InfoQ Homepage Architecture & Design Content on InfoQ
-
Tales of Kafka at Cloudflare: Lessons Learnt on the Way to 1 Trillion Messages
Cloudflare uses Kafka clusters to decouple microservices and communicate the creation, change or deletion of various resources via protobuf, a common data format in a fault-tolerant manner. The authors suggest investing in metrics for problem detection, prioritizing clear SDK documentation, and balancing flexibility and simplicity for standardized pipelines.
-
Easy Implementation of GDPR with Aspect Oriented Programming
GDPR compliance should be a default feature in every application that handles PII (Personally Identifiable Information). Most organizations have an impression that GDPR is a luxury feature that needs special tools to implement. But, we can see that the frameworks and design patterns we already use in our everyday development can very well be used to implement the GDPR rules.
-
API Design Reviews Are Dead. Long Live API Design Reviews!
To design APIs at scale, it takes deliberate effort to create consistency and make several discrete APIs feel like a platform. This requires an efficient and useful API design review process.
-
Magic Pocket: Dropbox’s Exabyte-Scale Blob Storage System
A horizontally scalable exabyte-scale blob storage system which operates out of multiple regions, Magic Pocket is used to store all of Dropbox’s data. Adopting SMR technology and erasure codes, the system has extremely high durability guarantees but is cheaper than operating in the cloud.
-
Start Your Architecture Modernization with Domain-Driven Discovery
Successful projects start with robust discovery. What if your project is modernizing your tangled old legacy system or migrating all your workloads to the cloud? This article presents a guided approach to starting your next architecture modernization project with a Domain-Driven Discovery (DDD), illustrated with a medical supply company that is migrating its core systems to the cloud.
-
Banking on Thousands of Microservices
Lessons learned building a banking platform, starting from technological choices like using Cassandra and Kubernetes in the early days to maintain the speed of execution through platform engineering and developer experience. With some mistakes and incidents along the way.
-
ASP.NET SPA Templates Proxy Changes from .NET 5 to .NET 6, .NET 7, and on
From .NET 6 the communication between front-end Single Page Applications (SPA) in ASP.NET and back-end .NET API was changed, with the SPA templates using the front end’s proxy solutions. A proxy for the development servers enables readable and debuggable code for both the front and back end, with the new approach resulting in a more independent back end.
-
Agility and Architecture: Balancing Minimum Viable Product and Minimum Viable Architecture
Software architecture and agility are often portrayed as incompatible. In reality, they are mutually reinforcing - a sound architecture helps teams build better solutions in a series of short intervals, and gradually evolving a system’s architecture helps by validating and improving it over time.
-
The Journey from Underrepresented IC to CTO: How Open Source Helped
This article tells the story of a minority woman's journey from DBA to co-founder & CTO, using open source to overcome gender disparity. It provides insights on career shifting, open-source monetization, and the distinction between IC and CTO. The author shares advice and insights that may be helpful for others.
-
Software Architecture and Design InfoQ Trends Report - April 2023
This article provides an overview of how the InfoQ editorial team sees the Software Architecture and Design topic evolving in 2023, with a focus on what architects are designing for today.
-
The Silent Platform Revolution: How eBPF Is Fundamentally Transforming Cloud-Native Platforms
There is a silent eBPF revolution reshaping platforms and the cloud-native world in its image, and this is its story.
-
Migrate a RMI-Based Legacy Application to WebSocket
Technical debt, especially in enterprise software, is a relevant problem that developers recurrently have to face. This article provides a use case related to removing technical debt in a large enterprise application based on an old fashioned Remote Method Invocation (RMI) protocol, and migrating it toward modern cloud-aware communication technologies.
Resources
How to Implement Zero Trust API Security
Level up security - Learn best practice for implementing a Zero Trust approach for APIs.
JWT Security Best Practices
Best practices for protecting your APIs from attacks and maintaining a high level of security of applications. Learn more.
CIAM vs IAM: What's the Difference?
Explore IAM and CIAM in terms of business requirements, behaviors, security and how they can work together. Learn more.
Curity Identity Server - Community Edition
Take the pain out of implementing OAuth and OpenID Connect, manage API access, secure apps and websites. Free to use.