Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Yes, event sourcing is just a loosely defined pattern. It does make tamper proofing a bit easier due to its log like nature. I know some systems do use physically "append-only" storage.


Do you have any more info on these RO storage systems? What springs to mind is... tape?!





Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: