We are often asked to design for high availability, high scalability, and high throughput.The diagram below is a system design cheat sheet with common solutions.Jun 6, 20241Jun 6, 20241
SSO (Single Sign-On) explained.SSO can be thought of as a master key to open all different locks. It allows a user to log in to different systems using a single set of…Jun 5, 202419Jun 5, 202419
10 Good Coding Principles to improve code qualitySoftware development requires good system designs and coding standards. We list 10 good coding principles in the diagram below.Jun 4, 202418Jun 4, 202418
How do man-in-the-middle attacks work, and how do we prevent them?Man-in-the-middle (MiTM) attacks pose a significant threat to cybersecurity, involving unauthorized interception of communications between…Jun 3, 20248Jun 3, 20248
A cheat sheet for API designs.APIs expose business logic and data to external systems, so designing them securely and efficiently is important.Jun 2, 20245Jun 2, 20245
Have you heard of the 12-Factor App?The “12 Factor App” offers a set of best practices for building modern software applications. Following these 12 principles can help…May 30, 202418May 30, 202418
What are data processing systems, and how do they work?We each create thousands of data points every day. Expand this on a global scale: That’s petabytes or even exabytes of data!May 29, 202418May 29, 202418
How does DiT work?OpenAI’s #SORA took over the Internet when it was announced earlier this year. The technology behind Sora is the Diffusion Transformer…May 28, 202421May 28, 202421
In distributed systems How do we retry on failures?In distributed systems and networked applications, retry strategies are crucial for handling transient errors and network instability…May 27, 202420May 27, 202420