Authentication Techniques for APIs

Issue #70 | Jul 27, 2017

Articles

gRPC in Production

Tour of gRPC and how to use it in your production web service.

Patterns of Event Stream Processing

An Interactive Exploration of Session Windows.

GopherCon 2017 videos

The videos from the GopherCon 2017 conference are online!

Authentication Techniques for APIs

Comparison of various API authentication techniques.

Microservices Patterns With Envoy Proxy, Part III: Distributed Tracing

This blog is part of a series looking deeper at Envoy Proxy and Istio.io.

Exactly-once Support in Apache Kafka

New version of Apache Kafka dramatically strengthens the semantic guarantees it provides.

Java Performance Engineers Survival Guide

Monica Beckwith provides a step-by-step approach to finding the root cause of any performance problem in a Java app, showcasing through an example a few performance tools and the performance process.

Concurrency and Strong Types for IoT

Carl Hewitt promotes using strong types and the actor model to deal with various devices in IoT.

Microservices architecture in PCF and Kubernetes

Step-by-step tutorial for developers who want to implement microservices architecture in Kubernetes.

Compare Kubernetes vs ECS

Amazon ECS and Kubernetes comparison.

Books

Microservices Architecture for eCommerce

Videos

Udi Dahan - If (domain logic) then CQRS, or Saga?

Streams, Actors, Akka Concepts

Discussions

Whats your biggest struggle with Microservices?

Authentication Techniques for APIs