ELEMENTS OF COMPUTER SCIENCE
open-menucloseme
Home
Books
About us
  • Leveraging Bicep to deploy Azure resources - Part 4

    calendarJan 28, 2024 · 6 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this concluding post, we will witness Bicep in action as we create an environment with an Azure subscription and Azure Functions from start to finish.
    Read More
  • Understanding CQRS architecture - Part 1

    calendarJan 22, 2024 · 2 min read  ·
    Share on: twitterfacebooklinkedincopy
    Starting today, we embark on a comprehensive series of articles that delve into the CQRS architectures with a specific focus on their application in the realm of microservices architecture. We will incorporate C# code examples as needed; however, the main objective is to thoroughly understand the rationale behind the …
    Read More
  • Understanding CQRS architecture - Part 2

    calendarJan 22, 2024 · 3 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we briefly outline the distinctions between the significant concepts of strategic and tactical patterns and elucidate how CQRS aligns with these paradigms.
    Read More
  • Understanding CQRS architecture - Part 3

    calendarJan 22, 2024 · 5 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we implement the CRUD architectural style, scrutinize its strengths and weaknesses, and explore situations where it becomes imperative to replace it with a more sophisticated pattern.
    Read More
  • Understanding CQRS architecture - Part 4

    calendarJan 22, 2024 · 3 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we will briefly outline what CQRS means and explore how to use it to reexamine the preceding simple example.
    Read More
  • Understanding CQRS architecture - Part 5

    calendarJan 22, 2024 · 5 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this concluding post, we will explore how CQRS is conventionally exposed and introduce intricate concepts associated with it.
    Read More
  • Building resilient .NET applications with Polly - Part 1

    calendarJan 18, 2024 · 2 min read  ·
    Share on: twitterfacebooklinkedincopy
    Starting today, we embark on a comprehensive series of articles that delve into the art of constructing robust C# applications using Polly. Our primary emphasis will be on the intricacies of implementing various strategies with a specific focus on their application in the realm of microservices architecture.
    Read More
  • Building resilient .NET applications with Polly - Part 2

    calendarJan 18, 2024 · 4 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we elucidate the reasons why distributed architectures, in particular, can succumb to chaos when not meticulously designed, and we explore strategies to circumvent and mitigate these issues.
    Read More
  • Building resilient .NET applications with Polly - Part 3

    calendarJan 18, 2024 · 3 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we will establish a straightforward Azure Functions setup that makes requests to an external service. Subsequently, we will scrutinize the behavior of this function when the external service encounters a breakdown.
    Read More
  • Building resilient .NET applications with Polly - Part 4

    calendarJan 18, 2024 · 3 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we will learn how to address the issue of an unresponsive server by incorporating a straightforward timeout mechanism using Polly.
    Read More
    • ««
    • «
    • 6
    • 7
    • 8
    • 9
    • 10
    • »
    • »»

Nicolas DESCARTES

This blog gathers the contributions of a passionate software engineer convinced that getting to the bottom of things is the best way to truly understand the big picture. Follow @EOCS_Descartes
Read More

Don't miss new articles

/* Real people should not fill this in and expect good things - do not remove this or risk form bot signups. */

Recent Posts

  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - Implementing Azure Key Vault
  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - Implementing managed identities
  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - The traditional approach and its drawbacks
  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - Introduction
  • Engineering a compiler through examples: building a mathematical expression engine - Part 6
  • Engineering a compiler through examples: building a mathematical expression engine - Part 5
  • Engineering a compiler through examples: building a mathematical expression engine - Part 4
  • Engineering a compiler through examples: building a mathematical expression engine - Part 3
Nicolas DESCARTES

Copyright  NICOLAS DESCARTES

to-top