We should design and build systems in a way that ensures any change can be easily reverted even if the people who have worked on it are not available at that time. Imagine for example that a change starts causing memory issues on a Saturday evening, surely you want to be confident that the support teams can revert to a previous version without downtime and without involving multiple teams. The below changes are easy to implement and will give you peace of mind.
Many companies want to move their systems to the cloud to reduce costs and release faster. Let’s see the usual steps and their advantages.
Performance is key as companies may lose customers and even have to close if their applications are slower than competitors’ ones. We will see some strategies to improve it using caching in microservices architectures
Accessibility is one of the most underestimated areas in software development but it is key for users, companies and society. We are going to see what it is and why we should pay more attention to it.
Credential management is one of the most critical parts of the Ops/DevOps world as a leaked password may give full access to a database or queue that stores confidential data from customers. This could not only impact the reputation of the business but also imply very high fines, e.g. due to a GDPR data breach. Below are some practices that may sound obvious but you would be surprised by the number of companies that get hacked due to not following them.
Batch jobs are essential for many applications but sometimes there is too much hassle to stop and re-enable them when needed. We are going to see what they are, the scenarios in which it is needed and how to use a standard microservice pattern to address it.
2020 was an interesting year in which nothing happened as we expected but which gave us the opportunity to pause and focus on what really matters to us. I think it is good to look back to what we have learnt and what could be the new goals for 2021.
Some queries, mostly reporting ones, have to be optimised when they use tables with millions of rows because their execution times make them unusable. We will see how to improve their performance including certain features that are specific for Oracle databases.
Cloud native applications are built and deployed differently, what presents a number of challenges that require new approaches and tools to prevent data breaches. Let’s see some of them.
Security is becoming a key point in the development process as data breaches appear in the news every day and make company lose money and have reputation damage. Let’s see what can be done to protect the applications.