Skip to content

Software Architecture for Building Serverless Microservices

Close Menu

Uses for event sourcing – Software Architecture for Building Serverless MicroservicesUses for event sourcing – Software Architecture for Building Serverless Microservices


2023-10-132023-10-13

Uses for event sourcing Although early thoughts on event sourcing focused on the ability to re-create the current state of ...


Read MoreRead More

Architectural considerations for event sourcing – Software Architecture for Building Serverless MicroservicesArchitectural considerations for event sourcing – Software Architecture for Building Serverless Microservices


2023-08-152023-08-15

Architectural considerations for event sourcing At a high level, the concept of event sourcing is simple—but its implementation requires careful ...


Read MoreRead More

EventStorming – Software Architecture for Building Serverless MicroservicesEventStorming – Software Architecture for Building Serverless Microservices


2023-06-132023-06-13

EventStorming One of the classic problems in software engineering is balancing what’s in the requirements, and what gets implemented and ...


Read MoreRead More

The importance of EventStorming in serverless development – Software Architecture for Building Serverless MicroservicesThe importance of EventStorming in serverless development – Software Architecture for Building Serverless Microservices


2023-05-132023-05-13

The importance of EventStorming in serverless development EventStorming is a great way to collaborate and to learn about business requirements, ...


Read MoreRead More

Security Can Be Simple – Serverless and SecuritySecurity Can Be Simple – Serverless and Security


2023-03-132023-03-13

Security Can Be Simple Given the stakes, ensuring the security of a software application can be a daunting task. Breaches ...


Read MoreRead More

Getting Started – Serverless and SecurityGetting Started – Serverless and Security


2023-01-122023-01-12

Getting Started Establishing a solid foundation for your serverless security practice is pivotal. Secu‐ rity can, and must, be a ...


Read MoreRead More

Combining the Zero Trust Security Model with Least Privilege Permissions – Serverless and SecurityCombining the Zero Trust Security Model with Least Privilege Permissions – Serverless and Security


2022-11-132022-11-13

Combining the Zero Trust Security Model with Least Privilege Permissions There are two modern cybersecurity principles that you can leverage ...


Read MoreRead More

Zero trust and serverless – Serverless and SecurityZero trust and serverless – Serverless and Security


2022-09-152022-09-15

Zero trust and serverless Zero trust is often touted as the next big thing in network security. Buzzwords and hype ...


Read MoreRead More

The Power of AWS IAM – Serverless and SecurityThe Power of AWS IAM – Serverless and Security


2022-07-212022-07-21

The Power of AWS IAM AWS IAM is the one service you will use everywhere—but it’s also often seen as ...


Read MoreRead More

Lambda execution roles – Serverless and SecurityLambda execution roles – Serverless and Security


2022-05-132022-05-13

Lambda execution roles A key use of IAM roles in serverless applications is Lambda function execution roles. An execution role ...


Read MoreRead More

Posts pagination

Previous page Page 1 Page 2 Page 3 Next page

Archives

  • August 2024
  • July 2024
  • June 2024
  • May 2024
  • April 2024
  • March 2024
  • February 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • August 2023
  • June 2023
  • May 2023
  • March 2023
  • January 2023
  • November 2022
  • September 2022
  • July 2022
  • May 2022
  • March 2022
  • January 2022
  • December 2021
  • October 2021
  • August 2021
  • June 2021
  • May 2021
  • February 2021
  • January 2021

Categories

  • AWS Certification Exam
  • Certifications of Microsoft
  • Cognito and API Gateway
  • Data Encryption Everywhere
  • Security Can Be Simple
  • Zero trust and serverless
Contact Us

Copyright © 2024 glowever.org