Remove Fashion Remove Microservices Remove System Architecture
article thumbnail

Edge Authentication and Token-Agnostic Identity Propagation

Netflix Tech

We had multiple types and sources of identity tokens, each requiring special handling, the logic for which was replicated in various systems. Critical identity data was being propagated throughout the server ecosystem in an inconsistent fashion. We would need to process authentication tokens (and protocols) further upstream.

article thumbnail

ML Platform Meetup: Infra for Contextual Bandits and Reinforcement Learning

Netflix Tech

In particular, he talked about the misattribution potential in a complex microservice architecture where often intermediary results are cached. link] Dropbox Slides The last talk of the event was a system architecture introduction by Dropbox’s Tsahi Glik.

Metrics 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ML Platform Meetup: Infra for Contextual Bandits and Reinforcement Learning

Netflix Tech

In particular, he talked about the misattribution potential in a complex microservice architecture where often intermediary results are cached. link] Dropbox Slides The last talk of the event was a system architecture introduction by Dropbox’s Tsahi Glik.

Metrics 40
article thumbnail

Journey to Event Driven – Part 4: Four Pillars of Event Streaming Microservices

Confluent

How do I upgrade or evolve microservices? Which teams are going to run my system? With event-first design, the data becomes the API which, like any production system, needs to support change and evolution (i.e., In the context of a payment system, you might need to drain the current set of payments for a topology change.