Service Discovery with Consul

https://www.consul.io/

Advertisements

CouchDB

Apache CouchDB™ lets you access your data where you need it by defining the Couch Replication Protocol that is implemented by a variety of projects and products that span every imaginable computing environment from globally distributed server-clusters, over mobile phones to web browsers. Software that is compatible with the Couch Replication Protocol include: PouchDB, Cloudant, and Couchbase Lite.

Store your data safely, on your own servers, or with any leading cloud provider. Your web- and native applications love CouchDB, because it speaks JSON natively and supports binary for all your data storage needs. The Couch Replication Protocol lets your data flow seamlessly between server clusters to mobile phones and web browsers, enabling a compelling, offline-first user-experience while maintaining high performance and strong reliability. CouchDB comes with a developer-friendly query language, and optionally MapReduce for simple, efficient, and comprehensive data retrieval.
Reference: http://couchdb.apache.org/

https://db-engines.com/en/system/CouchDB%3BCouchbase%3BMongoDB

Software Security Testing – OWASP

https://www.modsecurity.org/demo.html
ModSecurity is an open source, cross-platform web application firewall (WAF) module. Known as the “Swiss Army Knife” of WAFs, it enables web application defenders to gain visibility into HTTP(S) traffic and provides a power rules language and API to implement advanced protections.

Install this before web application. Access application through Mod Security and see the magic. Read above documentation. This is very useful in Dev/QA environments to test OWASP issues ahead of the time.
————

https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project

The OWASP Zed Attack Proxy (ZAP) is one of the world’s most popular free security tools and is actively maintained by hundreds of international volunteers*. It can help you automatically find security vulnerabilities in your web applications while you are developing and testing your applications. Its also a great tool for experienced pentesters to use for manual security testing.

Open Data

We need data for POCs, Demos, Testing,….etc
Also curious to know lot more what data presents.
Here are list of data sources for personal use.

Open Whisk Functions
Amazon Batch Jobs

0) Data from Indian Government
https://data.gov.in/

1) data.world
https://data.world/

2) data.un.org
http://data.un.org/

3) WHO
http://www.who.int/gho/en/

4) World Bank
https://data.worldbank.org/

5) Data is plural
https://tinyletter.com/data-is-plural

6) UNECE
http://w3.unece.org/PXWeb/en

7) Kaggle
https://www.kaggle.com/datasets

8) NOAA
https://data.noaa.gov//dataset/

9) Reddit
https://www.reddit.com/r/datasets/

10) Cental Intelligence Agency
https://www.cia.gov/library/publications/the-world-factbook/index.html

11) United Nations Environment Programme
http://geodata.grid.unep.ch/

12) Tableau Sample Data
https://public.tableau.com/en-us/s/resources

Reference:
http://pentaho-bi-suite.blogspot.in/2018/01/publicly-available-data-sources.html

Serverless Architectures

https://martinfowler.com/articles/serverless.html

Backend as a Service or “BaaS”
Function as a Service or “FaaS” (Example: http://openwhisk.incubator.apache.org/)
AWS Lambda: https://aws.amazon.com/lambda/

Advantages:
1. Easy to develop and deploy light weight systems.
2. Good for systems, which use less CPU and low usage. Saves money on infrastructure.

Disadvantages:
1. Enterprise scale high throughput applications need to pay more money to IBM/Amazon/.etc.
2. We need to pay for each task
1. CPU
2. Data storage
3. Disk Space
4. Total number of calls
Almost it becomes like mainframe systems.

-o-

Software Architect Catalogue

IBM Cloud Catalog
https://console.bluemix.net/catalog/

Amazon Catalog
https://us-west-2.console.aws.amazon.com/console/home?region=us-west-2#
https://aws.amazon.com/documentation/

Architectural Patterns
https://en.wikipedia.org/wiki/Architectural_pattern

Software Security Patterns
https://en.wikipedia.org/wiki/Attack_patterns
https://en.wikipedia.org/wiki/Security_pattern
https://www.owasp.org/index.php/Security_by_Design_Principles
https://dzone.com/articles/9-software-security-design

Integration Patterns
http://www.enterpriseintegrationpatterns.com/patterns/messaging/
http://camel.apache.org/enterprise-integration-patterns.html

Software Architecture
SEI CMM
Oracle
TOGAF

-o-