際際滷

際際滷Share a Scribd company logo
Evolution of message brokers.
From helpers to cores.
Artem Demchenkov
2
Artem Demchenkov
 CTO at Billie
 ardemchenkov@gmail.com
 https://www.linkedin.com/in/artem-
demchenkov-76b69934/
Billie
We are an innovative financial platform,
specialized on factoring.
Some numbers:
 Start: 01.12.2016
 Closed beta: 01.05.2017
 Public launch: 01.06.2017
 Team: 18
 Engineering crew: 8
is an intermediary program module that translates a message from the
formal messaging protocol of the sender to the formal messaging
protocol of the receiver.
Boring, but necessary theoretical information
4
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Message-oriented middleware
(MOM)
is software or hardware infrastructure supporting sending and
receiving messages between distributed systems.
Message broker
A Universe of Message Brokers
5
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
And more...
PAST
6
PRESENT FUTURE
?
Message broker is a helper on a side of an infrastructure
7
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Website RabbitMQ Consumer
Past
8
PAST PRESENT FUTURE
?
Message broker is a core element of an infrastructure.
9
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Message
broker
Internal tool
Microservice
Microservice
Present
Real-life example. Google Cloud Platform.
Present
10
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Use case 1. Synchronization of data between parts of a system
11
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Website
Google Pub/Sub
Salesforce Partner portal
Distribution
Values
12
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Allows getting rid of a central data storage.
Each application can use an own one.
Real-time task forwarding between different
systems, responsible people or departments.
Improves data consistency.
Instantness
Consistency
Use case 2. Safe and secure triggering of microservices
13
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Backend Google Pub/Sub Microservice
Values
14
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Safety You wont loose a message.
Each message can be secured.Security
Use case 3. Persistent data storage
15
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Backend Apache Kafka
AWS Cloud Storage
Google Cloud Storage
Microsoft Azure Blob Storage
Values
16
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Persistence You have a full set of historical data.
You have a right to choose how to store data,
where and in which format.
Cloud storage services provide a permission
management mechanism to secure data.
Flexibility
Security
Use case 4. Log aggregation. Commit log
17
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Backend Apache Kafka
Instance 1 Storage 1
Instance 2 Storage 2
Values
18
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Replicability Message broker log allows replicating any
state of a system at any moment in time
You have an full set of historical data.
Message broker log can be used by many
different clients.
Persistence
Multifunctionality
Use case 5. Log aggregation. Fulltext search
19
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Backend Apache Kafka Google Cloud Storage Elastic
Use case 5. Log aggregation. Fulltext search
20
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Backend Apache Kafka Apache Solr Cloudera Hue
Values
21
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Searchability Any information in the past could be found.
Its relatively easy to detect wrong messages
and define when and how it has been
consumed.
Discoverability
Use case 6. Delayed messaging
22
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Website RabbitMQ External data provider
Values
23
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Effectiveness Allows consuming a message at the most
effective time.
Saves traffic, memory usage and disk space.Thriftiness
Use case 7. Multi-cloud application
24
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Google Cloud Storage Google Pub/Sub AWS Cloud Storage
Values
25
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Distribution Allows synchronising data across
applications running on other clouds.
Allows backing up data across applications
running on other clouds.
Provides more flexibility in terms of choosing
right services for an architecture.
Security
Variety
26
PAST PRESENT FUTURE
?
Future
27
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Lets look again at the current situation.
28
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Google Pub/Sub
RabbitMQ Apache Kafka
My prediction is the following: soon projects will use more than one message broker,
communicating to each other.
Future
29
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Future
Lets see in 3-4 years, whether I was right
30
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Future
Conclusion
31
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
Because its there
George Mallory - English mountaineer, answering a question why did he want to climb Everest. Made 3
attempts and died during the 3rd one in 1924. It is still a mystery whether he had reached the top of it or
not.
32
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
If you dont know that something exists, you, probably, dont need
it
Tenzing Norgay - Nepali Sherpa mountaineer. One of the first two people reached the top of Everest in
1953.
33
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
No matter what youve seen in that presentation, think twice
whether you product needs it
Artem Demchenkov - CTO at Billie. I hope, successfully presented these slides on Codemotion Berlin 2017.
Thank you
 ardemchenkov@gmail.com
 https://www.linkedin.com/in/artem-
demchenkov-76b69934/
We have just started, but there will be interesting:
Check out our Billie Engineering Corner on Medium
35
Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
https://medium.com/billie-finanzratgeber/tagged/engineering

More Related Content

Similar to Evolution of message brokers: from helpers to cores (20)

A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5A technical writing on cryptographic hash function md5
A technical writing on cryptographic hash function md5
Khulna University, Khulna, Bangladesh
Hackers stole our Login-Credentials. What do we do?
Hackers stole our Login-Credentials. What do we do?Hackers stole our Login-Credentials. What do we do?
Hackers stole our Login-Credentials. What do we do?
S旦ren Laird S旦rries
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
ijcisjournal
INFORMATION HIDING IN CSS: A SECURE SCHEME TEXT-STEGANOGRAPHY USING PUBLIC KE...
INFORMATION HIDING IN CSS: A SECURE SCHEME TEXT-STEGANOGRAPHY USING PUBLIC KE...INFORMATION HIDING IN CSS: A SECURE SCHEME TEXT-STEGANOGRAPHY USING PUBLIC KE...
INFORMATION HIDING IN CSS: A SECURE SCHEME TEXT-STEGANOGRAPHY USING PUBLIC KE...
ijcisjournal
Saving Human Lives with the IoT
Saving Human Lives with the IoTSaving Human Lives with the IoT
Saving Human Lives with the IoT
Dat Tran
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
pwcom.co.uk Ltd
A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms
Er Piyush Gupta IN 錚
Distributed:Health Code Camp Hyperledger
Distributed:Health Code Camp HyperledgerDistributed:Health Code Camp Hyperledger
Distributed:Health Code Camp Hyperledger
Tracy Kuhrt
A Metadata Model for Peer-to-Peer Media Distribution
A Metadata Model for Peer-to-Peer Media DistributionA Metadata Model for Peer-to-Peer Media Distribution
A Metadata Model for Peer-to-Peer Media Distribution
粥鉛沿艶稼-粥糸姻庄温-雨稼庄厩艶姻壊庄岳辰岳
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
archana lisbon
Big Data Science in the Cloud from Big Data World Conference 2013
Big Data Science in the Cloud from Big Data World Conference 2013Big Data Science in the Cloud from Big Data World Conference 2013
Big Data Science in the Cloud from Big Data World Conference 2013
Markus Schmidberger
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
paperpublications3
[DataCon.TW 2017] Data Lake: centralize in on-prem vs. decentralize on cloud
[DataCon.TW 2017] Data Lake: centralize in on-prem vs. decentralize on cloud[DataCon.TW 2017] Data Lake: centralize in on-prem vs. decentralize on cloud
[DataCon.TW 2017] Data Lake: centralize in on-prem vs. decentralize on cloud
Jeff Hung
Designing Swarms of Cyber-Physical Systems: The H2020 CPSwarm Project
Designing Swarms of Cyber-Physical Systems: The H2020 CPSwarm ProjectDesigning Swarms of Cyber-Physical Systems: The H2020 CPSwarm Project
Designing Swarms of Cyber-Physical Systems: The H2020 CPSwarm Project
Alessandra Bagnato
Homomorphic encryption on Blockchain Principles
Homomorphic encryption on Blockchain PrinciplesHomomorphic encryption on Blockchain Principles
Homomorphic encryption on Blockchain Principles
Johann H旦chtl
Reviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelReviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android Kernel
Shakacon
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion 際際滷s 2019
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion 際際滷s 2019Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion 際際滷s 2019
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion 際際滷s 2019
Jonas Traub
Designing & Implementing Hypermedia APIs Mike Amundsen, Principal API Archi...
Designing & Implementing Hypermedia APIs  Mike Amundsen, Principal API Archi...Designing & Implementing Hypermedia APIs  Mike Amundsen, Principal API Archi...
Designing & Implementing Hypermedia APIs Mike Amundsen, Principal API Archi...
CA API Management
Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...
Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...
Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...
Trivadis
Hackers stole our Login-Credentials. What do we do?
Hackers stole our Login-Credentials. What do we do?Hackers stole our Login-Credentials. What do we do?
Hackers stole our Login-Credentials. What do we do?
S旦ren Laird S旦rries
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
Information Hiding in CSS: A Secure Scheme Text-Steganography Using Public Ke...
ijcisjournal
INFORMATION HIDING IN CSS: A SECURE SCHEME TEXT-STEGANOGRAPHY USING PUBLIC KE...
INFORMATION HIDING IN CSS: A SECURE SCHEME TEXT-STEGANOGRAPHY USING PUBLIC KE...INFORMATION HIDING IN CSS: A SECURE SCHEME TEXT-STEGANOGRAPHY USING PUBLIC KE...
INFORMATION HIDING IN CSS: A SECURE SCHEME TEXT-STEGANOGRAPHY USING PUBLIC KE...
ijcisjournal
Saving Human Lives with the IoT
Saving Human Lives with the IoTSaving Human Lives with the IoT
Saving Human Lives with the IoT
Dat Tran
A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms A Comparative Study between RSA and MD5 algorithms
A Comparative Study between RSA and MD5 algorithms
Er Piyush Gupta IN 錚
Distributed:Health Code Camp Hyperledger
Distributed:Health Code Camp HyperledgerDistributed:Health Code Camp Hyperledger
Distributed:Health Code Camp Hyperledger
Tracy Kuhrt
Secure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy PreservingSecure Data Storage on Cloud System for Privacy Preserving
Secure Data Storage on Cloud System for Privacy Preserving
IRJET Journal
cloud security using Fog Computing
cloud security using Fog Computingcloud security using Fog Computing
cloud security using Fog Computing
archana lisbon
Big Data Science in the Cloud from Big Data World Conference 2013
Big Data Science in the Cloud from Big Data World Conference 2013Big Data Science in the Cloud from Big Data World Conference 2013
Big Data Science in the Cloud from Big Data World Conference 2013
Markus Schmidberger
Improving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA AlgorithmImproving Network Security by Modifying RSA Algorithm
Improving Network Security by Modifying RSA Algorithm
paperpublications3
[DataCon.TW 2017] Data Lake: centralize in on-prem vs. decentralize on cloud
[DataCon.TW 2017] Data Lake: centralize in on-prem vs. decentralize on cloud[DataCon.TW 2017] Data Lake: centralize in on-prem vs. decentralize on cloud
[DataCon.TW 2017] Data Lake: centralize in on-prem vs. decentralize on cloud
Jeff Hung
Designing Swarms of Cyber-Physical Systems: The H2020 CPSwarm Project
Designing Swarms of Cyber-Physical Systems: The H2020 CPSwarm ProjectDesigning Swarms of Cyber-Physical Systems: The H2020 CPSwarm Project
Designing Swarms of Cyber-Physical Systems: The H2020 CPSwarm Project
Alessandra Bagnato
Homomorphic encryption on Blockchain Principles
Homomorphic encryption on Blockchain PrinciplesHomomorphic encryption on Blockchain Principles
Homomorphic encryption on Blockchain Principles
Johann H旦chtl
Reviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelReviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android Kernel
Shakacon
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion 際際滷s 2019
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion 際際滷s 2019Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion 際際滷s 2019
Database Research at TU Berlin DIMA and DFKI IAM - USA Excursion 際際滷s 2019
Jonas Traub
Designing & Implementing Hypermedia APIs Mike Amundsen, Principal API Archi...
Designing & Implementing Hypermedia APIs  Mike Amundsen, Principal API Archi...Designing & Implementing Hypermedia APIs  Mike Amundsen, Principal API Archi...
Designing & Implementing Hypermedia APIs Mike Amundsen, Principal API Archi...
CA API Management
Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...
Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...
Trivadis TechEvent 2017 Blockchain: relevant for whom by Andreas Mengel and D...
Trivadis

Recently uploaded (20)

Industrial Valves, Instruments Products Profile
Industrial Valves, Instruments Products ProfileIndustrial Valves, Instruments Products Profile
Industrial Valves, Instruments Products Profile
zebcoeng
Multi objective genetic approach with Ranking
Multi objective genetic approach with RankingMulti objective genetic approach with Ranking
Multi objective genetic approach with Ranking
namisha18
Turbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdfTurbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdf
Totok Sulistiyanto
Best KNow Hydrogen Fuel Production in the World The cost in USD kwh for H2
Best KNow  Hydrogen Fuel Production in the World The cost in USD kwh for H2Best KNow  Hydrogen Fuel Production in the World The cost in USD kwh for H2
Best KNow Hydrogen Fuel Production in the World The cost in USD kwh for H2
Daniel Donatelli
GM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptxGM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptx
crdslalcomumbai
Mathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptx
Mathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptxMathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptx
Mathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptx
ppkmurthy2006
Wireless-Charger presentation for seminar .pdf
Wireless-Charger presentation for seminar .pdfWireless-Charger presentation for seminar .pdf
Wireless-Charger presentation for seminar .pdf
AbhinandanMishra30
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
NgocThang9
UNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptx
UNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptxUNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptx
UNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptx
KesavanT10
TM-ASP-101-RF_Air Press manual crimping machine.pdf
TM-ASP-101-RF_Air Press manual crimping machine.pdfTM-ASP-101-RF_Air Press manual crimping machine.pdf
TM-ASP-101-RF_Air Press manual crimping machine.pdf
ChungLe60
US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...
US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...
US Patented ReGenX Generator, ReGen-X Quatum Motor EV Regenerative Accelerati...
Thane Heins NOBEL PRIZE WINNING ENERGY RESEARCHER
decarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptxdecarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptx
gonzalezolabarriaped
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptxGROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
meneememoo
CS3451-OPERATING-SYSTEM NOTES ALL123.pdf
CS3451-OPERATING-SYSTEM NOTES ALL123.pdfCS3451-OPERATING-SYSTEM NOTES ALL123.pdf
CS3451-OPERATING-SYSTEM NOTES ALL123.pdf
PonniS7
decarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptxdecarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptx
gonzalezolabarriaped
AI, Tariffs and Supply Chains in Knowledge Graphs
AI, Tariffs and Supply Chains in Knowledge GraphsAI, Tariffs and Supply Chains in Knowledge Graphs
AI, Tariffs and Supply Chains in Knowledge Graphs
Max De Marzi
only history of java.pptx real bihind the name java
only history of java.pptx real bihind the name javaonly history of java.pptx real bihind the name java
only history of java.pptx real bihind the name java
mushtaqsaliq9
04 MAINTENANCE OF CONCRETE PAVEMENTS.ppt
04  MAINTENANCE OF CONCRETE PAVEMENTS.ppt04  MAINTENANCE OF CONCRETE PAVEMENTS.ppt
04 MAINTENANCE OF CONCRETE PAVEMENTS.ppt
sreenath seenu
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptxRAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
JenTeruel1
Syntax Directed Definitions Synthesized Attributes and Inherited Attributes
Syntax Directed Definitions  Synthesized Attributes  and  Inherited AttributesSyntax Directed Definitions  Synthesized Attributes  and  Inherited Attributes
Syntax Directed Definitions Synthesized Attributes and Inherited Attributes
GunjalSanjay
Industrial Valves, Instruments Products Profile
Industrial Valves, Instruments Products ProfileIndustrial Valves, Instruments Products Profile
Industrial Valves, Instruments Products Profile
zebcoeng
Multi objective genetic approach with Ranking
Multi objective genetic approach with RankingMulti objective genetic approach with Ranking
Multi objective genetic approach with Ranking
namisha18
Turbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdfTurbocor Product and Technology Review.pdf
Turbocor Product and Technology Review.pdf
Totok Sulistiyanto
Best KNow Hydrogen Fuel Production in the World The cost in USD kwh for H2
Best KNow  Hydrogen Fuel Production in the World The cost in USD kwh for H2Best KNow  Hydrogen Fuel Production in the World The cost in USD kwh for H2
Best KNow Hydrogen Fuel Production in the World The cost in USD kwh for H2
Daniel Donatelli
GM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptxGM Meeting 070225 TO 130225 for 2024.pptx
GM Meeting 070225 TO 130225 for 2024.pptx
crdslalcomumbai
Mathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptx
Mathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptxMathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptx
Mathematics behind machine learning INT255 INT255__Unit 3__PPT-1.pptx
ppkmurthy2006
Wireless-Charger presentation for seminar .pdf
Wireless-Charger presentation for seminar .pdfWireless-Charger presentation for seminar .pdf
Wireless-Charger presentation for seminar .pdf
AbhinandanMishra30
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
15. Smart Cities Big Data, Civic Hackers, and the Quest for a New Utopia.pdf
NgocThang9
UNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptx
UNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptxUNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptx
UNIT 1FUNDAMENTALS OF OPERATING SYSTEMS.pptx
KesavanT10
TM-ASP-101-RF_Air Press manual crimping machine.pdf
TM-ASP-101-RF_Air Press manual crimping machine.pdfTM-ASP-101-RF_Air Press manual crimping machine.pdf
TM-ASP-101-RF_Air Press manual crimping machine.pdf
ChungLe60
decarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptxdecarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptx
gonzalezolabarriaped
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptxGROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
GROUP-3-GRID-CODE-AND-DISTRIBUTION-CODE.pptx
meneememoo
CS3451-OPERATING-SYSTEM NOTES ALL123.pdf
CS3451-OPERATING-SYSTEM NOTES ALL123.pdfCS3451-OPERATING-SYSTEM NOTES ALL123.pdf
CS3451-OPERATING-SYSTEM NOTES ALL123.pdf
PonniS7
decarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptxdecarbonization steel industry rev1.pptx
decarbonization steel industry rev1.pptx
gonzalezolabarriaped
AI, Tariffs and Supply Chains in Knowledge Graphs
AI, Tariffs and Supply Chains in Knowledge GraphsAI, Tariffs and Supply Chains in Knowledge Graphs
AI, Tariffs and Supply Chains in Knowledge Graphs
Max De Marzi
only history of java.pptx real bihind the name java
only history of java.pptx real bihind the name javaonly history of java.pptx real bihind the name java
only history of java.pptx real bihind the name java
mushtaqsaliq9
04 MAINTENANCE OF CONCRETE PAVEMENTS.ppt
04  MAINTENANCE OF CONCRETE PAVEMENTS.ppt04  MAINTENANCE OF CONCRETE PAVEMENTS.ppt
04 MAINTENANCE OF CONCRETE PAVEMENTS.ppt
sreenath seenu
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptxRAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
RAMSES- EDITORIAL SAMPLE FOR DSSPC C.pptx
JenTeruel1
Syntax Directed Definitions Synthesized Attributes and Inherited Attributes
Syntax Directed Definitions  Synthesized Attributes  and  Inherited AttributesSyntax Directed Definitions  Synthesized Attributes  and  Inherited Attributes
Syntax Directed Definitions Synthesized Attributes and Inherited Attributes
GunjalSanjay

Evolution of message brokers: from helpers to cores

  • 1. Evolution of message brokers. From helpers to cores. Artem Demchenkov
  • 2. 2 Artem Demchenkov CTO at Billie ardemchenkov@gmail.com https://www.linkedin.com/in/artem- demchenkov-76b69934/
  • 3. Billie We are an innovative financial platform, specialized on factoring. Some numbers: Start: 01.12.2016 Closed beta: 01.05.2017 Public launch: 01.06.2017 Team: 18 Engineering crew: 8
  • 4. is an intermediary program module that translates a message from the formal messaging protocol of the sender to the formal messaging protocol of the receiver. Boring, but necessary theoretical information 4 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Message-oriented middleware (MOM) is software or hardware infrastructure supporting sending and receiving messages between distributed systems. Message broker
  • 5. A Universe of Message Brokers 5 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 And more...
  • 7. Message broker is a helper on a side of an infrastructure 7 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Website RabbitMQ Consumer Past
  • 9. Message broker is a core element of an infrastructure. 9 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Message broker Internal tool Microservice Microservice Present
  • 10. Real-life example. Google Cloud Platform. Present 10 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017
  • 11. Use case 1. Synchronization of data between parts of a system 11 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Website Google Pub/Sub Salesforce Partner portal
  • 12. Distribution Values 12 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Allows getting rid of a central data storage. Each application can use an own one. Real-time task forwarding between different systems, responsible people or departments. Improves data consistency. Instantness Consistency
  • 13. Use case 2. Safe and secure triggering of microservices 13 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Backend Google Pub/Sub Microservice
  • 14. Values 14 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Safety You wont loose a message. Each message can be secured.Security
  • 15. Use case 3. Persistent data storage 15 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Backend Apache Kafka AWS Cloud Storage Google Cloud Storage Microsoft Azure Blob Storage
  • 16. Values 16 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Persistence You have a full set of historical data. You have a right to choose how to store data, where and in which format. Cloud storage services provide a permission management mechanism to secure data. Flexibility Security
  • 17. Use case 4. Log aggregation. Commit log 17 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Backend Apache Kafka Instance 1 Storage 1 Instance 2 Storage 2
  • 18. Values 18 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Replicability Message broker log allows replicating any state of a system at any moment in time You have an full set of historical data. Message broker log can be used by many different clients. Persistence Multifunctionality
  • 19. Use case 5. Log aggregation. Fulltext search 19 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Backend Apache Kafka Google Cloud Storage Elastic
  • 20. Use case 5. Log aggregation. Fulltext search 20 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Backend Apache Kafka Apache Solr Cloudera Hue
  • 21. Values 21 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Searchability Any information in the past could be found. Its relatively easy to detect wrong messages and define when and how it has been consumed. Discoverability
  • 22. Use case 6. Delayed messaging 22 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Website RabbitMQ External data provider
  • 23. Values 23 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Effectiveness Allows consuming a message at the most effective time. Saves traffic, memory usage and disk space.Thriftiness
  • 24. Use case 7. Multi-cloud application 24 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Google Cloud Storage Google Pub/Sub AWS Cloud Storage
  • 25. Values 25 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Distribution Allows synchronising data across applications running on other clouds. Allows backing up data across applications running on other clouds. Provides more flexibility in terms of choosing right services for an architecture. Security Variety
  • 27. Future 27 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Lets look again at the current situation.
  • 28. 28 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Google Pub/Sub RabbitMQ Apache Kafka My prediction is the following: soon projects will use more than one message broker, communicating to each other. Future
  • 29. 29 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Future Lets see in 3-4 years, whether I was right
  • 30. 30 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Future Conclusion
  • 31. 31 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 Because its there George Mallory - English mountaineer, answering a question why did he want to climb Everest. Made 3 attempts and died during the 3rd one in 1924. It is still a mystery whether he had reached the top of it or not.
  • 32. 32 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 If you dont know that something exists, you, probably, dont need it Tenzing Norgay - Nepali Sherpa mountaineer. One of the first two people reached the top of Everest in 1953.
  • 33. 33 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 No matter what youve seen in that presentation, think twice whether you product needs it Artem Demchenkov - CTO at Billie. I hope, successfully presented these slides on Codemotion Berlin 2017.
  • 34. Thank you ardemchenkov@gmail.com https://www.linkedin.com/in/artem- demchenkov-76b69934/
  • 35. We have just started, but there will be interesting: Check out our Billie Engineering Corner on Medium 35 Artem Demchenkov. Evolution of message brokers: from helpers to cores. Codemotion Berlin 2017 https://medium.com/billie-finanzratgeber/tagged/engineering