Editor – This seven‑part series of articles is now complete: Introduction to Microservices Building Microservices: Using an API Gateway Building Microservices: Inter‑Process Communication in a Microservices Architecture Service Discovery in a Microservices Architecture Event‑Driven Data Management for Microservices Choosing a Microservices Deployment Strategy Refactoring a Monolith into Microservices (this article) You can also download the complete […]
Usually, we’d start a blog post like this one rather light‑heartedly, but the mood of the times is undoubtedly somber, the reasons for that being too numerous to joke about. However, we hope you’re doing well – and again, we have some news to share. For starters, we at the NGINX Unit team believe that the term […]
Studies show that 91% of enterprises are using or have plans to use microservices. The reasons are well documented — monolithic architectures are hard to develop and maintain, while microservices allow for greater agility with smaller, targeted services. However, microservices can’t function alone — they often work together to compose larger applications. As organizations build out more microservices, often […]
There has never been a better time for businesses to outsource software development to an expert third party rather than maintaining in-house provision. Gone are the days when outsourcing was associated solely with cost efficiency and cheap labor. Today it is about partnering to achieve a step change in performance and deliver a better quality […]
When designing systems that enable secure authentication and authorization for API access, you must consider how your applications and users should authenticate themselves. In this article, we’ll compare three different ways to achieve this: API Keys, HTTP Basic Authentication, and OAuth. We’ll also highlight what the benefits and drawbacks are for each method. API Keys Using API keys […]
Authorization and authentication are often considered interchangeable. However, these systems do doing vastly different things. Understanding the differences between them is incredibly crucial for adequate security implementation. Authentication = Who are you? Authentication is essentially the practice of proving that you are who you say you are. Trust is hard to come by in any system. […]
With the advent of microservices, the functionalities that used to be bundled together in a single web/mule application are now running on different containers across VMs and at times across datacenters. This presents a huge challenge to trace transactions as they traverse across the container/VM boundaries. To address this challenge, companies build a custom distributed tracing […]
Long ago, I built a web app for an enterprise (200k+ employees). Feedback on the web app prompted me to do an experiment. What would happen if I were to create a WhatsApp chatbot to solve the specific use case, instead of a web app? Would people like it better? Would it be more useful? But the […]
Business plans are a pivotal part of the strategic financial decision-making process. They help put thoughts down on paper, present market data to back up the rhetoric, and articulate the financial side of an argument. When it comes to business plans, it’s not only about the numbers; the narrative and the assumptions used to drive […]
While 83% of workers say remote work would make them happier with their jobs, not many people anticipated that the shift would happen as suddenly as it did. With companies around the world quickly transitioning their workforce to working from home, some employees will find it a challenge to make the switch. While designers may have dreamed of working in their […]