Munaim NaeemWe are often asked to design for high availability, high scalability, and high throughput.The diagram below is a system design cheat sheet with common solutions.Jun 61Jun 61
Munaim NaeemSSO (Single Sign-On) explained.SSO can be thought of as a master key to open all different locks. It allows a user to log in to different systems using a single set of…Jun 519Jun 519
Munaim Naeem10 Good Coding Principles to improve code qualitySoftware development requires good system designs and coding standards. We list 10 good coding principles in the diagram below.Jun 420Jun 420
Munaim NaeemHow do man-in-the-middle attacks work, and how do we prevent them?Man-in-the-middle (MiTM) attacks pose a significant threat to cybersecurity, involving unauthorized interception of communications between…Jun 38Jun 38
Munaim NaeemA cheat sheet for API designs.APIs expose business logic and data to external systems, so designing them securely and efficiently is important.Jun 25Jun 25
Munaim NaeemHave you heard of the 12-Factor App?The “12 Factor App” offers a set of best practices for building modern software applications. Following these 12 principles can help…May 3019May 3019
Munaim NaeemWhat are data processing systems, and how do they work?We each create thousands of data points every day. Expand this on a global scale: That’s petabytes or even exabytes of data!May 2919May 2919
Munaim NaeemHow does DiT work?OpenAI’s #SORA took over the Internet when it was announced earlier this year. The technology behind Sora is the Diffusion Transformer…May 2822May 2822
Munaim NaeemIn distributed systems How do we retry on failures?In distributed systems and networked applications, retry strategies are crucial for handling transient errors and network instability…May 2722May 2722