Latest Articles

  • Migrating from a monolithic architecture to microservices can be daunting. This article covers key considerations and best practices for a successful...

    Implementing the strangler application pattern using change data capture

    Migrating from a monolithic architecture to microservices can be daunting. This article covers key considerations and best practices for a successful...

    1 min
  • Event storming is a powerful technique for identifying bounded contexts in domain-driven design. In this article, learn how to use event storming...

    Using event storming to find bounded contexts

    Event storming is a powerful technique for identifying bounded contexts in domain-driven design. In this article, learn how to use event storming...

    1 min
  • Understanding the different types of web application APIs is crucial for modern development. Learn about REST, GraphQL, tRPC, and gRPC in our latest...

    Rest, GraphQL, TRPC, gRPC, Oh My!

    Understanding the different types of web application APIs is crucial for modern development. Learn about REST, GraphQL, tRPC, and gRPC in our latest...

    1 min