Microservices
Microservices | News, how-tos, features, reviews, and videos
Building and running microservices at scale: A CTO’s view
How the 12-factor methodology, container-based microservices, and a monorepo approach win with both customers and developers at Priceline.
Overdoing service-focused cloud development
Microservices, cloud services, and general-purpose services are fantastic development tools that sometimes get overused. Here are some signs you’ve gone too far.
Meeting the challenges of multi-cluster Kubernetes
The difficulties and challenges of running Kubernetes multiply as you scale. Here are four things we’ll need to manage multi-cluster orchestration.
A cure for complexity in software development
Although microservice architectures create larger and more complex applications, they simplify work for rank-and-file developers.
The RED method: A new strategy for monitoring microservices
By using the RED metrics—rate, error, and duration—you can get a solid understanding of how your services are performing for end-users.
Complexity is killing software developers
The growing complexity of modern software systems is slowly killing software developers. How can you regain control, without losing out on the best these technologies have to offer?
Using Microsoft’s YARP project to proxy web-based microservices
Microsoft’s internal .NET reverse proxy project gets close to a public release.
Why you should use a microservice architecture
Are your applications stuck in the muck? Microservice architectures not only allow you to scale traffic and improve user experience, but also boost your development team’s productivity.
How cloud-native apps and microservices impact the development process
Best practices such as code refactoring and using microservice design patterns help software developers working at high velocity.
Cloud security and architecture teams need to communicate better
It’s a sure bet that containers and microservices will become new security vulnerabilities for cloud-native applications without discussions about best practices and standards.
How to use correlation IDs in ASP.NET Core MVC
Capture and pass correlation IDs in ASP.NET Core MVC 5 to track HTTP requests that flow through multiple back-end services.
Microsoft equips Visual Studio Code with extension for Project Tye microservices
The experimental tool helps with viewing, running, and debugging apps from within the editor.
How Kubernetes works
If you want to understand containers, microservices architecture, modern application development, and cloud native computing, you need to understand Kubernetes.
What is an API gateway? API simplicity and stability
An API gateway decouples clients from services, simplifying life for service developers and consumers. It can also provide additional benefits such as monitoring, logging, security, and load balancing.
Running microservices on Google Cloud Platform
From roll-your-own Kubernetes and PaaS to serverless containers and serverless functions, Google provides many options for building microservices applications in the cloud. Here’s a guide.
Deep Dive
29 tips for succeeding as an independent developer
Find out how to cut corporate ties and transform your coding chops into a thriving business that can go the distance
Digital Spotlight
Liquid computing: The next wave of the mobile experience
The traditional enterprise workflow is ripe for huge change as the focus moves away from working in a single context on a single device to the workflow being portable and contextual
Deep Dive
The care and feeding of a rockstar developer
Whether you're a hiring company, an educator, or a developer, find out what you're up against in the war for programming talent
Deep Dive
The beginner's guide to Docker
Dig into Docker, the red-hot open source framework, from getting started to services you can use right now to the company's direction, in this downloadable PDF
Digital Spotlight
Digital Spotlight: Cloud Security
The scalability of cloud computing depends on sharing resources that were never shared before, creating a new set of risks and demanding a new set of security best practices