Author: Max Merz
Scaling a Basic Chat
Authors: Max Merz — merzmax.de, @MrMaxMerzMartin Bock — martin-bock.com, @martbock
Zero Trust Security – The further development of perimeter security?
Most companies use perimeter security to secure their cooperate applications, services and data from attackers and unauthorised users. This approach includes a cooperate network, where clients, that are part of the network are able to access the applications. This includes attackers that got access to these networks.Additionally more applications are getting shifted from cooperate networks…
Event-driven Architectures
Next to the powerful Request / Response architecture exists another architecture, the event-driven one. How this architecture works, where the differences to Request / Response systems are and how transactions can be realized will be part of this article.
QUIC – Die Zukunft?
QUIC soll als neuer Standard das weit verbreitete TCP-Protokoll ablösen. Welche Neuerungen QUIC mitbringt, wo seine Stärken liegen und warum überhaupt eine Weiterentwicklung von TCP benötigt wird, versuche ich in diesem Artikel zu beantworten.