Notes

The Hidden Cost of Success: Understanding Non-Fatal Errors in Microservices

The Hidden Cost of Success: Understanding Non-Fatal Errors in Microservices

A recent study published by researchers from Washington University in St. Louis and Uber …

Distributed Traces of Microservices Architecture: Publicly Available Datasets

Distributed Traces of Microservices Architecture: Publicly Available Datasets

Distributed traces are essential for understanding the behaviour, performance, and reliability of …

Power Laws and Heavy-Tail Distributions in Hyperscale Microservices Architectures

Power Laws and Heavy-Tail Distributions in Hyperscale Microservices Architectures

Recent analyses of Meta and Alibaba’s production microservices architectures identified …

Microservice Architecture of Alibaba

Microservice Architecture of Alibaba

Alibaba has built a complex system of microservices to support its large user base and manage its …

Unveiling Graph Structures in Microservices: Service Dependency Graph, Call Graph, and Causal Graph

Unveiling Graph Structures in Microservices: Service Dependency Graph, Call Graph, and Causal Graph

The rise of service-oriented architecture (SOA) and microservices architecture has led to a major …

Cache Me If You Can: Taming the Caching Complexity of Microservice Call Graphs

Cache Me If You Can: Taming the Caching Complexity of Microservice Call Graphs

As microservices architectures have become increasingly common in modern software systems, they have …

Privacy Engineering: Why Standards Are Still Out of Reach?

Privacy Engineering: Why Standards Are Still Out of Reach?

In contemporary technology environments, organisations are increasingly challenged with the …

 Policy Zones: Purpose Limitation at Scale using Information Flow Control

Policy Zones: Purpose Limitation at Scale using Information Flow Control

At the heart of privacy lies the principle of purpose limitation, dictating that data should only be …

Differential Privacy: 6 Key Equations Explained

Differential Privacy: 6 Key Equations Explained

Differential Privacy is a powerful framework for ensuring privacy in data analysis by adding …