Christian Posta explains how to explain monolith-application decomposition and what a transition to microservices might look like.
Article about security in microservices architecture.
Offers best practices for managing the interfaces of microservices in your application.
Deep dive into Hystrix architecture.
What do they have in common?
In this blog series author covers these questions and guides you in applying the security layer to your cloud-native blueprint.
Overview of the general event sourcing pattern and how Netflix team applied it to some of these key use cases.
A collection of literature for reading on Event Sourcing/Event Stores and CQRS.
Author discusses various approaches to find out the solution to this problem.
Using Scala futures, using Akka actors, or going for Akka streams?
ow to Avoid Common Problems?