Direct Download Serverless Design Patterns and Best Practices

Hits: 66
Serverless Design Patterns and Best Practices
Serverless Design Patterns and Best Practices by Brian Zambrano
English | 16 Apr. 2018 | ISBN: 178862064X | 260 Pages | EPUB | 14.56 MB

Key Features
Learn the details of popular software patterns and how they are applied to serverless applications
Understand key concepts and components in serverless designs
Walk away with a thorough understanding of architecting serverless applications
Book Description
Serverless applications and architectures are gaining momentum and are increasingly being used by companies of all sizes. For good reason, serverless-based applications handle many of the problems developers face when running systems and servers such as fault-tolerance, centralized logging, horizontal scalability, and deployments, to name a few. Additionally, the serverless pay-per-invocation model can result in drastic cost savings. While it's simple to create a basic serverless application, it's critical to design and structure your software correctly to ensure its success as it grows in complexity.
As you start a new serverless project you will immediately be faced with the question, "How should I design my code for a serverless system?" The good news is that tried and true patterns are evolving to fit in the serverless landscape, taking advantage of all that serverless systems have to offer and avoiding some of its pitfalls. This book presents several familiar patterns which will be adapted to run in a serverless environment. Your path through this book will take you across multiple serverless patterns applicable to web applications, data processing, big data, mobile, and Internet-of-Things to name a few. Additionally, you will learn which patterns fit specific types of problems and how to ensure your application is scalable, performant, fault tolerant and well tested.
What you will learn
Understand popular serverless design patterns
Learn different serverless patterns for web APIs
Discover how authentication works serverless architecture
Learn how to successfully build a serverless ETL system
Understand how to apply the right serverless pattern for big data processing
Learn how to think about error handling and system monitoring in a serverless architecture
Learn how to setup a serverless application for CI/CD
Understand how to leverage hosted services (databases, queues, storage, etc.) with serverless applications


Related Posts
At 19, our hero is caring for her sickly mother when a stranger appears with a shocking truth: Skyla Draken was born in a realm where magic rules, and mythical creatures roam. This land is now the key to curing her mother. And so, Skyla must return to her homeland, but once there, she discov...


A smart, tight, provocative techno-thriller straight out of the very near future - by an iconic visionary writer. Some people call it "abyss gaze". Gaze into the abyss all day and the abyss will gaze into you.There are two types of people who think professionally about the future: ...


Named one of the most anticipated books of the season by The Washington Post and Publishers Weekly When Apollo Kagwa's father disappeared, all he left his son were strange recurring dreams and a box of books stamped with the word improbabilia. Now Apollo is a father himself - and as he a...


23 hours

 Date: 07/16/18 02:40   in : E-Books & Audio Books 

After a brutal snowstorm in the Cascade Mountains, Chris Jacobs discovers two things he never expected to see: the charred shell of a cabin, and Gianna Trask and her sixteen-year-old daughter huddled in an SUV, having barely escaped from their burning vacation rental. Still scarred from a childhood...


Rex Holt - a nice lad, carefree, brimming with over-confidence - is found dead in a hotel room out in the country. It seems as though he has committed suicide. But Philip Holt is convinced that his brother has been murdered; and his conviction brings him up against those who cheat, who rob, ...


All battles are in some degree…disasters.” These words by military historian John Keegan are true in that military conflicts inevitably involve death and destruction. Yet despite their tragic cost, many battles are regarded as great triumphs, while others are nearly universally declared blunders. W...


This wonderfully diverse collection by writers such as Martin Edwards, Jürgen Ehlers, Barbara Nadel, L. C. Tyler, Michael Gregorio, Alison Joseph and Peter Guttridge reveals not just the evil side of Moriarty's personality, but his humanity, his motivations and his human failings. Some of ...


Nina Redmond is a librarian with a gift for finding the perfect book for her readers. But can she write her own happy-ever-after? In this valentine to readers, librarians, and book-lovers the world over, the New York Times-bestselling author of Little Beach Street Bakery returns with a funny, movin...


Tensions have been running high in White River as it approaches the anniversary of a fatal shooting of a black motorist by a local police officer. The racially polarized city is on edge, confronted with angry demonstrations, arson, and looting. In the midst of the turmoil, a White River police offi...


Solar energy, once a niche application for a limited market, has become the cheapest and fastest-growing power source on earth. What's more, its potential is nearly limitless. But in Taming the Sun, energy expert Varun Sivaram warns that the world is not yet equipped to harness erratic sunshine...