Friday, October 3, 2025

Link Dump #209

Coffee and something to read - day cannot start better than that.

  1. #BookOfTheMonth
    
    Introducing Event Storming
    
  2. Software Architecture
    1. The Design System Team: Goals, Pains, and Successes
      Starting or scaling a design system? This article offers practical insights into the common goals, such as defining design tokens and ensuring all components are accessible. It also touches on the major pain point: managing visual and user experience inconsistencies during a gradual, horizontal migration away from legacy components.
    2. Building a Resilient Data Platform with Write-Ahead Log at Netflix #PickOfTheWeek
      Netflix built a Write-Ahead Log (WAL) abstraction to tackle critical data challenges like accidental data loss, system entropy, and unreliable retries. Discover how this distributed system provides strong durability guarantees and ensures data consistency across diverse datastores.
    3. How to Build Real-Time Alerts to Stay Ahead of Critical Events #PickOfTheWeek
      This article explains the shift from monitoring dashboards to proactive, real-time alerting. Discover how using Apache Kafka and data streaming enables you to detect critical events—like fraud or system anomalies—in seconds and trigger automated responses before issues can escalate into financial or reputational damage.
    4. Do Microservices Need Event-Driven Architectures? #PickOfTheWeek
      The shift to EDA isn't just technical—it's a business advantage. This article shows how event-driven microservices translate to faster innovation cycles, reduced downtime risk through fault isolation, and more responsive customer experiences.
  3. Software Development
    1. Capability Mapping: The Bridge Between Strategy and Reality #PickOfTheWeek
      This article introduces Capability Mapping as the essential bridge, providing a common visual language to link high-level business goals with the underlying technology and processes. Learn how this powerful tool brings strategy down to reality.
    2. Secure MQTT Implementations – TLS, Authentication, and Access Control for IoT Networks
      This article explores how to secure MQTT deployments with TLS encryption, authentication mechanisms, and fine-grained access control, providing a practical roadmap for building resilient IoT networks.
  4. Leadership
    1. How to Coach Yourself Through Complex Problems
      Leaders today are facing more complexity, faster change, and higher expectations than ever. But budget cuts, approval bottlenecks, and cultural barriers can put the executive coaching that could help them navigate all this uncertainty out of reach. This is where self-coaching can come in.
  5. Fun
    1. Property Flippers





No comments:

Post a Comment