-
-
-
Security architecture anti-patterns
Security architecture anti-patterns Six design patterns to avoid when designing computer systems.
-
Best practices for tagging your infrastructure and applications
Best practices for tagging your infrastructure and applications Tagging is essential to monitoring services and underlying...
-
Plumbing At Scale
Plumbing At Scale Event Sourcing and Stream Processing Pipelines at Grab. I like these kind of...
-
P2P Peer Discovery
P2P Peer Discovery A short article but still give out lot of useful information on how...
-
Design for failure - multiple layers of processing to protect against failures.
Design for failure - multiple layers of processing to protect against failures. When designing the architecture...
-
Algorithm for Drawing Trees
Algorithm for Drawing Trees Sound easy? Just Google for an algorithm to determine the X,Y position...
-
Memory Leaks Demystified
Memory Leaks Demystified It’s NodeJS but I think you can also learn about this devtools feature...
-
Pressure Based Anti-Spam for Discord Bots
Pressure Based Anti-Spam for Discord Bots This post is an effort to educate all the other...
-
Course: Anomaly Detection | Intel® AI Developer Program
Anomaly Detection This free course provides you with practical knowledge of the following skills. The theory...
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Learn how to design large-scale systems
Learn how to design large-scale systems System design is a broad topic. This repo is an...