Author: Uma Mahesh

OWASP Top 10 Vulnerabilities And Remediation

Introduction Cloud native applications, with their distributed architectures that comprise many third-party libraries and services, are an attractive target for hackers. The fact that 82% of all vulnerabilities are found in application code is not lost on attackers, who seek to use this vector to compromise the networks on which the application is deployed. Securing

Microservices Distributed Transactions

In this article, we are going to discuss Microservices Distributed Transaction Management when performing CRUD operations. As you know that we learned practices and patterns about Microservices Data Design patterns and add them into our design toolbox. And we will use these pattern and practices when designing e-commerce microservice architecture. By the end of the article, you will learn how to manage distributed transaction in Microservices Architectures with applying Microservices Data Design patterns and principles. Microservices Distributed Transactions

Choose a Database for Microservices — CAP Theorem

In this article, we are going to discuss How to choose database for Microservices in order to understand data considerations for microservices with learning practices and patterns about Microservices Data Design patterns. And we will use these pattern and practices when designing e-commerce microservice architecture. By the end of the article, you will learn how to choose database in Microservices Architectures with applying CAP Theorem in Microservices Data Design patterns and principles. How to Choose a Database for Microservices

Microservices Deployments with Containers and Orchestrators

In this article, we are going to discuss Microservices Deployments with Containers and Orchestrators. As you know that we learned practices and patterns about Microservices Design patterns and add them into our design toolbox. And we will use these pattern and practices when designing e-commerce microservice architecture. By the end of the article, you will learn how to deploy microservices in Microservices Architectures with applying Microservices patterns and principles. Microservices Deployments with Containers and Orchestrators

Domain-Driven Design, Microservices and Kafka

Microservices have a symbiotic relationship with domain-driven design (DDD)—a design approach where the business domain is carefully modeled in software and evolved over time, independently of the plumbing that makes the system work. I see this pattern coming up more and more in the field in conjunction with Apache Kafka®. In these projects, microservice architectures
SiteLock