Book Image

Software Architecture Patterns for Serverless Systems - Second Edition

By : John Gilbert
Book Image

Software Architecture Patterns for Serverless Systems - Second Edition

By: John Gilbert

Overview of this book

Organizations undergoing digital transformation rely on IT professionals to design systems to keep up with the rate of change while maintaining stability. With this edition, enriched with more real-world examples, you’ll be perfectly equipped to architect the future for unparalleled innovation. This book guides through the architectural patterns that power enterprise-grade software systems while exploring key architectural elements (such as events-driven microservices, and micro frontends) and learning how to implement anti-fragile systems. First, you'll divide up a system and define boundaries so that your teams can work autonomously and accelerate innovation. You'll cover the low-level event and data patterns that support the entire architecture while getting up and running with the different autonomous service design patterns. This edition is tailored with several new topics on security, observability, and multi-regional deployment. It focuses on best practices for security, reliability, testability, observability, and performance. You'll be exploring the methodologies of continuous experimentation, deployment, and delivery before delving into some final thoughts on how to start making progress. By the end of this book, you'll be able to architect your own event-driven, serverless systems that are ready to adapt and change.
Table of Contents (16 chapters)
Other Books You May Enjoy

Leveraging ML for control flow

We have only scratched the surface of what can be accomplished with control services. Using rules to implement orchestration and CEP is clean and very powerful, but it is not the end of the road. We can certainly implement control flow with raw bespoke logic as well, but a very interesting approach that is emerging is the use of ML to steer control flow. For example, a control service could raise alerts based on facial recognition or fraud and anomaly detection, or a control service could generate leads and personalized recommendations based on user activity.To leverage ML, we need to look at both sides of the equation: models and predictions. Let's look at these in turn.


When it comes to ML, it is all about the data. You need data, data, and more data. The more data you have, the more accurate your models will be. Conversely, if you do not have enough data, then you will most likely be better off using rules instead of ML.Fortunately, we have...