Microservices solve numerous problems around cognitive load, velocity, isolation, and scalability - if you get them right!
In Operating Microservices: Patterns for Sucess, we bring you practical advice around what good really looks like with system observability, patterns of integrating with legacy codebases, and situations when microservices were NOT the right answer, and the most common issues encountered when it comes to day 2 operations with microservices.
Microservices are an effective way to solve many problems in software, but it’s also a great way to introduce them if not done (and operated) well.
From this track
Dark Energy, Dark Matter and the Microservices Patterns?!
Monday Dec 5 / 09:00AM PST
Dark matter and dark energy are mysterious concepts from astrophysics that are used to explain observations of distant stars and galaxies.
Chris Richardson
Creator of microservices.io, Java Champion, & Core Microservices Thoughtleader
Orchestration vs Choreography, A Guide To Composing Your Monolith
Monday Dec 5 / 10:10AM PST
Microservices promise rapid evolution, operational independence, and technological freedom but come with imperceptible drag factors. Left unchecked, this drag leads to distributed balls of mud – hard to operate, evolve and maintain.
Ian Thomas
VP, Web Architecture @GenesisGlobalX
Overcomplicated Architecture: Scaling Bottleneck
Monday Dec 5 / 11:20AM PST
As a digital scale-up continues to gain momentum and grow rapidly, one of the key determining factors of success is how quickly they can evolve their product. The business desires to push features to production as fast as possible and prove value to its customers.
Cassandra Shum
Technologist | Architect | Ex-Thoughtworks
Istio as a Platform for Running Microservices
Monday Dec 5 / 12:30PM PST
Not every application should follow the microservices architecture. But for those that do, how do you solve problems relating to service discovery, load balancing, resilience, security, observability, and traffic management? Spring Cloud projects have adopted solutions that grew out o
Eitan Suez
Content Engineer @Tetrate, Previously a technical instructor @VMware and @Pivotal and Principal Consultant @ThoughtWorks
Untrusted Execution: Attacking the Cloud Native Supply Chain
Monday Dec 5 / 12:30PM PST
Should we trust the code we run in production? Not if a motivated attacker can compromise our system’s complex supply chains. While hardened runtimes and detection can mitigate some zero day attacks, malicious internal threat actors and software implants are much harder to detect.
Francesco Beltramini
Security Engineering Manager @controlplaneio