.6 Release Notes - We are pleased to announce the official release of EventStoreDB OSS & Commercial version 21.10.6 long term support (LTS). [Event Store blog]
  • Kafka on Kubernetes: What could go wrong? - Understand the risks and rewards of data streaming with Kubernetes [Redpanda Blog via Aggregater Linklog]
  • Secondary Server Nodes in Axon Server - Optimized storage for cost efficiency - Cost optimization for Axon Server deployments without sacrificing performance is very important to our customers. The most commonly used technique is the optimization of storage for the events. To cater for this optimized storage, Axon Server Enterprise Edition (ASEE) provides the concept of multi-tiered storage - a secondary server node. This capability not only helps lower storage costs but also helps retain the performance and, in some cases, actually improvising it. This technique splits the storage of events across multiple nodes within an ASEE cluster. ASEE nodes have designated roles within a cluster: Primary / Backup and Messaging-Only. ASEE introduced a new role - Secondary since version 4.4, to cater for this split (also known as multi-tier) storage requirement. By designating a node as a “Secondary” node within a cluster, the storage of events is distributed between the “Primary” and “Secondary” nodes. [Blog]
Permalink | From 18 July 2022 to 24 July 2022 | Last updated on: Fri, 4 Nov 2022 18:36:45 GMT

Week 28, year 2022

  • Securing Web APIs with Azure AD: A Case Study - Recently, I was on a project where the company had a big push towards a "Zero Trust" security model. This concept was new to me, and I'd always been on clients where we had to secure APIs. [Jimmy Bogard]
  • Stuff The Internet Says On Scalability For July 11th, 2022 - Never fear, HighScalability is here! Every cell a universe. Most detailed image of a human cell to date. @microscopicture Other images considered: one byte of RAM in 1946; visual guide on troubleshooting Kubernetes; Cloudflare using lava lamps to generate cryptographic keys; 5MB of data looked like in 1966 My Stuff: Love this Stuff? I need your support on Patreon to help keep this stuff going. Know anyone who needs to go from zero to cloud? My book teaches them all they need to know about the cloud. Explain the Cloud Like I'm 10. It has 440 mostly 5 star reviews on Amazon. [High Scalability]
  • Event-driven distributed processes by example - Some time ago, I wrote the general rules on processing the event-driven services. check my article Saga and Process Manager - distributed… [Event-Driven by Oskar Dudycz]
  • Securing Web APIs with Azure AD: A Case Study - Posts in this series: A Case Study Designing Authentication Schemes Authorizing Client Applications Building the Server Enabling Local Development Connecting External Clients Connecting Azure Clients Full example Recently, I was on a project where the company had a big push towards a "Zero Trust" security model. This concept [Jimmy Bogard]
Permalink | From 11 July 2022 to 17 July 2022 | Last updated on: Mon, 7 Aug 2023 22:06:33 GMT

Week 27, year 2022

  • Is keeping dates in UTC really the best solution? - In many projects, the approach to dates is quite nonchalant. People do as they want. When on-premise systems were king, the common problem… [Event-Driven by Oskar Dudycz]
  • Legacy Displacement: Revert to Source - Legacy systems often act as integration hubs, ingesting source data to pass on to downstream systems. A new downstream system can decouple itself from legacy by finding the source of data to the legacy and integrating directly to that instead. Ian Cartwright, Rob Horn, and James Lewis describe this Revert to Source pattern, explaining that this part of legacy displacement often also allows a new system to take advantage of upgrades to source data that the legacy had neglected. [Martin Fowler]
Permalink | From 04 July 2022 to 10 July 2022 | Last updated on: Mon, 24 Oct 2022 23:19:31 GMT

Week 26, year 2022

Permalink | From 27 June 2022 to 03 July 2022 | Last updated on: Wed, 29 Jun 2022 13:08:38 GMT

Week 25, year 2022

Permalink | From 20 June 2022 to 26 June 2022 | Last updated on: Mon, 7 Aug 2023 22:06:33 GMT