Articles Protecting Sensitive Data in Event-Sourced Systems with Crypto Shredding As opposed to more traditional systems where the state is persisted in a database and where CRUD operations are exposed to mutate...
Articles Convince your CTO to use Event Sourcing As software engineers, we have probably encountered situations where we needed to convince somebody to go with a particular...