Ebay is a wonderful online auction site. You can find unique, one of a kind items, or sell all sorts of stuff. Customers bid on the stuff for sale and try to win at a good price. Many people find that selling their stuff on Ebay is easy and profitable.
|Published (Last):||8 September 2006|
|PDF File Size:||16.88 Mb|
|ePub File Size:||16.54 Mb|
|Price:||Free* [*Free Regsitration Required]|
Successfully reported this slideshow. We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime. Decomposing applications for deployability and scalability cfopentour india. Upcoming SlideShare. Like this presentation?
Why not share! Embed Size px. Start on. Show related SlideShares at end. WordPress Shortcode. Published in: Technology , Business. Full Name Comment goes here. Are you sure you want to Yes No. Browse by Genre Available eBooks No Downloads. Views Total views. Actions Shares. Embeds 0 No embeds. No notes for slide. Decomposing applications for deployability and scalability cfopentour india 1. Presentation goal How decomposing applications improves deployability and scalability 2 3.
But there are problems with a monolithic architecture 7 8. Overloads your IDE and container Slows down development 10 Obstacle to scaling development Accounting team E-commerce Engineering application Shipping team 11 Obstacle to scaling development Lots of coordination and communication required 13 Requires long-term commitment to a technology stack 14 The scale cubeY axis -functionaldecompositionScale by im ingsplitting g s on r ila tin itidifferent things lit art p gs y ata th ale - d sp i s ax in b Z X axis - horizontal Sc duplication 17 There are drawbacks 22 When to use it?
Two levels of architecture System-levelServicesInter-service glue: interfaces and communication mechanismsSlow changing Service-levelInternal architecture of each serviceEach service could use a different technology stackPick the best tool for the jobRapidly evolving 27 If services are small The human body as a system 29 Yet you the system remain you 31 Can we build software systems with these characteristics?
Asynchronous message-based communication wgrus-billing. Writing code that calls services 38 Using Akka futuresdef callB : Future[ Summary 50 Monolithic applications aresimple to develop and deploy BUT have significant drawbacks 51 You just clipped your first slide! Clipping is a handy way to collect important slides you want to go back to later.
Now customize the name of a clipboard to store your clips. Visibility Others can see my Clipboard. Cancel Save.
Understanding the Benefits
Although microservice architecture is fairly new, the basic concept behind it is one that will seem familiar to many software professionals. The guiding principles behind microservices include:. Using small, single purpose, service-based applications to create a fully functional application each single purpose application is a microservice. Creating each microservice using the most appropriate programming language for the task. Obtaining application data using the most efficient data management technique for the particular microservice. Communication occurs using protocols such as REST, so that the pipe is dumb, but the microservice is smart. Employing a decentralized approach to managing the application by monitoring each microservice separately.
Dan Pritchett and Randy Shoup: The eBay Architecture
There are plenty of good reason not to use stored procedures for your CRUD, just read the longer posts in this topic. However lets look at your reasons. Yea you can build out your databases servers to increase scalability it is expensive both in hardware and the licenses, far more then to do a web server or client machines. Also once you get into very high end database they recommend you remove the following items for scalability: Stored Procedures, triggers then joins. Here is a article about the ebay setup from SD Forum where they say to scale databases remove the stored procedures. It is even getting less of security risk because companies are requiring secure communications for all connections. For web and similar applications it offers no security because the user never has any direct access to the database and has no way of access the database.