Cybersecurity headlines have been dominated by significant data breaches affecting major companies. The breach news cycles have been driven by breach disclosures and claims. In the aftermath, the ...
In the previous instalment of this three part series, I examined the ‘Worker Aggregation’ anti-pattern. I also listed a number of ways to modify it so as to reduce the probability of its ...
As opposed to more traditional server models, in serverless computing/architectures you pay for compute time used as well as potentially read/write requests to cloud provider integrated services.
Learn the potential pitfalls of using the repository pattern, including adding an extra layer of abstraction when it's not needed in your software designs Design patterns provide proven solutions to ...
A monthly overview of things you need to know as an architect or aspiring architect. Unlock the full InfoQ experience by logging in! Stay updated with your favorite authors and topics, engage with ...