Oskar Gewalli's blog articles

0
comment
on 7/28/2019 11:58 AM
Service mesh Service mesh looks like an evolution of Enterprise Service Bus and has similar focus. An ESB is a single point of failure. Since it’s a combination of many concerns, it can be hard to get right. A service mesh tries to mitigate this by focus mainly on HTTP, HTTP2 style communication and being distributed as a deployment (each service has it’s own copy of the mesh software). Typical concerns Security (restrict traffic between services, use ssl for internal communication) Observability ([...]
>> Read the full article
.
0
comment
on 7/28/2019 11:58 AM
Service mesh Service mesh looks like an evolution of Enterprise Service Bus and has similar focus. An ESB is a single point of failure. Since it’s a combination of many concerns, it can be hard to get right. A service mesh tries to mitigate this by focus mainly on HTTP, HTTP2 style communication and being distributed as a deployment (each service has it’s own copy of the mesh software). Typical concerns Security (restrict traffic between services, use ssl for internal communication) Observability ([...]
>> Read the full article
.
0
comment
on 7/28/2019 6:56 AM
In the first post I introduced some alternatives for F# programming. The title alludes at classic roleplaying games. Mattias Brandewinder has written a blog post series about writing DnD logic in F# that should be an interesting read in order to follow up on that lead.
>> Read the full article
.
0
comment
on 7/28/2019 6:56 AM
In the first post I introduced some alternatives for f# programming. The title alludes at classic roleplaying games. Mattias Brandewinder has written a blog post series about writing DnD logic in f# that should be an interesting read in order to follow up on that lead.
>> Read the full article
.
0
comment
on 7/26/2019 10:20 PM
There is a mature package management system in the Java world. Maven seems to be quite standard. I’ve made a sample project with Hibernate and Spring. One of the neat things I found out was that it’s quite easy to integrate OWASP checks. Following the guide to setup a simple way to be able to that your closed source system does not have any known vulnerabilities in dependencies.
>> Read the full article
.
IntelliFactory Offices Copyright (c) 2011-2012 IntelliFactory. All rights reserved.
Home | Products | Consulting | Trainings | Blogs | Jobs | Contact Us | Terms of Use | Privacy Policy | Cookie Policy
Built with WebSharper