eventdriven

Is there an Alternative to Debezium + Kafka?

Is there an Alternative to Debezium + Kafka?

I asked this question on Reddit a while back and received lots of valuable answers. Therefore, I've looked into each answer and documented the results in this article. TL;DR No, Debezium dominates the market at the moment, despite some drawbacks. Background Explanation Why would we want to find an alternative to Debezium? The main reason is we encountered a challenging scenario. This is a typical scenario for Debezium, where any modifications to the data source are captured and fed into Kafka for downstream processing. The advantage of this architecture is simple and efficient, ensuring all downstream processes are as real-time…
Read More
Why You Need (More Than) Locks: Ensuring Consistency with Transactions in Your No-Code Applications

Why You Need (More Than) Locks: Ensuring Consistency with Transactions in Your No-Code Applications

TL;DR Consistency is vital in no-code development for user trust. Many platforms struggle with data reliability due to locking issues. Momen.app uses PostgreSQL’s Multi-Version Concurrency Control (MVCC) to ensure data integrity, allowing developers to focus on building features without worrying about consistency problems. Why Consistency Matters in No-Code Development No-code development is often associated with feature delivery, problem solving and quick realization of business value. And it should be, after all, time-to-market, is probably one of the most important reasons one would choose to use no-code in the first place. But underneath every app lies one critical need: consistent, reliable…
Read More
How Infrastructure Monitoring Can Prevent a Cyber Attack

How Infrastructure Monitoring Can Prevent a Cyber Attack

In today's digital age, where data breaches and cyber threats pose major risks to businesses, proactive cybersecurity measures are more needed than ever. One of the most effective defenses gaining prominence is infrastructure monitoring. Let’s explore the pivotal role of infrastructure monitoring in preemptively thwarting cyber attacks through real-world examples, industry insights, and best practices. Cybersecurity Challenges Cyber attacks continue to evolve in sophistication and frequency, targeting organizations across all sectors. The consequences of these attacks can be devastating, ranging from financial losses and operational disruptions to irreparable damage to brand reputation. As businesses increasingly rely on digital infrastructure, securing…
Read More
Event-Driven Architecture: reconcile Notification and Event-Carried State Transfer patterns

Event-Driven Architecture: reconcile Notification and Event-Carried State Transfer patterns

Event-driven architectures have tremendous benefits: decoupling application components brings improved resilience, the ability to isolate non-scalable workloads from unpredictable user traffic and better user experience (returning a response before we do the complexe processing). However, their design is not easy and can lead to numerous debates among developers and architects: should we have very minimalistic events, requiring consumers to fetch additional information? do we need fully-qualified events? .. In this post, I explain the different types of events and propose a way to simply reconcile the different approaches by relying on AWS EventBridge. A Github repo with fully functional examples…
Read More
No widgets found. Go to Widget page and add the widget in Offcanvas Sidebar Widget Area.