1) The document discusses two case studies of using serverless functions to integrate with legacy systems.
2) The first case study describes using a serverless SMTP to REST adapter to extract metadata from emails and post it to a CRM via REST.
3) The second case study aims to unify interfaces to different legacy back-end systems for consistency by using a serverless anticorruption layer and customer data stream.
This presentation was given at Web Directions South in 2008. It is a developers guide to building sites using OpenID, OAuth and webservices - no code, but enough to point you in the right direction
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010Michael Noel
Organizations planning for Extranet access to SharePoint 2010 or faced with providing access to an Intranet from multiple internal authentication platforms often find it challenging to properly architect SharePoint for extranets, to isolate content, and to manage identities across disparate systems. The complexity involved in understanding how to isolate content from a security perspective but still provide for a collaborative space for end users is complex, and if not done correctly can lead to security breaches and confusion. This session focuses on understanding the various extranet models for SharePoint 2010 and providing real world guidance on how to implement them. Covered are extranet content models and extranet authentication options, including Claims-based authentication and also covering advanced options using tools such as Microsoft's Forefront Identity Manager (FIM) 2010 to centralize identity management to SharePoint 2010 farms, allowing for better control, automatic account provisioning, and synchronization of profile information across multiple SharePoint authentication providers. • Review Extranet design options with SharePoint 2010 • Understand the need for identity management across SharePoint farms • Examine real world deployment guidance and architecture for SharePoint environments using multiple authentication providers
What is DPI? How can it be used effectively? What are the different use cases and requirements for such products? We discuss this and the methodologies needed to properly evaluate the DPI functionality of network devices under the demanding network conditions in which they will be deployed.
http://nsslabs.com/DPI
Domino Fitness. Time for a Health CheckJared Roberts
Here we explore your Domino ’fitness’ - that is - how well your Domino environment is performing, and show you how to execute a comprehensive health check including performance, security, database health, new features, and much more. Are you Domino fit?
This presentation was given at Web Directions South in 2008. It is a developers guide to building sites using OpenID, OAuth and webservices - no code, but enough to point you in the right direction
TechEd Africa 2011 - Collaborating with Extranet Partners on SharePoint 2010Michael Noel
Organizations planning for Extranet access to SharePoint 2010 or faced with providing access to an Intranet from multiple internal authentication platforms often find it challenging to properly architect SharePoint for extranets, to isolate content, and to manage identities across disparate systems. The complexity involved in understanding how to isolate content from a security perspective but still provide for a collaborative space for end users is complex, and if not done correctly can lead to security breaches and confusion. This session focuses on understanding the various extranet models for SharePoint 2010 and providing real world guidance on how to implement them. Covered are extranet content models and extranet authentication options, including Claims-based authentication and also covering advanced options using tools such as Microsoft's Forefront Identity Manager (FIM) 2010 to centralize identity management to SharePoint 2010 farms, allowing for better control, automatic account provisioning, and synchronization of profile information across multiple SharePoint authentication providers. • Review Extranet design options with SharePoint 2010 • Understand the need for identity management across SharePoint farms • Examine real world deployment guidance and architecture for SharePoint environments using multiple authentication providers
What is DPI? How can it be used effectively? What are the different use cases and requirements for such products? We discuss this and the methodologies needed to properly evaluate the DPI functionality of network devices under the demanding network conditions in which they will be deployed.
http://nsslabs.com/DPI
Domino Fitness. Time for a Health CheckJared Roberts
Here we explore your Domino ’fitness’ - that is - how well your Domino environment is performing, and show you how to execute a comprehensive health check including performance, security, database health, new features, and much more. Are you Domino fit?
SOA-based systems are more quickly and efficiently deployed and more effectively managed through a disciplined approach to SOA runtime governance. In this presentation we outline key problems addressed by SOA runtime governance and current practices for effectively implementing runtime governance in SOA environments.
SOA runtime governance problems include:
1. Understanding the service network topology described by the services that participate in the service network and the message traffic flowing among those services.
2. Actively maintaining established availability and performance service levels.
3. Enforcing authentication, authorization, privacy and integrity security constraints in an application-independent fashion.
4. Managing the business transactions supported by the service network including active management of transaction performance and availability as well as detection, diagnosis and correction of business transaction faults.
5. Validating the correct operation of the service networking on a continual basis in order to actively manage dynamic changes to the service network.
The current practices for effective runtime governance are then outlined based on experiences captured in over 100 SOA implementations. The practices focus on governance architectures, capabilities and processes proven to be effective in these SOA implementations.
The presentation also outlines areas in which some established practices are less effective than expected in support of effective runtime governance specifically focusing on processes in which development organizations must proactively participate in the governance activities.
The presentation also outlines the benefits of various approaches in terms of reduced development cost, more responsive system changes, improved operational management and faster and more cost-effective service network evolution.
View the full video presentation http://bit.ly/2EbWTJ
Exchange 2010 brings new features and functionality to Outlook Web Access. See product demonstrations of the latest capabilities and understand how browser-based communication and collaboration gets better than ever in Exchange 2010.
Cloud Foundry Cookbook: Recipes for a Successful Cloud Foundry Deployment in ...VMware Tanzu
Technical Track presented by Vinícius Carvalho, Senior Field Engineer at Pivotal.
Cloud Foundry provides the foundation for your PaaS infrastructure. It streamlines deployment and turns your developers and your ops into super heroes when it comes to time to market. But what about your architecture? How should you build your services (or microservices)? How can you guarantee security is being enforced on every layer of your architecture? How can you solve cross-service dependencies? How can services discover each other? How could developers leverage an API explorer to test your services and build apps on top of it? How could you leverage a data pipeline to solve polyglot persistence and cascading operations on diverse persistence technologies? How can you monetize on top of your public services? How could you use a service registry to boost your models with extended metadata?
This session presents a few recipes to demonstrate how to solve some of the problems found when applying cloud patterns to real business scenarios.
Recipes for a successful production cloudfoundry deployment - CF Summit 2014Vinícius Carvalho
How to be successful on a PCF deployment into production. This deck shows lessons learned while pushing to production a revamped platform on a large media company. It shows a few things I've learned as chief architect while deploying apps using the microservices strategy
Big data ingest frameworks ship with an array of connectors for common data origins and destinations, such as flat files, S3, HDFS, Kafka etc, but sometimes, you need to send data to, or receive data from a system that's not on the list. StreamSets includes template code for building your own connectors and processors; we'll walk through the process of building a simple destination that sends data to a REST web service, and show how it can be extended to target more sophisticated systems such as Salesforce Wave Analytics.
Supporting Enterprise System Rollouts with SplunkErin Sweeney
At Cricket Communications, Splunk started as a way to correlate all of our data into one view to help our operations team keep processes humming. Then we gave secured access to our developers, now they’re addicted. In fact, Splunk is critical in helping us speedup deployment of new systems (like our recent multi-million dollar billing system implementation). Learn how we use Splunk to display key metrics for the business, track overall system health, track transactions, optimize license usage, and support capacity
planning.
Presentation to understand what are the various types of system integration, and why SOA (Service Oriented Architecture) more specifically Oracle SOA plays an important role in integrating ERP systems.
To view recording of this webinar please use below URL:
http://wso2.com/library/webinars/2016/05/end-to-end-identity-management/
In today’s rapidly evolving world, enterprise identity management has proven to be challenging due to the constant changes in associated systems, corporate policies and stakeholder requirements. Therefore, managing identities and their privileges among the systems need to be handled in a flexible manner to save resources when governing identities and controlling access.
There are various specifications of industry standards in this domain making it difficult to select the correct one. Some of them may address the same problem with slight variations and some may look similar but address completely different problems.
This webinar will discuss
The real problems that need to be addressed when managing enterprise identity
Key challenges when implementing concepts
How to overcome these challenges and build a future proof identity and access management system with WSO2 Identity Server
AWS Lambda Containers - bridging the gap between serverless and containers on...Yun Zhi Lin
Video: https://youtu.be/Zg8jrAOfqEY
Feb 2021 Sydney Serverless Meetup talk on AWS Lambda Containers - bridging the gap between serverless and containers once and for all
The serverless paradigm focuses on business problems and containers are the infrastructure abstraction of choice for most developers. With AWS Lambda container support, it is now possible to combine the two worlds to focus on business problems with the certainty of immutable infrastructure and unprecedented levels of code flexibility/portability. What does this brave new world of serverless containers on AWS looks like? How easy is it to implement/migrate? Which use cases are suitable? Let’s dive deep and find out!
Applied AI, Open Banking and Continuous Innovation the Easy Way - AI Days Mel...Yun Zhi Lin
AI is the new electricity that fuels continuous innovation and in an era of disruption, leadership matters more than ever. As our data landscape and API economy are becoming increasingly open and transparent due to CDR / Open Banking, it is imperative for business and technology leaders to work together to harness greater value from their raw data and build up defensive AI assets.
The good news is that modern cloud services, serverless architecture, higher-order APIs and open-source algorithms together make it easy for businesses to prepare for Open Banking and evolve to become AI-driven. However, the bad news is that, without the correct strategy and approach, most organisations are doing things the hard way: equivalent to playing cricket by first learning how to stitching the ball.
Having successfully completed outcomes-driven transformations across both enterprise and government, I will share with you proven approaches and reference architectures, that simplifies AI-driven innovations that will help your organisation remain competitive in an open data economy.
More Related Content
Similar to Anticorrupting the Enterprise - Serverlessconf NYC 2017
SOA-based systems are more quickly and efficiently deployed and more effectively managed through a disciplined approach to SOA runtime governance. In this presentation we outline key problems addressed by SOA runtime governance and current practices for effectively implementing runtime governance in SOA environments.
SOA runtime governance problems include:
1. Understanding the service network topology described by the services that participate in the service network and the message traffic flowing among those services.
2. Actively maintaining established availability and performance service levels.
3. Enforcing authentication, authorization, privacy and integrity security constraints in an application-independent fashion.
4. Managing the business transactions supported by the service network including active management of transaction performance and availability as well as detection, diagnosis and correction of business transaction faults.
5. Validating the correct operation of the service networking on a continual basis in order to actively manage dynamic changes to the service network.
The current practices for effective runtime governance are then outlined based on experiences captured in over 100 SOA implementations. The practices focus on governance architectures, capabilities and processes proven to be effective in these SOA implementations.
The presentation also outlines areas in which some established practices are less effective than expected in support of effective runtime governance specifically focusing on processes in which development organizations must proactively participate in the governance activities.
The presentation also outlines the benefits of various approaches in terms of reduced development cost, more responsive system changes, improved operational management and faster and more cost-effective service network evolution.
View the full video presentation http://bit.ly/2EbWTJ
Exchange 2010 brings new features and functionality to Outlook Web Access. See product demonstrations of the latest capabilities and understand how browser-based communication and collaboration gets better than ever in Exchange 2010.
Cloud Foundry Cookbook: Recipes for a Successful Cloud Foundry Deployment in ...VMware Tanzu
Technical Track presented by Vinícius Carvalho, Senior Field Engineer at Pivotal.
Cloud Foundry provides the foundation for your PaaS infrastructure. It streamlines deployment and turns your developers and your ops into super heroes when it comes to time to market. But what about your architecture? How should you build your services (or microservices)? How can you guarantee security is being enforced on every layer of your architecture? How can you solve cross-service dependencies? How can services discover each other? How could developers leverage an API explorer to test your services and build apps on top of it? How could you leverage a data pipeline to solve polyglot persistence and cascading operations on diverse persistence technologies? How can you monetize on top of your public services? How could you use a service registry to boost your models with extended metadata?
This session presents a few recipes to demonstrate how to solve some of the problems found when applying cloud patterns to real business scenarios.
Recipes for a successful production cloudfoundry deployment - CF Summit 2014Vinícius Carvalho
How to be successful on a PCF deployment into production. This deck shows lessons learned while pushing to production a revamped platform on a large media company. It shows a few things I've learned as chief architect while deploying apps using the microservices strategy
Big data ingest frameworks ship with an array of connectors for common data origins and destinations, such as flat files, S3, HDFS, Kafka etc, but sometimes, you need to send data to, or receive data from a system that's not on the list. StreamSets includes template code for building your own connectors and processors; we'll walk through the process of building a simple destination that sends data to a REST web service, and show how it can be extended to target more sophisticated systems such as Salesforce Wave Analytics.
Supporting Enterprise System Rollouts with SplunkErin Sweeney
At Cricket Communications, Splunk started as a way to correlate all of our data into one view to help our operations team keep processes humming. Then we gave secured access to our developers, now they’re addicted. In fact, Splunk is critical in helping us speedup deployment of new systems (like our recent multi-million dollar billing system implementation). Learn how we use Splunk to display key metrics for the business, track overall system health, track transactions, optimize license usage, and support capacity
planning.
Presentation to understand what are the various types of system integration, and why SOA (Service Oriented Architecture) more specifically Oracle SOA plays an important role in integrating ERP systems.
To view recording of this webinar please use below URL:
http://wso2.com/library/webinars/2016/05/end-to-end-identity-management/
In today’s rapidly evolving world, enterprise identity management has proven to be challenging due to the constant changes in associated systems, corporate policies and stakeholder requirements. Therefore, managing identities and their privileges among the systems need to be handled in a flexible manner to save resources when governing identities and controlling access.
There are various specifications of industry standards in this domain making it difficult to select the correct one. Some of them may address the same problem with slight variations and some may look similar but address completely different problems.
This webinar will discuss
The real problems that need to be addressed when managing enterprise identity
Key challenges when implementing concepts
How to overcome these challenges and build a future proof identity and access management system with WSO2 Identity Server
AWS Lambda Containers - bridging the gap between serverless and containers on...Yun Zhi Lin
Video: https://youtu.be/Zg8jrAOfqEY
Feb 2021 Sydney Serverless Meetup talk on AWS Lambda Containers - bridging the gap between serverless and containers once and for all
The serverless paradigm focuses on business problems and containers are the infrastructure abstraction of choice for most developers. With AWS Lambda container support, it is now possible to combine the two worlds to focus on business problems with the certainty of immutable infrastructure and unprecedented levels of code flexibility/portability. What does this brave new world of serverless containers on AWS looks like? How easy is it to implement/migrate? Which use cases are suitable? Let’s dive deep and find out!
Applied AI, Open Banking and Continuous Innovation the Easy Way - AI Days Mel...Yun Zhi Lin
AI is the new electricity that fuels continuous innovation and in an era of disruption, leadership matters more than ever. As our data landscape and API economy are becoming increasingly open and transparent due to CDR / Open Banking, it is imperative for business and technology leaders to work together to harness greater value from their raw data and build up defensive AI assets.
The good news is that modern cloud services, serverless architecture, higher-order APIs and open-source algorithms together make it easy for businesses to prepare for Open Banking and evolve to become AI-driven. However, the bad news is that, without the correct strategy and approach, most organisations are doing things the hard way: equivalent to playing cricket by first learning how to stitching the ball.
Having successfully completed outcomes-driven transformations across both enterprise and government, I will share with you proven approaches and reference architectures, that simplifies AI-driven innovations that will help your organisation remain competitive in an open data economy.
Art of Serverless Business Value - Serverless Days Sydney 2019Yun Zhi Lin
Video recording: https://youtu.be/xnUINpe5HwE
The point of serverless is to focus on business value. But what exactly is serverless business value? Why is serverless becoming gov minister/strategic C level conversation? Where are we in mainstream adoption? How does each cloud provider compare? Is there life beyond serverless? Come and find out!
Financial Forecasting using Recurrent Neural Network, Social Media and CloudYun Zhi Lin
Team Quantino believe in a world where everyday users have the power to forecast financial markets at the tip of their fingers, by democratising the data and forecasting techniques previously available only to experts.
The PoC solution augments traditional forecasting techniques with RNN (Recurrent Neural Networking) deep learning algorithms and infinitely scalable serverless compute. Tech stack consists of AWS Lambda, AWS S3, Anodot on AWS, React Native/Android application.
Team Quantino consists of Yun Zhi Lin, Head of Engineering (Contino), Lucas Rafagnin, Cloud Lead (Contino), Ira Cohen, Chief Data Scientist (Anodot), Sami "The Machine" Raines, Data Engineer (Contino), Raymond Au, Data Engineer (Contino)
2017 September Golang Sydney meetup https://www.meetup.com/golang-syd/events/243263974/
Yun Zhi Lin wrote serverless-golang to bring about the perfect combination of strongly typed idiomatic Golang with the simplicity of Serverless Framework.
Serverless Golang currently forms the backbone of amaysim’s Serverless Realtime Event Driven Architecture, Anti-Corruption Layer and Single Customer View across 4 business verticals.
The library comes with easy to follow real world examples, and is entirely built and deployed immutably via Docker.
Serverless-Golang is a simple library that combining the power of Serverless Framework, with the low latency and high performance of Golang.
https://github.com/yunspace/serverless-golang/
4 Success stories in 3 years - A Docker Production JourneyYun Zhi Lin
Docker's 4th Birthday @Sydney Docker Meetup. It's time to celebrate the growing maturity of arguably the most disruptive technology of this decade.
I would like to take you on a journey across 4 companies I've had the privilege to worked with, each from a different industry: proptech, fintech, foodtech and telco; and each with their own unique vision to change the world.
But they all share one thing in common: they all leveraged Docker to empower their Engineers, fill in the gap between Dev and Ops, and ultimately succeed in getting their product to client faster.
Nano Segmentation - A Docker Security JourneyYun Zhi Lin
As Docker evolves in maturity, we also need to re-think what it means to run Docker Containers in Production environments, and learn from incidents such as the Twitter Vine hack.
Traditional security models provide Micro-Segmentation at a Network/VM level, missing the level of granularity needed by Containerised ecosystems. Nano-segmentation is a new concept that addresses security at a Container level and should be on the minds all Production Docker users.
Yun will take this opportunity to give a high level overview of their journey towards better Docker security. Also highlighting some of the tools, approaches and challenges along the way.
Original interactive slides here: http://slides.com/yunzhilin/microservices-and-friends#/
A tongue-in-cheek presentation to TrunkPlatform interns 2015.
Dropwizard with MongoDB and Google CloudYun Zhi Lin
Latest source code for this project can be found here:
https://github.com/yunspace/dropwizard-mongodb-billapi
Original reveal.js slides here: http://slides.com/yunzhilin/dropwizard-mongodb
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
13. Old / outdated, but still in use
Developer 404 not found
Not the new hotness
Antique hardware
No unit tests
Don’t touch
Cloud alien
SOAP
ESB
FTP
What is legacy?
14. Hard to maintain, improve, and expand
Hard to integrate
Hard to find developers
High maintenance costs
No documentation
No security patches
Impact of legacy
27. Product
platform
gateways
Events Format
Customer creation
and updates
Legacy Anticorruption zone Customer
Unified
Domain
Model
Single
Customer
View
Customer
service details
Login
Gateway A
Gateway B
Gateway C
Gateway D
Asynchronous,
ordered writes
28. Product
platform
gateways
Events Format
Customer creation
and updates
Legacy Anticorruption zone Customer
Unified
Domain
Model
Single
Customer
View
Customer
service details
Login
Customer Data
Stream
Gateway A
Gateway B
Gateway C
Gateway D
Asynchronous,
ordered writes
29. Product
platform
gateways
Events Format
Customer creation
and updates
Legacy Anticorruption zone Customer
Unified
Domain
Model
Single
Customer
View
Customer
service details
Login
Customer Data
Stream
Internal APIs
Gateway A
Gateway B
Gateway C
Gateway D
Asynchronous,
ordered writes
30. Product
platform
gateways
Events Format
Customer creation
and updates
Legacy Anticorruption zone Customer
Unified
Domain
Model
Single
Customer
View
Customer
service details
Login
Customer Data
Stream
Internal APIs
Gateway A
Gateway B
Gateway C
Gateway D
Asynchronous,
ordered writes
Synchronous
reads
31. Shameless plug! :-)
Python-based shim forfast cold starts
Uses idiomatic Go
Powerful goroutines
Easydependencymanagement
github.com/yunspace/serverless-golang
Serverless Go Sauce