SlideShare a Scribd company logo
Evolution of message brokers.
From helpers to cores.
Artem Demchenkov
2
Artem Demchenkov
● CTO at Billie
● ardemchenkov@gmail.com
● https://www.linkedin.com/in/artem-
demchenkov-76b69934/
Billie
We are an innovative financial platform,
specialized on factoring.
Some numbers:
● Start: 01.12.2016
● Closed beta: 01.05.2017
● Public launch: 01.06.2017
● Team: 18
● Engineering crew: 8
is an intermediary program module that translates a message from the
formal messaging protocol of the sender to the formal messaging
protocol of the receiver.
Boring, but necessary theoretical information
4
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Message-oriented middleware
(MOM)
is software or hardware infrastructure supporting sending and
receiving messages between distributed systems.
Message broker
A Universe of Message Brokers
5
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
And more...
PAST
6
PRESENT FUTURE
?
Message broker is a helper on a side of an infrastructure
7
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Website RabbitMQ Consumer
Past
8
PAST PRESENT FUTURE
?
Message broker is a core element of an infrastructure.
9
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Message
broker
Internal tool
Microservice
Microservice
Present
Real-life example. Google Cloud Platform.
Present
10
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Use case 1. Synchronization of data between parts of a system
11
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Website
Google Pub/Sub
Salesforce Partner portal
Distribution
Values
12
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Allows getting rid of a central data storage.
Each application can use an own one.
Real-time task forwarding between different
systems, responsible people or departments.
Improves data consistency.
Instantness
Consistency
Use case 2. Safe and secure triggering of microservices
13
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Backend Google Pub/Sub Microservice
Values
14
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Safety You won’t loose a message.
Each message can be secured.Security
Use case 3. Persistent data storage
15
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Backend Apache Kafka
AWS Cloud Storage
Google Cloud Storage
Microsoft Azure Blob Storage
Values
16
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Persistence You have a full set of historical data.
You have a right to choose how to store data,
where and in which format.
Cloud storage services provide a permission
management mechanism to secure data.
Flexibility
Security
Use case 4. Log aggregation. Commit log
17
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Backend Apache Kafka
Instance 1 Storage 1
Instance 2 Storage 2
Values
18
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Replicability Message broker log allows replicating any
state of a system at any moment in time
You have an full set of historical data.
Message broker log can be used by many
different clients.
Persistence
Multifunctionality
Use case 5. Log aggregation. Fulltext search
19
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Backend Apache Kafka Google Cloud Storage Elastic
Use case 5. Log aggregation. Fulltext search
20
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Backend Apache Kafka Apache Solr Cloudera Hue
Values
21
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Searchability Any information in the past could be found.
It’s relatively easy to detect wrong messages
and define when and how it has been
consumed.
Discoverability
Use case 6. Delayed messaging
22
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Website RabbitMQ External data provider
Values
23
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Effectiveness Allows consuming a message at the most
effective time.
Saves traffic, memory usage and disk space.Thriftiness
Use case 7. Multi-cloud application
24
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Google Cloud Storage Google Pub/Sub AWS Cloud Storage
Values
25
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Distribution Allows synchronising data across
applications running on other clouds.
Allows backing up data across applications
running on other clouds.
Provides more flexibility in terms of choosing
right services for an architecture.
Security
Variety
26
PAST PRESENT FUTURE
?
Future
27
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Let’s look again at the current situation.
28
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Google Pub/Sub
RabbitMQ Apache Kafka
My prediction is the following: soon projects will use more than one message broker,
communicating to each other.
Future
29
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Future
Let’s see in 3-4 years, whether I was right
30
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Future
Conclusion
31
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
“Because it’s there”
George Mallory - English mountaineer, answering a question why did he want to climb Everest. Made 3
attempts and died during the 3rd one in 1924. It is still a mystery whether he had reached the top of it or
not.
32
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
“If you don’t know that something exists, you, probably, don’t need
it”
Tenzing Norgay - Nepali Sherpa mountaineer. One of the first two people reached the top of Everest in
1953.
33
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
“No matter what you’ve seen in that presentation, think twice
whether you product needs it”
Artem Demchenkov - CTO at Billie. I hope, successfully presented these slides on Codemotion Berlin 2017.
Thank you
● ardemchenkov@gmail.com
● https://www.linkedin.com/in/artem-
demchenkov-76b69934/
We have just started, but there will be interesting:
Check out our “Billie Engineering Corner” on Medium
35
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
https://medium.com/billie-finanzratgeber/tagged/engineering

More Related Content

Similar to Evolution of message brokers: from helpers to cores

A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5
Khulna University, Khulna, Bangladesh
 
Hackers stole our Login-Credentials. What do we do?
Hackers stole our Login-Credentials. What do we do?Hackers stole our Login-Credentials. What do we do?
Hackers stole our Login-Credentials. What do we do?
Sören Laird Sörries
 
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
ijcisjournal
 
Saving Human Lives with the IoT
Saving Human Lives with the IoTSaving Human Lives with the IoT
Saving Human Lives with the IoT
Dat Tran
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
pwcom.co.uk Ltd
 
A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms
Er Piyush Gupta IN ⊞⌘
 
Distributed:Health Code Camp Hyperledger
Distributed:Health Code Camp HyperledgerDistributed:Health Code Camp Hyperledger
Distributed:Health Code Camp Hyperledger
Tracy Kuhrt
 
A Metadata Model for Peer-to-Peer Media Distribution
A Metadata Model for Peer-to-Peer Media DistributionA Metadata Model for Peer-to-Peer Media Distribution
A Metadata Model for Peer-to-Peer Media DistributionAlpen-Adria-Universität
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
archana lisbon
 
Big Data Science in the Cloud from Big Data World Conference 2013
Big Data Science in the Cloud from Big Data World Conference 2013Big Data Science in the Cloud from Big Data World Conference 2013
Big Data Science in the Cloud from Big Data World Conference 2013Markus Schmidberger
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
paperpublications3
 
Designing Swarms of Cyber-Physical Systems: The H2020 CPSwarm Project
Designing Swarms of Cyber-Physical Systems: The H2020 CPSwarm ProjectDesigning Swarms of Cyber-Physical Systems: The H2020 CPSwarm Project
Designing Swarms of Cyber-Physical Systems: The H2020 CPSwarm Project
Alessandra Bagnato
 
Homomorphic encryption on Blockchain Principles
Homomorphic encryption on Blockchain PrinciplesHomomorphic encryption on Blockchain Principles
Homomorphic encryption on Blockchain Principles
Johann Höchtl
 
Reviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelReviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android Kernel
Shakacon
 
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019
Jonas Traub
 
Designing & Implementing Hypermedia APIs – Mike Amundsen, Principal API Archi...
Designing & Implementing Hypermedia APIs – Mike Amundsen, Principal API Archi...Designing & Implementing Hypermedia APIs – Mike Amundsen, Principal API Archi...
Designing & Implementing Hypermedia APIs – Mike Amundsen, Principal API Archi...
CA API Management
 
Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...
Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...
Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...
Trivadis
 
Security in a containerized world - Jessie Frazelle
Security in a containerized world - Jessie FrazelleSecurity in a containerized world - Jessie Frazelle
Security in a containerized world - Jessie Frazelle
Paris Container Day
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
IJERA Editor
 

Similar to Evolution of message brokers: from helpers to cores (20)

A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5
 
Hackers stole our Login-Credentials. What do we do?
Hackers stole our Login-Credentials. What do we do?Hackers stole our Login-Credentials. What do we do?
Hackers stole our Login-Credentials. What do we do?
 
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
 
Saving Human Lives with the IoT
Saving Human Lives with the IoTSaving Human Lives with the IoT
Saving Human Lives with the IoT
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms
 
Distributed:Health Code Camp Hyperledger
Distributed:Health Code Camp HyperledgerDistributed:Health Code Camp Hyperledger
Distributed:Health Code Camp Hyperledger
 
A Metadata Model for Peer-to-Peer Media Distribution
A Metadata Model for Peer-to-Peer Media DistributionA Metadata Model for Peer-to-Peer Media Distribution
A Metadata Model for Peer-to-Peer Media Distribution
 
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
 
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
 
Big Data Science in the Cloud from Big Data World Conference 2013
Big Data Science in the Cloud from Big Data World Conference 2013Big Data Science in the Cloud from Big Data World Conference 2013
Big Data Science in the Cloud from Big Data World Conference 2013
 
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
 
Designing Swarms of Cyber-Physical Systems: The H2020 CPSwarm Project
Designing Swarms of Cyber-Physical Systems: The H2020 CPSwarm ProjectDesigning Swarms of Cyber-Physical Systems: The H2020 CPSwarm Project
Designing Swarms of Cyber-Physical Systems: The H2020 CPSwarm Project
 
Homomorphic encryption on Blockchain Principles
Homomorphic encryption on Blockchain PrinciplesHomomorphic encryption on Blockchain Principles
Homomorphic encryption on Blockchain Principles
 
Reviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelReviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android Kernel
 
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion Slides 2019
 
Designing & Implementing Hypermedia APIs – Mike Amundsen, Principal API Archi...
Designing & Implementing Hypermedia APIs – Mike Amundsen, Principal API Archi...Designing & Implementing Hypermedia APIs – Mike Amundsen, Principal API Archi...
Designing & Implementing Hypermedia APIs – Mike Amundsen, Principal API Archi...
 
Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...
Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...
Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...
 
Security in a containerized world - Jessie Frazelle
Security in a containerized world - Jessie FrazelleSecurity in a containerized world - Jessie Frazelle
Security in a containerized world - Jessie Frazelle
 
Security Issues related with cloud computing
Security Issues related with cloud computingSecurity Issues related with cloud computing
Security Issues related with cloud computing
 

Recently uploaded

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
Madan Karki
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
Rahul
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
SUTEJAS
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
insn4465
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Sreedhar Chowdam
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
Kerry Sado
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
gestioneergodomus
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
RicletoEspinosa1
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
Amil Baba Dawood bangali
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
manasideore6
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
JoytuBarua2
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
zwunae
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
Kamal Acharya
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
zwunae
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
nikitacareer3
 

Recently uploaded (20)

spirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptxspirit beverages ppt without graphics.pptx
spirit beverages ppt without graphics.pptx
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024ACEP Magazine edition 4th launched on 05.06.2024
ACEP Magazine edition 4th launched on 05.06.2024
 
Understanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine LearningUnderstanding Inductive Bias in Machine Learning
Understanding Inductive Bias in Machine Learning
 
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
哪里办理(csu毕业证书)查尔斯特大学毕业证硕士学历原版一模一样
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&BDesign and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
Design and Analysis of Algorithms-DP,Backtracking,Graphs,B&B
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
Hierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power SystemHierarchical Digital Twin of a Naval Power System
Hierarchical Digital Twin of a Naval Power System
 
DfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributionsDfMAy 2024 - key insights and contributions
DfMAy 2024 - key insights and contributions
 
AIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdfAIR POLLUTION lecture EnE203 updated.pdf
AIR POLLUTION lecture EnE203 updated.pdf
 
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
NO1 Uk best vashikaran specialist in delhi vashikaran baba near me online vas...
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
Fundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptxFundamentals of Induction Motor Drives.pptx
Fundamentals of Induction Motor Drives.pptx
 
Planning Of Procurement o different goods and services
Planning Of Procurement o different goods and servicesPlanning Of Procurement o different goods and services
Planning Of Procurement o different goods and services
 
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
一比一原版(UMich毕业证)密歇根大学|安娜堡分校毕业证成绩单专业办理
 
Online aptitude test management system project report.pdf
Online aptitude test management system project report.pdfOnline aptitude test management system project report.pdf
Online aptitude test management system project report.pdf
 
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
一比一原版(IIT毕业证)伊利诺伊理工大学毕业证成绩单专业办理
 
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptxTOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
TOP 10 B TECH COLLEGES IN JAIPUR 2024.pptx
 

Evolution of message brokers: from helpers to cores

  • 1. Evolution of message brokers. From helpers to cores. Artem Demchenkov
  • 2. 2 Artem Demchenkov ● CTO at Billie ● ardemchenkov@gmail.com ● https://www.linkedin.com/in/artem- demchenkov-76b69934/
  • 3. Billie We are an innovative financial platform, specialized on factoring. Some numbers: ● Start: 01.12.2016 ● Closed beta: 01.05.2017 ● Public launch: 01.06.2017 ● Team: 18 ● Engineering crew: 8
  • 4. is an intermediary program module that translates a message from the formal messaging protocol of the sender to the formal messaging protocol of the receiver. Boring, but necessary theoretical information 4 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Message-oriented middleware (MOM) is software or hardware infrastructure supporting sending and receiving messages between distributed systems. Message broker
  • 5. A Universe of Message Brokers 5 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 And more...
  • 7. Message broker is a helper on a side of an infrastructure 7 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Website RabbitMQ Consumer Past
  • 9. Message broker is a core element of an infrastructure. 9 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Message broker Internal tool Microservice Microservice Present
  • 10. Real-life example. Google Cloud Platform. Present 10 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
  • 11. Use case 1. Synchronization of data between parts of a system 11 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Website Google Pub/Sub Salesforce Partner portal
  • 12. Distribution Values 12 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Allows getting rid of a central data storage. Each application can use an own one. Real-time task forwarding between different systems, responsible people or departments. Improves data consistency. Instantness Consistency
  • 13. Use case 2. Safe and secure triggering of microservices 13 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Backend Google Pub/Sub Microservice
  • 14. Values 14 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Safety You won’t loose a message. Each message can be secured.Security
  • 15. Use case 3. Persistent data storage 15 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Backend Apache Kafka AWS Cloud Storage Google Cloud Storage Microsoft Azure Blob Storage
  • 16. Values 16 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Persistence You have a full set of historical data. You have a right to choose how to store data, where and in which format. Cloud storage services provide a permission management mechanism to secure data. Flexibility Security
  • 17. Use case 4. Log aggregation. Commit log 17 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Backend Apache Kafka Instance 1 Storage 1 Instance 2 Storage 2
  • 18. Values 18 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Replicability Message broker log allows replicating any state of a system at any moment in time You have an full set of historical data. Message broker log can be used by many different clients. Persistence Multifunctionality
  • 19. Use case 5. Log aggregation. Fulltext search 19 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Backend Apache Kafka Google Cloud Storage Elastic
  • 20. Use case 5. Log aggregation. Fulltext search 20 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Backend Apache Kafka Apache Solr Cloudera Hue
  • 21. Values 21 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Searchability Any information in the past could be found. It’s relatively easy to detect wrong messages and define when and how it has been consumed. Discoverability
  • 22. Use case 6. Delayed messaging 22 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Website RabbitMQ External data provider
  • 23. Values 23 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Effectiveness Allows consuming a message at the most effective time. Saves traffic, memory usage and disk space.Thriftiness
  • 24. Use case 7. Multi-cloud application 24 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Google Cloud Storage Google Pub/Sub AWS Cloud Storage
  • 25. Values 25 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Distribution Allows synchronising data across applications running on other clouds. Allows backing up data across applications running on other clouds. Provides more flexibility in terms of choosing right services for an architecture. Security Variety
  • 27. Future 27 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Let’s look again at the current situation.
  • 28. 28 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Google Pub/Sub RabbitMQ Apache Kafka My prediction is the following: soon projects will use more than one message broker, communicating to each other. Future
  • 29. 29 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Future Let’s see in 3-4 years, whether I was right
  • 30. 30 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Future Conclusion
  • 31. 31 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 “Because it’s there” George Mallory - English mountaineer, answering a question why did he want to climb Everest. Made 3 attempts and died during the 3rd one in 1924. It is still a mystery whether he had reached the top of it or not.
  • 32. 32 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 “If you don’t know that something exists, you, probably, don’t need it” Tenzing Norgay - Nepali Sherpa mountaineer. One of the first two people reached the top of Everest in 1953.
  • 33. 33 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 “No matter what you’ve seen in that presentation, think twice whether you product needs it” Artem Demchenkov - CTO at Billie. I hope, successfully presented these slides on Codemotion Berlin 2017.
  • 34. Thank you ● ardemchenkov@gmail.com ● https://www.linkedin.com/in/artem- demchenkov-76b69934/
  • 35. We have just started, but there will be interesting: Check out our “Billie Engineering Corner” on Medium 35 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 https://medium.com/billie-finanzratgeber/tagged/engineering