Databases Scaling Strategies

Knowing the different techniques for scaling databases, help us to choose the appropriate strategy to adapt to our needs and purpose.

Hence, in this post, we will demonstrate different solutions and techniques for scaling databases server.  They are divided between reading and writing strategies.

Using Java @Annotations to Build Full Spring Boot REST API

Here's more on building Java annotations for full Spring Boot REST APIs

This post aims to demonstrate important Java @annotations used to build a functional Spring Boot REST API. The use of Java annotation gives developers the capability to reduce the code verbosity by a simple annotation.

As an example, we can refer to a transaction. By the standard pro-grammatically process with a transaction template, this requires a more complex config and boilerplate code to write, while this can be achieved with a simple @Transactional declarative annotation.

WCF Transport Security With Certificate Authentication — Test Validation With MSTest V2

This post demonstrates the use of X.509 certificates for server and client authentication when using WCF transport security. This security mode is ideal for communication between enterprise applications inside the intranet network.

Our demo creates a service that will implement a simple, repeated string algorithm. In this scenario, the service is hosted under Internet Information Services (IIS), which is configured with Secure Sockets Layer (SSL) and configured with an SSL certificate to allow clients to verify the identity of the server [1].

Invoking WCF Service Secured With Basic Authentication Using SoapUI

In this post, we will demonstrate how to use the SoapUI API tool to invoke a secured WCF SOAP service. First, we will create a service where it will be the system under test. Next, we will approach the steps required to invoke the created service while secured by a basic authentication mechanism.

1 WCF Basic Authentication Service

The access to the resource in the service to be implemented will be secured using Basic Authentication transport security mechanisms. One of many provided by the Windows Communication Foundation. This kind of mechanism is used in conjunction with HTTPS to provide confidentiality. 

Microservices in Publish-Subscribe Communication Using Apache Kafka

Publish-Subscribe Communication Using Apache Kafka.
You may also like: Comparing Publish-Subscribe Messaging and Message Queuing

Publish-Subscribe Messaging systems play an important role in any enterprise architecture as it enables reliable integration without tightly coupling the applications. The ability to share data between decoupled systems is not a problem that is easily tackled.

Consider an enterprise with multiple applications that are being built independently, with different languages and platforms. It needs to share data and processes responsively. We can achieve this using Messaging to transfer packets of data frequently, immediately, reliably, and asynchronously, using customizable formats. Asynchronous messaging is fundamentally a pragmatic reaction to the problems of distributed systems. Sending a message does not require both systems to be up and ready at the same time.