#  @alexxubyte Alex Xu Alex Xu posts on X about ai, api, $googl, linkedin the most. They currently have [-------] followers and [---] posts still getting attention that total [------] engagements in the last [--] hours. ### Engagements: [------] [#](/creator/twitter::172200213/interactions)  - [--] Week [-------] +38% - [--] Month [-------] +169% - [--] Months [---------] -16% - [--] Year [---------] -53% ### Mentions: [--] [#](/creator/twitter::172200213/posts_active)  - [--] Week [--] +32% - [--] Month [--] +18% - [--] Months [---] +39% - [--] Year [---] +2.10% ### Followers: [-------] [#](/creator/twitter::172200213/followers)  - [--] Week [-------] +0.37% - [--] Month [-------] +0.73% - [--] Months [-------] +4.20% - [--] Year [-------] +11% ### CreatorRank: [-------] [#](/creator/twitter::172200213/influencer_rank)  ### Social Influence **Social category influence** [technology brands](/list/technology-brands) [stocks](/list/stocks) [social networks](/list/social-networks) [finance](/list/finance) [celebrities](/list/celebrities) [currencies](/list/currencies) [countries](/list/countries) [travel destinations](/list/travel-destinations) [exchanges](/list/exchanges) [products](/list/products) **Social topic influence** [ai](/topic/ai), [api](/topic/api), [$googl](/topic/$googl), [linkedin](/topic/linkedin), [azure](/topic/azure), [youtube](/topic/youtube), [pdf](/topic/pdf), [discord](/topic/discord), [meta](/topic/meta), [redis](/topic/redis) **Top assets mentioned** [Alphabet Inc Class A (GOOGL)](/topic/$googl) [Uber Technologies, Inc. (UBER)](/topic/$uber) [Cloudflare, Inc. (NET)](/topic/cloudflare) [Microsoft Corp. (MSFT)](/topic/microsoft) [Mastercard, Inc. (MA)](/topic/$ma) [Balancer (BAL)](/topic/balancer) [PayPal Holdings Inc (PYPL)](/topic/paypal) [IBM (IBM)](/topic/ibm) [MongoDB, Inc. (MDB)](/topic/mongodb) [WalletConnect Token (WCT)](/topic/wallet) [Shopify Inc (SHOP)](/topic/$shop) ### Top Social Posts Top posts by engagements in the last [--] hours "A content delivery network (CDN) refers to geographically distributed servers (also called edge servers) that provide fast delivery of static and dynamic content. Lets take a look at how it works" [X Link](https://x.com/alexxubyte/status/1496166227731181571) 2022-02-22T16:53Z 247.3K followers, [---] engagements "Many people asked about the table of contents for the System Design Interview (Volume 2). Here you go: Table Of Contents: Chapter 1: Proximity Service Chapter 2: Nearby Friends Chapter 3: Google Maps Chapter 4: Distributed Message Queue Chapter 5: Metrics Monitoring" [X Link](https://x.com/alexxubyte/status/1504120488842317829) 2022-03-16T15:40Z 247.4K followers, [----] engagements "Chapter 6: Ad Event Aggregation Chapter 7: Hotel Reservation Chapter 8: Distributed Email Service Chapter 9: S3-like Object Storage Chapter 10: Leaderboard Chapter 11: Payment System Chapter 12: Digital Wallet Chapter 13: Stock Exchange Link to the book: https://amzn.to/34G2vmC https://amzn.to/34G2vmC" [X Link](https://x.com/alexxubyte/status/1504120491371507712) 2022-03-16T15:40Z 247.4K followers, [---] engagements "Which cloud provider should be used when building a big data solution The diagram below illustrates the detailed comparison of AWS Google Cloud and Microsoft Azure. The common parts of the solutions: [--]. Data ingestion of structured or unstructured data. [--]. Raw data storage" [X Link](https://x.com/alexxubyte/status/1512098191134519297) 2022-04-07T16:01Z 248.1K followers, [----] engagements "What are the differences between Virtualization (VMware) and Containerization (Docker) The diagram below illustrates the layered architecture of virtualization and containerization" [X Link](https://x.com/alexxubyte/status/1512453102380908546) 2022-04-08T15:31Z 261.4K followers, [---] engagements "@YirenLu We dealt with the same issue a while ago and settled with the following workflow: 1). Save Google Docs as .docx locally 2). Convert .docx to .mdx using pandoc with filters to adjust the markdown output. 3). Adjust images and code blocks manually. It works relatively well" [X Link](https://x.com/alexxubyte/status/1526701856826699778) 2022-05-17T23:11Z 275.7K followers, [--] engagements "Evolution of the Netflix API architecture. The Netflix API architecture went through [--] main stages. . The application is packaged and deployed as a monolith such as a single Java WAR file Rails app etc. Most startups begin with a monolith architecture" [X Link](https://x.com/alexxubyte/status/1529489377432199168) 2022-05-25T15:47Z 251.6K followers, [----] engagements "🔹Step 2: The third-party processor generates ACH files on behalf of the originator. The files are uploaded to an SFTP established by the ODFI. This should be done by the [--] PM cut-off time as specified by the ODFI bank" [X Link](https://x.com/alexxubyte/status/1552673205059342336) 2022-07-28T15:11Z 247.4K followers, [--] engagements "Evolution of Airbnbs microservice architecture. This post is based on a tech talk. Check out the reference link at the end of the thread to read more. Help me reach 100k this week (System Design Newsletter currently at 97160). Subscribe here: https://bit.ly/3FEGliw https://bit.ly/3FEGliw" [X Link](https://x.com/alexxubyte/status/1554494678937915394) 2022-08-02T15:49Z 274.1K followers, [----] engagements "+ (2020 - present) This is what Airbnb is working on now. The micro and macroservice hybrid model focuses on the unification of APIs" [X Link](https://x.com/alexxubyte/status/1554494718498590720) 2022-08-02T15:49Z 274.2K followers, [--] engagements "Over to you - why do you think both Airbnb and Netflix use GraphQL Reference: https://www.infoq.com/presentations/airbnb-culture-soa/ https://www.infoq.com/presentations/airbnb-culture-soa/" [X Link](https://x.com/alexxubyte/status/1554494730280378368) 2022-08-02T15:49Z 274.1K followers, [--] engagements "/1 Why is single-threaded Redis so fast There are [--] main reasons as shown in the diagram below. If you prefer video you can watch our YouTube video here If you prefer text keep reading: https://bit.ly/3QlWFti https://bit.ly/3QlWFti" [X Link](https://x.com/alexxubyte/status/1557392597395443712) 2022-08-10T15:45Z 250.2K followers, [----] engagements "/1 How to explain to a 10-year-old what all the symbols/numbers on the smart credit card mean Do you know that smart credit cards have ISO standards Lets take a look:" [X Link](https://x.com/alexxubyte/status/1562462331572957184) 2022-08-24T15:30Z 253.2K followers, [---] engagements "/1 How do Apple Pay and Google Pay handle sensitive card info The diagram below shows the differences. Both approaches are very secure but the implementations are different. To understand the difference we break down the process into two flows" [X Link](https://x.com/alexxubyte/status/1572614943811440642) 2022-09-21T15:53Z 247.4K followers, 59.7K engagements "6/ [--]. NPCI acts as a switch between acquiring banks and issuing banks. It resolves the account detail from VPA with different issuing banks. [--]. Bob authenticates with account details and sets the PIN which is used for 2FA. This goes all the way to the issuing bank" [X Link](https://x.com/alexxubyte/status/1572966567197159425) 2022-09-22T15:10Z 247.4K followers, [---] engagements "/1 What is (Content Delivery Network) How does CDN make content delivery The diagram below shows why A CDN refers to geographically distributed servers (edge servers) that provide fast delivery of" [X Link](https://x.com/alexxubyte/status/1574426102256218112) 2022-09-26T15:50Z 247.4K followers, [----] engagements "/1 One picture is worth a thousand words. Interesting database selection trees. iQIYI is one of the largest online video sites in the world with over [---] million monthly active users. Let's look at how they choose relational and NoSQL databases" [X Link](https://x.com/alexxubyte/status/1576961080454021121) 2022-10-03T15:43Z 276.8K followers, [----] engagements "/3 - Big data analytical systems like Hive and Impala - Other databases like MongoDB HiGraph and TiKV The database selection trees below explain how they choose a database" [X Link](https://x.com/alexxubyte/status/1576961092688879616) 2022-10-03T15:43Z 247.7K followers, [--] engagements "/1 How will you design the Stack Overflow website If your answer is on-premise servers and monolith (bottom) you would likely fail the interview but that's how it is built in reality" [X Link](https://x.com/alexxubyte/status/1577684758779203584) 2022-10-05T15:38Z 251.7K followers, [----] engagements "/3 🔸Steps 2-5: The acquiring process. The payment gateway accepts the transaction and collects payment info. It is then sent to a payment processor which uses customer information to collect payments. The acquiring processor sends the transaction to the card network" [X Link](https://x.com/alexxubyte/status/1580585439722815488) 2022-10-13T15:45Z 247.3K followers, [--] engagements "/1 Have you heard of Domain-Driven Design (DDD) a major software design approach" [X Link](https://x.com/alexxubyte/status/1590017628378046466) 2022-11-08T16:25Z 277.6K followers, [----] engagements "Many people love GraphQL many people hate it. How about you In this video we talk about: - What is GraphQL - When to use it - Trade-offs - GraphQL vs. REST Watch the YouTube video now: https://www.youtube.com/watchv=yWzKJPw_VzM https://www.youtube.com/watchv=yWzKJPw_VzM" [X Link](https://x.com/alexxubyte/status/1590744265667203077) 2022-11-10T16:32Z 273.8K followers, [----] engagements "/4 [--]. The Gmail server stores the email and makes it available to Bob the recipient. [--]. Gmail client fetches new emails through the IMAP/POP server when Bob logs in to Gmail" [X Link](https://x.com/alexxubyte/status/1593637920266629122) 2022-11-18T16:11Z 247.6K followers, [--] engagements "/5 If you are unfamiliar with email protocols here is a short summary: SMTP: Simple Mail Transfer Protocol (SMTP) is the standard protocol for sending emails from one mail server to another" [X Link](https://x.com/alexxubyte/status/1593637924007837696) 2022-11-18T16:11Z 247.5K followers, [--] engagements "Twitter Architecture [----] vs. [----]. Whats changed over the past [--] years Thank you @elonmusk for the transparency. 1/2" [X Link](https://x.com/alexxubyte/status/1594008281340530688) 2022-11-19T16:42Z 249.3K followers, 38.8K engagements "What is a CDN Why should we developers all take advantage of it In this video we will talk about what CDN is and the benefits of CDN including: - Improving latency - Reducing bandwidth - Increasing content availability - DDoS protection Watch it https://www.youtube.com/watchv=RI9np1LWzqw https://www.youtube.com/watchv=RI9np1LWzqw" [X Link](https://x.com/alexxubyte/status/1597635214565466112) 2022-11-29T16:54Z 247.4K followers, [----] engagements "1/ What are the differences between monolithic and microservice architecture The diagram compares monolithic and microservice architecture in the ideal world" [X Link](https://x.com/alexxubyte/status/1597995132770406400) 2022-11-30T16:45Z 269.3K followers, [----] engagements "/1 How do you decide which type of database to use There are hundreds or even thousands of databases available today such as Oracle MySQL MariaDB SQLite PostgreSQL Redis ClickHouse MongoDB S3 Ceph etc. How do you select the architecture for your system" [X Link](https://x.com/alexxubyte/status/1600528222390669315) 2022-12-07T16:30Z 272.5K followers, [----] engagements "/1 What is a DDos (Distributed Denial-of-Service) Attack Why is it hazardous to the services Here is an example of how DDoS works" [X Link](https://x.com/alexxubyte/status/1603793341597945857) 2022-12-16T16:45Z 251K followers, 108.7K engagements "/1 What is cloud-native Below is a diagram showing the evolution of architecture and processes since the 1980s. Organizations can build and run scalable applications on public private and hybrid clouds using cloud-native technologies" [X Link](https://x.com/alexxubyte/status/1607417223840411652) 2022-12-26T16:45Z 275.4K followers, 235.7K engagements "Really cool thread about many concepts about the cloud: - IaaS CaaS PaaS FaaS SaaS - Benefits of Cloud Computing - Migrating applications to cloud & modernizing applications - Benefits and use cases of storage in cloud - Object store Block store File store - and more. I have been in cloud tech for 10+ years. Here are some basic concepts that everyone in or aspiring to be in cloud should know Read on 👇 I have been in cloud tech for 10+ years. Here are some basic concepts that everyone in or aspiring to be in cloud should know Read on 👇" [X Link](https://x.com/alexxubyte/status/1613780611877203968) 2023-01-13T06:10Z 270.2K followers, 19.9K engagements "/6 Step 6-8. Bob now pays the $25 down payment to BNPL. Stripe processes the payment transaction. It is then forwarded to the card network by Stripe. The card network must be paid an interchange fee since this goes through them as well" [X Link](https://x.com/alexxubyte/status/1618640110609895424) 2023-01-26T16:00Z 275.1K followers, [----] engagements "/7 Step [--]. Bob can now receive the product since it has been released. Steps 10-11. The BNPL provider receives installment payments from Bob every two weeks. Payment gateways process installments by deducting them from credit/debit cards" [X Link](https://x.com/alexxubyte/status/1618640119828996098) 2023-01-26T16:00Z 275.2K followers, [----] engagements "Next week we will cover: 🔹System Design Interview - Step-by-Step Guide (YT) 🔹Git workflow 🔹Why is Redis fast 🔹API gateway vs. load balancer 🔹Considerations when using cache Subscribe to our weekly free newsletter to learn something new every week: https://bit.ly/3FEGliw https://bit.ly/3FEGliw" [X Link](https://x.com/alexxubyte/status/1621912747465396224) 2023-02-04T16:45Z 247.4K followers, 173.4K engagements "/1 Git Workflow & Immutability Immutability here means that once data is written into Git it cannot be changed. Modifications only create new data versions. The old data remains unchanged" [X Link](https://x.com/alexxubyte/status/1622637514833166336) 2023-02-06T16:45Z 246K followers, 90.6K engagements "ChatGPT Jasper AI copy ai How are AI writers different The diagram below shows how we can use popular AI writers. In general the tools cover the workflow of copywriting and content creation. They can choose topics write content and optimize the content" [X Link](https://x.com/alexxubyte/status/1624087065095991296) 2023-02-10T16:45Z 247.3K followers, 121.2K engagements "Most people think Redis is just for caching. But it can do so much more than that. Redis is good for: - Session store - Distributed lock - Counter - Rate limiter - Ranking/leaderboard - etc. Watch and subscribe here: https://youtu.be/a4yX7RUgTxI https://youtu.be/a4yX7RUgTxI" [X Link](https://x.com/alexxubyte/status/1626258379185467392) 2023-02-16T16:33Z 250.2K followers, 148.2K engagements "/7 When a third-party payment service is done it notifies the payment service if the payment is successful or failed. Webhook calls are usually part of the systems state machine" [X Link](https://x.com/alexxubyte/status/1630247783549509633) 2023-02-27T16:45Z 247.4K followers, 12.1K engagements "/8 🔹 [--]. gRPC Released in [----] gRPC is used for communications among microservices. 🔹 [--]. SOAP SOAP stands for Simple Object Access Protocol. Its payload is XML only suitable for communications between internal systems" [X Link](https://x.com/alexxubyte/status/1630247799362027522) 2023-02-27T16:45Z 247.4K followers, [--] engagements "/1 Which SQL statements are most commonly used A database consists of three types of objects: - Database - Table - Index Each object type has four operations (known as CRUD): - Create - Read - Update - Delete" [X Link](https://x.com/alexxubyte/status/1641828965605326848) 2023-03-31T15:45Z 247.4K followers, 85K engagements "/2 Therefore there are a total of [--] categories of SQL statements. Some categories have been excluded from the graph because they are less commonly used. It is highly recommended that you become familiar with the remaining categories" [X Link](https://x.com/alexxubyte/status/1641828976862846976) 2023-03-31T15:45Z 247.3K followers, [----] engagements "/4 The build config minimizes the build requirement including language versioning dependencies major versions and lastly how to resolve version conflicts" [X Link](https://x.com/alexxubyte/status/1647989569885974528) 2023-04-17T15:45Z 276K followers, [----] engagements "/5 For local builds the Brazil build tool interprets the build configuration as a Directed Acyclic Graph (DAG) retrieves packages from the myservices private space (VersionSet) called myservice-cpp-version-set generates the language-specific build configuration" [X Link](https://x.com/alexxubyte/status/1647989577796435970) 2023-04-17T15:45Z 276K followers, [----] engagements "System Design Blueprint: The Ultimate Guide. Hope this checklist is useful to guide your discussions during the interview process. This briefly touches on: - LB - Gateway - Communication - CDN - Database - Cache - MQ - ID Generation - Scalability - Availability - More" [X Link](https://x.com/alexxubyte/status/1649076729070383104) 2023-04-20T15:45Z 248.1K followers, 245.3K engagements "/2 🔹 When we swipe a credit/debit card at a merchant it is a pull payment where the money is sent from the cardholder to the merchant. The merchant pulls money from the cardholders account and the cardholder approves the transaction" [X Link](https://x.com/alexxubyte/status/1659223586299871233) 2023-05-18T15:45Z 238K followers, [----] engagements "/3 🔹 With Visa Direct or Mastercard Send the push payments enable merchant corporate and government disbursements. Step 1: The merchant initiates the push payment through a digital channel. It can be a mobile phone or a bank branch etc" [X Link](https://x.com/alexxubyte/status/1659223592796848128) 2023-05-18T15:45Z 237.7K followers, [----] engagements "/6 Push payments are indeed an interesting innovation which complements the digital wallet strategy in Visa and Mastercard. The abstraction of account masks the complication of different funding or consuming channels" [X Link](https://x.com/alexxubyte/status/1659223610668765184) 2023-05-18T15:45Z 221.4K followers, [--] engagements "What is the journey of a Slack message In a recent technical article Slack explains how its real-time messaging framework works. Here is my short summary: 🔹Because there are too many channels the Channel Server (CS) uses consistent hashing to allocate millions of channels to many channel servers. 🔹Slack messages are delivered through WebApp and Admin Server to the correct Channel Server. 🔹Through Gate Server and Envoy (a proxy) the Channel Server will push messages to message receivers. 🔹Message receivers use WebSocket which is a bi-directional messaging mechanism so they are able to" [X Link](https://x.com/alexxubyte/status/1661395234729922560) 2023-05-24T15:34Z 235.7K followers, 69.3K engagements "Vector databases are so hot right now but what is a Vector DB The diagram below shows a comparison between a vector database and other types of databases. 🔹 A vector database indexes and stores vector embeddings for fast retrieval and similarity search with capabilities like CRUD operations metadata filtering and horizontal scaling. 🔹 Recent advances in AGI (Artificial General Intelligence) have made vector databases so popular. 🔹 A vector database stores high-dimensional vectors extracted from various unstructured data like audio video image and text. Then we can calculate the similarity" [X Link](https://x.com/alexxubyte/status/1666827033173958657) 2023-06-08T15:18Z 221.4K followers, 148.9K engagements "How Discord Stores 1000000000000s Of Messages The diagram below shows the evolution of message storage at Discord. MongoDB ➡ Cassandra ➡ ScyllaDB We have created a YouTube video that delves deep into it. Watch and subscribe here: https://www.youtube.com/watchv=O3PwuzCvAjI https://www.youtube.com/watchv=O3PwuzCvAjI" [X Link](https://x.com/alexxubyte/status/1670475891061948416) 2023-06-18T16:57Z 236K followers, 192.3K engagements "Twitter [---] Tech Stack Mobile: Swift Kotlin PWA Web: JS React Redux Services: Mesos Finagle Caching: Pelikan Cache Redis Databases: Manhattan MySQL PostgreSQL . Based on Twitter engineering blogs. @elonmusk when will Twitter [---] tech stack be available" [X Link](https://x.com/alexxubyte/status/1673719097492918274) 2023-06-27T15:45Z 235.7K followers, 129.6K engagements "OAuth [---] is an industry-standard protocol for authorization but few know how it works In this video we will delve into: - What Oauth2 is really about - How it works Watch and subscribe here: https://youtu.be/ZV5yTm4pT8g https://youtu.be/ZV5yTm4pT8g" [X Link](https://x.com/alexxubyte/status/1674440597363621888) 2023-06-29T15:32Z 241.8K followers, 140.8K engagements "We are considering offering one of the following options in the future related to System Design. Which one are you most interested in" [X Link](https://x.com/alexxubyte/status/1678069467665039360) 2023-07-09T20:48Z 221.4K followers, 21.6K engagements "Top architectural styles In software development architecture plays a crucial role in shaping the structure and behavior of software systems. It provides a blueprint for system design detailing how components interact with each other to deliver specific functionality. They also offer solutions to common problems saving time and effort and leading to more robust and maintainable systems. However with the vast array of architectural styles and patterns available it can take time to discern which approach best suits a particular project or system. Aims to shed light on these concepts helping you" [X Link](https://x.com/alexxubyte/status/1678423147496996865) 2023-07-10T15:17Z 247.4K followers, 307.7K engagements "Firewall explained to Kids and Adults. A firewall is a network security system that controls and filters network traffic acting as a watchman between a private network and the public Internet. They come in two broad categories: Software-based: installed on individual devices for protection Hardware-based: stand-alone devices that safeguard an entire network. Firewalls have several types each designed for specific security needs: [--]. Packet Filtering Firewalls: Examines packets of data accepting or rejecting based on source destination or protocols. [--]. Circuit-level Gateways: Monitors TCP" [X Link](https://x.com/alexxubyte/status/1678785303644090368) 2023-07-11T15:16Z 221.4K followers, 123.6K engagements "Top [--] most commonly used Server Types. [--]. Web Server: Hosts websites and delivers web content to clients over the internet [--]. Mail Server: Handles the sending receiving and routing of emails across networks [--]. DNS Server: Translates domain names (like bytebytego .com) into" [X Link](https://x.com/alexxubyte/status/1681317708745564163) 2023-07-19T01:30Z 221.3K followers, 190.5K engagements "5 important components of Linux 🔹 System In the system component we need to learn modules like system APIs device drivers I/O buses etc. 🔹 Memory In memory management we need to learn modules like physical memory virtual memory memory mappings object allocation etc" [X Link](https://x.com/alexxubyte/status/1682400585956593665) 2023-07-30T06:48Z 221.4K followers, 165.4K engagements "JPMorgan Wells Fargo and other major banks will use the new Federal Reserve's 'FedNow' instant payment system. Let's take a look at how it works. Federal Reserve launched FedNow instant payment service on [--] Jul. It allows retail clients to send and receive money within" [X Link](https://x.com/alexxubyte/status/1683485723637186560) 2023-08-03T17:27Z 221.4K followers, 262K engagements "Top [--] Ways to 10x Your API Performance [--]. Pagination This is a common optimization when the size of the result is large. The results are streaming back to the client to improve the service responsiveness. [--]. Asynchronous Logging Synchronous logging deals with the disk for every" [X Link](https://x.com/alexxubyte/status/1684595145101189120) 2023-08-05T02:22Z 221.3K followers, 242.8K engagements "An interesting list of subjects that should be mandatory in schools. While academics are essential it's crucial to acknowledge that many elements in this diagram would have been beneficial to learn earlier. Over to you: what else should be on the list What are the top 3" [X Link](https://x.com/alexxubyte/status/1684942359681957888) 2023-07-28T15:02Z 221.4K followers, 104.2K engagements "What does API gateway do The diagram below shows the detail. Step [--] - The client sends an HTTP request to the API gateway. Step [--] - The API gateway parses and validates the attributes in the HTTP request. Step [--] - The API gateway performs allow-list/deny-list checks. Step [--] - The API gateway talks to an identity provider for authentication and authorization. Step [--] - The rate limiting rules are applied to the request. If it is over the limit the request is rejected. Steps [--] and [--] - Now that the request has passed basic checks the API gateway finds the relevant service to route to by path" [X Link](https://x.com/alexxubyte/status/1685311840136609792) 2023-07-29T15:30Z 221.3K followers, 297.5K engagements "My LinkedIn account has been locked. Im not sure whats going on and received no email alert. I have uploaded my ID already. Can someone work there help me take a look" [X Link](https://x.com/alexxubyte/status/1686000329580773376) 2023-07-31T17:49Z 221.3K followers, 92.5K engagements "CI/CD Pipeline Explained to Kids Section [--] - SDLC with CI/CD The software development life cycle (SDLC) consists of several key stages: development testing deployment and maintenance. CI/CD automates and integrates these stages to enable faster more reliable releases. When code is pushed to a git repository it triggers an automated build and test process. End-to-end (e2e) test cases are run to validate the code. If tests pass the code can be automatically deployed to staging/production. If issues are found the code is sent back to development for bug fixing. This automation provides fast" [X Link](https://x.com/alexxubyte/status/1686394081440849920) 2023-08-01T15:10Z 248.1K followers, 387.9K engagements "Docker vs. Kubernetes. Which one should we use What is Docker Docker is an open-source platform that allows you to package distribute and run applications in isolated containers. It focuses on containerization providing lightweight environments that encapsulate applications and their dependencies. What is Kubernetes Kubernetes often referred to as K8s is an open-source container orchestration platform. It provides a framework for automating the deployment scaling and management of containerized applications across a cluster of nodes. How are both different from each other Docker: Docker" [X Link](https://x.com/alexxubyte/status/1686757473808691200) 2023-08-02T15:14Z 221.3K followers, 276.1K engagements "Cloud Native Anti Patterns By being aware of these anti-patterns and following cloud-native best practices you can design build and operate more robust scalable and cost-efficient cloud-native applications. [--]. Monolithic Architecture: One large tightly coupled application running on the cloud hindering scalability and agility [--]. Ignoring Cost Optimization: Cloud services can be expensive and not optimizing costs can result in budget overruns [--]. Mutable Infrastructure: - Infrastructure components are to be treated as disposable and are never modified in place - Failing to embrace this approach" [X Link](https://x.com/alexxubyte/status/1687121230221201409) 2023-08-03T15:20Z 221.3K followers, 159.3K engagements "What is GraphQL Is it a replacement for the REST API The diagram below shows the quick comparison between REST and GraphQL. 🔹GraphQL is a query language for APIs developed by Meta. It provides a complete description of the data in the API and gives clients the power to ask for exactly what they need. 🔹GraphQL servers sit in between the client and the backend services. 🔹GraphQL can aggregate multiple REST requests into one query. GraphQL server organizes the resources in a graph. 🔹GraphQL supports queries mutations (applying data modifications to resources) and subscriptions (receiving" [X Link](https://x.com/alexxubyte/status/1687480822046351361) 2023-08-04T15:09Z 221.4K followers, 194.5K engagements "Next week we will talk about the following: - Git Merge vs. Rebase vs. Squash - the forever workflow debate - Hidden costs of using the cloud - How Chrome works - Uber's CI/CD pipeline - How HTTPS works Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1687854181217173504) 2023-08-05T15:52Z 221.4K followers, 81.2K engagements "OAuth [---] Explained With Simple Terms. OAuth [---] is a powerful and secure framework that allows different applications to securely interact with each other on behalf of users without sharing sensitive credentials. The entities involved in OAuth are the User the Server and the Identity Provider (IDP). What Can an OAuth Token Do When you use OAuth you get an OAuth token that represents your identity and permissions. This token can do a few important things: Single Sign-On (SSO): With an OAuth token you can log into multiple services or apps using just one login making life easier and safer." [X Link](https://x.com/alexxubyte/status/1688566454722183168) 2023-08-07T15:03Z 221.3K followers, 452.8K engagements "Uber CI/CD Tech Stack Uber is one of the most innovative companies in the engineering field. Lets take a closer look at their CI/CD tech stacks. This post is based on research on Uber engineering blogs. If you spot any inaccuracies please let us know. Project planning:" [X Link](https://x.com/alexxubyte/status/1688922816056590336) 2023-08-08T14:39Z 221.3K followers, [----] engagements "Top [--] Forms of Authentication Mechanisms [--]. SSH Keys: Cryptographic keys are used to access remote systems and servers securely [--]. OAuth Tokens: Tokens that provide limited access to user data on third-party applications [--]. SSL Certificates: Digital certificates ensure secure and encrypted communication between servers and clients [--]. Credentials: User authentication information is used to verify and grant access to various systems and services Over to you: How do you manage those security keys Is it a good idea to put them in a GitHub repository Subscribe to our weekly newsletter to get a" [X Link](https://x.com/alexxubyte/status/1689294595677720576) 2023-08-09T15:16Z 221.3K followers, 388.4K engagements "Git Merge vs. Rebase vs. Squash Commit What are the differences When we from one Git branch to another we can use git merge or git rebase. The diagram below shows how the two commands work. This creates a new commit G in the main branch. G ties the histories of both main and feature branches. Git merge is -. Neither the main nor the feature branch is changed. Git rebase moves the feature branch histories to the head of the main branch. It creates new commits E F and G for each commit in the feature branch. The benefit of rebase is that it has . Rebase can be dangerous if the golden rule" [X Link](https://x.com/alexxubyte/status/1689663569326219266) 2023-08-10T15:42Z 221.4K followers, 258.5K engagements "Leadership Styles Around The World Do you agree with the diagram Credit: When cultures collide book Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1690026551059087360) 2023-08-11T15:45Z 221.3K followers, 100.9K engagements "Our system design newsletter recently reached 500k subscribers. Here are the [--] most popular ones: 👇 - Understanding Database Types - Password Session Cookie Token JWT SSO OAuth - Authentication Explained - Part [--] - Database Indexing Strategies - Mastering the Art of API Design - Password Session Cookie Token JWT SSO OAuth - Authentication Explained - Part [--] Subscribe here:" [X Link](https://x.com/alexxubyte/status/1690386803835240448) 2023-08-12T15:36Z 221.4K followers, 153.2K engagements "How Discord Stores Trillions Of Messages . . The diagram below shows the evolution of message storage at Discord: MongoDB ➡ Cassandra ➡ ScyllaDB In [----] the first version of Discord was built on top of a single MongoDB replica. Around Nov [----] MongoDB stored [---] million messages and the RAM couldnt hold the data and index any longer. The latency became unpredictable. Message storage needs to be moved to another database. Cassandra was chosen. In [----] Discord had [--] Cassandra nodes and stored billions of messages. At the beginning of [----] it had [---] nodes with trillions of messages. At this" [X Link](https://x.com/alexxubyte/status/1690749934818185216) 2023-08-13T15:39Z 221.4K followers, 234.3K engagements "A cheat sheet of various databases in cloud services along with their corresponding open-source/3rd-party options. Choosing the right database for your project is a complex task. The multitude of database options each suited to distinct use cases can quickly lead to decision fatigue. We hope this cheat sheet provides the high level direction to pinpoint the right service that aligns with your project's needs and avoid potential pitfalls. Note: Google has limited documentation for their database use cases. Even though we did our best to look at what was available and arrived at the best option" [X Link](https://x.com/alexxubyte/status/1691108223175299072) 2023-08-14T15:23Z 221.4K followers, 202.5K engagements "How does Chrome work The diagram below shows the architecture of a modern browser. It is based on our understanding of Inside look at modern web browser published by the chrome team. There are in general [--] processes: browser process renderer process GPU process and plugin process. 🔹 Browser process controls address bar bookmarks back and forward buttons etc. 🔹 Renderer process controls anything inside of the tab where a website is displayed. 🔹 GPU process handles GPU tasks. 🔹 Plugin process controls the plugins used by the websites. The browser process coordinates with other processes." [X Link](https://x.com/alexxubyte/status/1691471011085172737) 2023-08-15T15:24Z 221.4K followers, 107.3K engagements "HTTPS SSL Handshake and Data Encryption Explained to Kids. HTTPS: Safeguards your data from eavesdroppers and breaches. Understand how encryption and digital certificates create an impregnable shield. SSL Handshake: Behind the Scenes Witness the cryptographic protocols that establish a secure connection. Experience the intricate exchange of keys and negotiation. Secure Data Transmission: Navigating the Tunnel Journey through the encrypted tunnel forged by HTTPS. Learn how your information travels while shielded from cyber threats. HTML's Role: Peek into HTML's role in structuring the web." [X Link](https://x.com/alexxubyte/status/1691834301791486022) 2023-08-16T15:28Z 221.4K followers, 277.5K engagements "Top [--] Load Balancing Algorithms Every Developer Should Know The diagram below shows [--] common algorithms. 🔹 Static Algorithms [--]. Round robin The client requests are sent to different service instances in sequential order. The services are usually required to be stateless. [--]. Sticky round-robin This is an improvement of the round-robin algorithm. If Alices first request goes to service A the following requests go to service A as well. [--]. Weighted round-robin The admin can specify the weight for each service. The ones with a higher weight handle more requests than others. [--]. Hash This algorithm" [X Link](https://x.com/alexxubyte/status/1692198997312885041) 2023-08-17T15:37Z 221.3K followers, 136.4K engagements "HTTP [---] - HTTP [---] - HTTP [---] - HTTP [---] (QUIC). What problem does each generation of HTTP solve The diagram below illustrates the key features. 🔹HTTP [---] was finalized and fully documented in [----]. Every request to the same server requires a separate TCP connection. 🔹HTTP [---] was published in [----]. A TCP connection can be left open for reuse (persistent connection) but it doesnt solve the HOL (head-of-line) blocking issue. HOL blocking - when the number of allowed parallel requests in the browser is used up subsequent requests need to wait for the former ones to complete. 🔹HTTP [---] was" [X Link](https://x.com/alexxubyte/status/1692560840853962987) 2023-08-18T15:35Z 221.4K followers, 247K engagements "IaaS PaaS Cloud Native How do we get here The diagram below shows two decades of cloud evolution. [----] - VMWare - Virtualization via hypervisor [----] - AWS - IaaS (Infrastructure as a Service) [----] - Heroku - PaaS (Platform as a Service) [----] - OpenStack - Open-source IaaS [----] - CloudFoundry - Open-source PaaS [----] - Docker - Containers [----] - CNCF (Cloud Native Computing Foundation) - Cloud Native 🔹 Over to you: Which ones have you used Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1693645941629489373) 2023-08-21T15:27Z 221.4K followers, 203.9K engagements "How did AWS grow from just a few services in [----] to over [---] fully-featured services Let's take a look. Since [----] it has become a cloud computing leader offering foundational infrastructure platforms and advanced capabilities like serverless computing and AI. This expansion empowered innovation allowing complex applications without extensive hardware management. AWS also explored edge and quantum computing staying at tech's forefront. This evolution mirrors cloud computing's shift from niche to essential benefiting global businesses with efficiency and scalability Happy to present the" [X Link](https://x.com/alexxubyte/status/1694004279819075784) 2023-08-22T15:11Z 221.4K followers, 134K engagements "Hidden Costs of the Cloud: The biggest misconception about the cloud is that it's cheap. While it may be inexpensive or even free to get started the complexity often leads to hidden costs resulting in large cloud bills. The purpose of this post is not to discourage using the cloud. Im a big fan of the cloud. I simply want to raise awareness about this issue as it's one of the critical topics that isn't often discussed. While AWS is used as an example similar cost structures apply to other cloud providers. [--]. Free Tier Ambiguity: AWS offers three different types of free offerings for common" [X Link](https://x.com/alexxubyte/status/1694369249618440609) 2023-08-23T15:21Z 249.5K followers, 124K engagements "Algorithms You Should Know Before You Take System Design Interviews These algorithms arent just useful for acing system design interviews - theyre also great tools for building real-world systems. We made a video on this topic. The video contains an updated list and provides real-world case studies. Watch here:" [X Link](https://x.com/alexxubyte/status/1694735702007955862) 2023-08-24T15:37Z 221.3K followers, 131.4K engagements "It is still tough to get interviews. People are getting creative with their resumes. This resume is created using Figma. Do you think it will grab recruiters/hiring managers attention Resume credit: Aditya Sharma on LinkedIn Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1695093718221783400) 2023-08-25T15:20Z 221.4K followers, 49.9K engagements "Understanding Database Types To make the best decision for our projects it is essential to understand the various types of databases available in the market. We need to consider key characteristics of different database types including popular options for each and compare their use cases. Subscribe to our weekly newsletter to get a Free System Design PDF (158" [X Link](https://x.com/alexxubyte/status/1695460789447188533) 2023-08-26T15:38Z 221.4K followers, 99.1K engagements "URL URI URN - What are the differences The diagram below shows a comparison of URL URI and URN. 🔹 URI URI stands for Uniform Resource Identifier. It identifies a logical or physical resource on the web. URL and URN are subtypes of URI. URL locates a resource while URN names a resource. A URI is composed of the following parts: scheme://authoritypathquery# fragment 🔹 URL URL stands for Uniform Resource Locator the key concept of HTTP. It is the address of a unique resource on the web. It can be used with other protocols like FTP and JDBC. 🔹 URN URN stands for Uniform Resource Name. It uses" [X Link](https://x.com/alexxubyte/status/1695825224019943714) 2023-08-27T15:46Z 221.3K followers, 181.2K engagements "OAuth [---] Flows Authorization Code Flow: The most common OAuth flow. After user authentication the client receives an authorization code and exchanges it for an access token and refresh token. Client Credentials Flow: Designed for single-page applications. The access token is returned directly to the client without an intermediate authorization code. Implicit Code Flow: Designed for single-page applications. The access token is returned directly to the client without an intermediate authorization code. Resource Owner Password Grant Flow: Allows users to provide their username and password" [X Link](https://x.com/alexxubyte/status/1696180531266715815) 2023-08-28T15:18Z 221.3K followers, 171.9K engagements "How does a Password Manager such as 1Password or Lastpass work How does it keep our passwords safe The diagram below shows how a typical password manager works. A password manager generates and stores passwords for us. We can use it via application browser extension or command line. Not only does a password manager store passwords for individuals but also it supports password management for teams in small businesses and big enterprises. Lets go through the steps. Step 1: When we sign up for a password manager we enter our email address and set up an account password. The password manager" [X Link](https://x.com/alexxubyte/status/1696547493251870740) 2023-08-29T15:36Z 221.3K followers, 235.8K engagements "Types of Software Engineers and Their Typically Required Skills In this overview we'll explore three key types of Software engineers: [--]. Front-End Engineer: Specializes in creating user interfaces using HTML CSS and JavaScript. They focus on ensuring that apps are visually" [X Link](https://x.com/alexxubyte/status/1696907077753692467) 2023-08-30T15:25Z 221.4K followers, [----] engagements "Top [--] Software Architectural Patterns In software development architecture plays a crucial role in shaping the structure and behavior of software systems. It provides a blueprint for system design detailing how components interact with each other to deliver specific functionality. They also offer solutions to common problems saving time and effort and leading to more robust and maintainable systems. However with the vast array of architectural styles and patterns available it can take time to discern which approach best suits a particular project or system. Aims to shed light on these" [X Link](https://x.com/alexxubyte/status/1697271379371164039) 2023-08-31T15:33Z 221.4K followers, 108.4K engagements "How to design secure web API access for your website When we open web API access to users we need to make sure each API call is authenticated. This means the user must be who they claim to be. In this post we explore two common ways: [--]. Token based authentication [--]. HMAC (Hash-based Message Authentication Code) authentication The diagram below illustrates how they work. Token based Step [--] - the user enters their password into the client and the client sends the password to the Authentication Server. Step [--] - the Authentication Server authenticates the credentials and generates a token with an" [X Link](https://x.com/alexxubyte/status/1697635186127802662) 2023-09-01T15:39Z 241.1K followers, 141.6K engagements "Do you believe that Google Meta Uber Twitter and Airbnb put almost all of their code in one repository This practice is called a monorepo. Monorepo vs. Microrepo. Which is the best Why do different companies choose different options Monorepo isn't new; Linux and Windows were both created using Monorepo. To improve scalability and build speed Google developed its internal dedicated toolchain to scale it faster and strict coding quality standards to keep it consistent. Amazon and Netflix are major ambassadors of the Microservice philosophy. This approach naturally separates the service code" [X Link](https://x.com/alexxubyte/status/1697995639479791661) 2023-09-02T15:31Z 274.2K followers, 349.3K engagements "Linux commands illustrated on one page Take a look at how many you know :) 🔹Controlling processes: kill killall nice 🔹Scheduliing jobs: sleep watch crontab 🔹Host location: host whois ping traceroute 🔹Network connections: ssh telnet scp ftp 🔹Screen output: echo printf seq clear 🔹Viewing Processes: ps uptime top free 🔹And many more You can find the full diagram in the reply. -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1698361458625822890) 2023-09-03T15:45Z 210K followers, 93.4K engagements "How is data transmitted between applications The diagram below shows how a server sends data to another server. Assume a chat application running in the user space sends out a chat message. The message is sent to the send buffer in the kernel space. The data then goes through the network stack and is wrapped with a TCP header an IP header and a MAC header. The data also goes through qdisc (Queueing Disciplines) for flow control. Then the data is sent to the NIC (Network Interface Card) via a ring buffer. The data is sent to the internet via NIC. After many hops among routers and switches the" [X Link](https://x.com/alexxubyte/status/1698722115598610499) 2023-09-04T15:38Z 221.3K followers, 152.8K engagements "Netflix's Tech Stack. This post is based on research from many Netflix engineering blogs and open-source projects. If you come across any inaccuracies please feel free to inform us. Mobile and web: Netflix has adopted Swift and Kotlin to build native mobile apps. For its web application it uses React. Frontend/server communication: GraphQL. Backend services: Netflix relies on ZUUL Eureka the Spring Boot framework and other technologies. Databases: Netflix utilizes EV cache Cassandra CockroachDB and other databases. Messaging/streaming: Netflix employs Apache Kafka and Fink for messaging and" [X Link](https://x.com/alexxubyte/status/1699078784480354634) 2023-09-05T15:15Z 221.3K followers, 458K engagements ". @NetflixEng would you be interested in collaborating on your official tech stack I'd love to work alongside your engineers to create an easy-to-understand infographic. It could benefit millions of engineers" [X Link](https://x.com/alexxubyte/status/1699169125258662229) 2023-09-05T21:14Z 221.3K followers, 56.7K engagements "Explaining [--] Popular Network Protocols in [--] Diagram. The diagram below shows how network protocols are used in a typical eCommerce website. [--]. DNS (Domain Name Service) When we type a URL (Uniform Resource Locator) in a web browser a DNS resolver translates the hostname of the URL to an IP address. This helps us locate the web resources. The DNS resolver communicates with a hierarchy of name servers to retrieve this mapping. More details will follow. [--]. HTTP/HTTPS The user interacts with the website via a REST API which leverages HTTP to manage request methods. When a user decides to purchase" [X Link](https://x.com/alexxubyte/status/1699441172479881638) 2023-09-06T15:15Z 221.4K followers, 117.8K engagements "How Do C++ Java Python Work The diagram shows how the compilation and execution work. Compiled languages are compiled into machine code by the compiler. The machine code can later be executed directly by the CPU.Examples: C C++ Go. A bytecode language like Java compiles the source code into bytecode first then the JVM executes the program. Sometimes JIT (Just-In-Time) compiler compiles the source code into machine code to speed up the execution.Examples: Java C# Interpreted languages are not compiled. They are interpreted by the interpreter during runtime. Examples: Python Javascript Ruby" [X Link](https://x.com/alexxubyte/status/1699807446834000045) 2023-09-07T15:30Z 247.4K followers, 341.5K engagements "Big milestone : Our system design YouTube channel has grown to half a million subscribers. Here are the top five most-liked topics: - Why is Kafka fast - HTTP/1 to HTTP/2 to HTTP/3 - Top [--] Most Popular API Architecture Styles - Kubernetes Explained in [--] Minutes - What Is REST API Examples And How To Use It Thank you everyone ❤ Subscribe to our YouTube channel here:" [X Link](https://x.com/alexxubyte/status/1700166261684978052) 2023-09-08T15:16Z 210K followers, 137K engagements "10 Key Data Structures We Use Every Day - list: keep your Twitter feeds - stack: support undo/redo of the word editor - queue: keep printer jobs or send user actions in-game - hash table: cashing systems - Array: math operations - heap: task scheduling - tree: keep the HTML document or for AI decision - suffix tree: for searching string in a document - graph: for tracking friendship or path finding - r-tree: for finding the nearest neighbor - vertex buffer: for sending data to GPU for rendering Over to you: Which additional data structures have we overlooked -- Subscribe to our weekly" [X Link](https://x.com/alexxubyte/status/1700535669624541530) 2023-09-09T15:44Z 221.3K followers, 188.3K engagements "My recommended materials for cracking your next technical interview: Coding - Leetcode - Cracking the coding interview book - Neetcode System Design Interview - System Design Interview book [--] [--] by Alex Xu - Grokking the system design by Design Guru - Design Data-intensive Application book Behavioral interview - Tech Interview Handbook (Github repo) - A Life Engineered (YT) - STAR method (general method) OOD Interview - Interviewready - OOD by educative - Head First Design Patterns Book Mock interviews - Interviewingio - Pramp - Meetapro Apply for Jobs - Linkedin - Monster - Indeed Over to" [X Link](https://x.com/alexxubyte/status/1701253078874235164) 2023-09-11T15:15Z 221.3K followers, 686.5K engagements "A nice cheat sheet of different monitoring infrastructure in cloud services. This cheat sheet offers a concise yet comprehensive comparison of key monitoring elements across the three major cloud providers and open-source / 3rd party tools. Let's delve into the essential monitoring aspects covered: - Data Collection: Gather information from diverse sources to enhance decision-making. - Data Storage: Safely store and manage data for future analysis and reference. - Data Analysis: Extract valuable insights from data to drive informed actions. - Alerting: Receive real-time notifications about" [X Link](https://x.com/alexxubyte/status/1701614450145702070) 2023-09-12T15:11Z 276.3K followers, 178.5K engagements "Uber Tech Stack This post is based on research from many Uber engineering blogs and open-source projects. If you come across any inaccuracies please feel free to inform us. The corresponding links are added in the comment section. Web frontend: Uber builds Fusion.js as a modern React framework to create robust web applications. They also develop visualization.js for geospatial visualization scenarios. Mobile side: Uber builds the RIB cross-platform with the VIPER architecture instead of MVC. This architecture can work with different languages: Swift for iOS and Java for Android. Service mesh:" [X Link](https://x.com/alexxubyte/status/1701978377807438041) 2023-09-13T15:17Z 236.5K followers, 241.9K engagements "One picture is worth a thousand words - Top [--] Caching Strategies. When we introduce a cache into the architecture synchronization between the cache and the database becomes inevitable. Lets look at [--] common strategies how we keep the data in sync. 🔹 Read Strategies: Cache aside Read through 🔹 Write Strategies: Write around Write back Write through The caching strategies are often used in combination. For example write-around is often used together with cache-aside to make sure the cache is up-to-date. Over to you: What strategies have you used Subscribe to our weekly newsletter to get a" [X Link](https://x.com/alexxubyte/status/1702346703209377854) 2023-09-14T15:40Z 221.4K followers, 56.9K engagements "Next week we will talk about the following topics: - System Design Blueprint - Database Sharding - Write Code That Works on All Platforms - AWS for the Overachiever - Evolution of message queues Over to you: If you have any topics that you would like us to cover please leave" [X Link](https://x.com/alexxubyte/status/1703072185626341618) 2023-09-16T15:43Z 221.4K followers, [--] engagements "This is the flowchart of how slack decides to send a notification. It is a great example of why a simple feature may take much longer to develop than many people think. When we have a great design users may not notice the complexity because it feels like the feature just working as intended. Whats your takeaway from this diagram Image source: Slack eng blog Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/3KCnWXq https://bit.ly/3KCnWXq" [X Link](https://x.com/alexxubyte/status/1703429735219700002) 2023-09-17T15:24Z 269.1K followers, 249.5K engagements "System Design Blueprint: The Ultimate Guide. The method to download the high-resolution PDF is available at the end. We've created a template to tackle various system design problems in interviews. Hope this checklist is useful to guide your discussions during the interview process. This briefly touches on the following discussion points: - Load Balancing - API Gateway - Communication Protocols - Content Delivery Network (CDN) - Database - Cache - Message Queue - Unique ID Generation - Scalability - Availability - Performance - Security - Fault Tolerance and Resilience - And more Subscribe to" [X Link](https://x.com/alexxubyte/status/1704153611994095830) 2023-09-19T15:20Z 221.3K followers, 270.9K engagements "Many Are Looking for the Definitive Guide on How to Choose the Right Stack The ANSWER is. There is no one-size-fits-all guide; it all depends on your specific needs and picking the right stack is HARD. Fortunately at this point in time technology is usually no longer a limiting factor. Most startups should be able to get by with most technologies they find. So spend less time on picking the perfect tech; instead focus on your customers and keep building. Over to you all: What do you think is causing this fragmentation in tech stack choices Image source: CNCF Cloud Native Interactive Landscape" [X Link](https://x.com/alexxubyte/status/1704881138509222135) 2023-09-21T15:31Z 221.3K followers, 76.2K engagements "You can find the CNCF Cloud Native Interactive Landscape here. It's pretty cool: https://landscape.cncf.io/ https://landscape.cncf.io/" [X Link](https://x.com/alexxubyte/status/1704881318704951353) 2023-09-21T15:32Z 247.6K followers, [----] engagements "Made a simple visual guide to help everyone understand the key considerations when designing or using caching systems. - What is a cache - Why do we need cache - Where is cache used - Cache deployment - Distributed cache - Cache replacement and invalidation - Cache strategies - Caching challenges - And more. 📩 We will write more in-depth articles on these topics. Subscribe to our newsletter so you won't miss out:" [X Link](https://x.com/alexxubyte/status/1705607927523123260) 2023-09-23T15:39Z 221.4K followers, 118.2K engagements "Thanks. A thundering herd occurs in large-scale systems when a sudden influx of requests overwhelms the system. This can lead to performance degradation or even system-wide outages. Such events can arise from various reasons including cache misses on popular items sudden spikes in user traffic or service restarts after maintenance" [X Link](https://x.com/alexxubyte/status/1705616023666454621) 2023-09-23T16:12Z 247.4K followers, [----] engagements "How do we transform a system to be Cloud Native The diagram below shows the action spectrum and adoption roadmap. You can use it as a blueprint for adopting cloud-native in your organization. For a company to adopt cloud native architecture there are [--] aspects in the spectrum: [--]. Application definition development [--]. Orchestration and management [--]. Runtime [--]. Provisioning [--]. Observability [--]. Serverless Most companies start from Step [--] containerization and gradually adopt CI/CD service orchestration. This microservice architecture significantly increases the number of instances to manage so" [X Link](https://x.com/alexxubyte/status/1706324846123106476) 2023-09-25T15:08Z 221.4K followers, 148.5K engagements "Explaining Sessions Tokens JWT SSO and OAuth in One Diagram. The method to download the high-resolution PDF is available at the end. Understanding these backstage maneuvers helps us build secure seamless experiences. How do you see the evolution of web session management impacting the future of web applications and user experiences Subscribe to our newsletter to download the - . After signing up find the download link on the success page:" [X Link](https://x.com/alexxubyte/status/1706696005503336772) 2023-09-26T15:43Z 221.4K followers, 159.8K engagements "What is Event Sourcing How is it different from normal CRUD design The diagram below shows a comparison of normal CRUD system design and event sourcing system design. We use an order service as an example. The event sourcing paradigm is used to design a system with determinism. This changes the philosophy of normal system designs. How does this work Instead of recording the order states in the database the event sourcing design persists the events that lead to the state changes in the event store. The event store is an append-only log. The events must be sequenced with incremental numbers to" [X Link](https://x.com/alexxubyte/status/1707415524374966673) 2023-09-28T15:22Z 221.4K followers, 202.4K engagements "What is k8s (Kubernetes) k8s is a container orchestration system. It is used for container deployment and management. Its design is greatly impacted by Googles internal system Borg. A k8s cluster consists of a set of worker machines called nodes that run containerized applications. Every cluster has at least one worker node. The worker node(s) host the Pods that are the components of the application workload. The control plane manages the worker nodes and the Pods in the cluster. In production environments the control plane usually runs across multiple computers and a cluster usually runs" [X Link](https://x.com/alexxubyte/status/1707787591792337271) 2023-09-29T16:01Z 246.3K followers, 134.1K engagements "Almost every software engineer has used Git before but only a handful know how it works. To begin with it's essential to identify where our code is stored. The common assumption is that there are only two locations - one on a remote server like Github and the other on our local machine. However this isn't entirely accurate. Git maintains three local storages on our machine which means that our code can be found in four places: - Working directory: where we edit files - Staging area: a temporary location where files are kept for the next commit - Local repository: contains the code that has" [X Link](https://x.com/alexxubyte/status/1708145139515109449) 2023-09-30T15:41Z 221.4K followers, 340.8K engagements "How to store passwords safely in the database and how to validate a password Lets take a look. 🔹 Storing passwords in plain text is not a good idea because anyone with internal access can see them. 🔹 Storing password hashes directly is not sufficient because it is pruned to precomputation attacks such as rainbow tables. 🔹 To mitigate precomputation attacks we salt the passwords. According to OWASP guidelines a salt is a unique randomly generated string that is added to each password as part of the hashing process. [--] A salt is not meant to be secret and it can be stored in plain text" [X Link](https://x.com/alexxubyte/status/1708504697982820695) 2023-10-01T15:30Z 221.3K followers, 470.2K engagements "IBM MQ - RabbitMQ - Kafka -Pulsar How do message queue architectures evolve 🔹 IBM MQ IBM MQ was launched in [----]. It was originally called MQSeries and was renamed WebSphere MQ in [----]. It was renamed to IBM MQ in [----]. IBM MQ is a very successful product widely used in the financial sector. Its revenue still reached [--] billion dollars in [----]. 🔹 RabbitMQ RabbitMQ architecture differs from IBM MQ and is more similar to Kafka concepts. The producer publishes a message to an exchange with a specified exchange type. It can be direct topic or fanout. The exchange then routes the message into the" [X Link](https://x.com/alexxubyte/status/1709224538201030691) 2023-10-03T15:11Z 240.7K followers, 625.1K engagements "Visualizing global temperature changes from [----] to [----] by NASA Research shows that July [----] was the warmest month since [----] probably because of human activities. Some argue that [---] years is just a blip in Earth's long history millions of years. Do you believe human activities cause global warming Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1710307946339377245) 2023-10-06T14:56Z 221.3K followers, 82.3K engagements "A cheat sheet of various databases in cloud services along with their corresponding open-source/3rd-party options. Choosing the right database for your project is a complex task. The multitude of database options each suited to distinct use cases can quickly lead to decision fatigue. We hope this cheat sheet provides the high level direction to pinpoint the right service that aligns with your project's needs and avoid potential pitfalls. Note: Google has limited documentation for their database use cases. Even though we did our best to look at what was available and arrived at the best option" [X Link](https://x.com/alexxubyte/status/1710680670568394996) 2023-10-07T15:37Z 224.6K followers, 278.2K engagements "Writing Code that Runs on All Platforms Developing code that functions seamlessly across different platforms is a crucial skill for modern programmers. The need arises from the fact that users access software on a wide range of devices and operating systems. Achieving this universal compatibility can be complex due to differences in hardware software environments and user expectations. Creating code that works on all platforms requires careful planning and understanding of the unique challenges presented by each platform. Better planning and comprehension of cross-platform development not" [X Link](https://x.com/alexxubyte/status/1711045857297195039) 2023-10-08T15:48Z 210K followers, 121.2K engagements "What happens when you type a URL into a browser The method to download the high-resolution PDF is available at the end. Lets look at the process step by step. Step 1: The user enters a URL (bytebytego .com) into the browser and hits Enter. The first thing we need to do is to translate the URL to an IP address. The mapping is usually stored in a cache so the browser looks for the IP address in multiple layers of cache: the browser cache OS cache local cache and ISP cache. If the browser couldnt find the mapping in the cache it will ask the DNS (Domain Name System) resolver to resolve it. Step" [X Link](https://x.com/alexxubyte/status/1711406474654814575) 2023-10-09T15:41Z 210K followers, 921.5K engagements "How do companies ship code to production The method to download the high-resolution PDF is available at the end. The diagram below illustrates the typical workflow. Step 1: The process starts with a product owner creating user stories based on requirements. Step 2: The dev team picks up the user stories from the backlog and puts them into a sprint for a two-week dev cycle. Step 3: The developers commit source code into the code repository Git. Step 4: A build is triggered in Jenkins. The source code must pass unit tests code coverage threshold and gates in SonarQube. Step 5: Once the build is" [X Link](https://x.com/alexxubyte/status/1711767230642635130) 2023-10-10T15:34Z 213.7K followers, 1.1M engagements "Top [--] API Gateway Use Cases. API gateway sits between the clients and services providing API communications between them. [--]. API gateway helps build an ecosystem. The users can leverage an API gateway to access a wider set of tools. The partners in the ecosystem collaborate with each other to provide better integrations for the users. [--]. API gateway builds API marketplace The API marketplace hosts fundamental functionalities for everyone. The developers and businesses can easily develop or innovate in this ecosystem and sell APIs on the marketplace. [--]. API gateway provides compatibility with" [X Link](https://x.com/alexxubyte/status/1712126183331262756) 2023-10-11T15:21Z 207.2K followers, 482.5K engagements "Docker 101: Streamlining App Deployment. The method to download the high-resolution PDF is available at the end. Fed up with the "it works on my machine" dilemma Docker could be your salvation Docker revolutionizes software development and deployment. Explore the essentials: [--]. Bundle Everything: Docker packs your app and its dependencies into a portable container code runtime tools libraries and settings a tidy self-contained package. [--]. Virtual Isolation: Containers offer packaging and isolation. Run diverse apps with different settings on a single host without conflicts thanks to Linux" [X Link](https://x.com/alexxubyte/status/1712852668052631763) 2023-10-13T15:27Z 209.9K followers, 391.6K engagements "Best ways to test system functionality Testing system functionality is a crucial step in software development and engineering processes. It ensures that a system or software application performs as expected meets user requirements and operates reliably. Here we delve into the best ways: [--]. Unit Testing: Ensures individual code components work correctly in isolation. [--]. Integration Testing: Verifies that different system parts function seamlessly together. [--]. System Testing: Assesses the entire system's compliance with user requirements and performance. [--]. Load Testing: Tests a system's" [X Link](https://x.com/alexxubyte/status/1714301732174660078) 2023-10-17T15:25Z 209.3K followers, 402.4K engagements "Cloud Network Components Cheat Sheet. The method to download the high-resolution PDF is available at the end. Network components form the backbone of cloud infrastructure enabling connectivity scalability and functionality in cloud services. These components include routers load balancers and firewalls which ensure data flows efficiently and securely between servers and clients. Additionally Content Delivery Networks (CDNs) optimize content delivery by caching data at edge locations reducing latency and improving user experience. In essence these network elements work together to create a" [X Link](https://x.com/alexxubyte/status/1715028386849140962) 2023-10-19T15:33Z 208.6K followers, 113.1K engagements "Explaining [--] unique ID generators in distributed systems. The diagram below shows how they work. Each generator has its pros and cons. [--]. UUID A UUID has [---] bits. It is simple to generate and no need to call another service. However it is not sequential and inefficient for database indexing. Additionally UUID doesnt guarantee global uniqueness. We need to be careful with ID conflicts (although the chances are slim.) [--]. Snowflake Snowflakes ID generation process has multiple components: timestamp machine ID and serial number. The first bit is unused to ensure positive IDs. This generator" [X Link](https://x.com/alexxubyte/status/1715383326637437300) 2023-10-20T15:03Z 208.4K followers, 300K engagements "Our System Design [---] GitHub repo has just reached [-----] stars in [--] days. It's probably one of the fastest-growing repos in history. Thanks to everyone who has starred forked or contributed to the repository What's included in the GitHub repository: - [---] byte-sized system concepts with visuals. - Real-world case studies. - Tips on how to prepare for system design interviews. Topics included (and many many more): - SOAP vs. REST vs. GraphQL vs. RPC - HTTP [---] - HTTP [---] - HTTP [---] - HTTP [---] (QUIC) - CI/CD Pipeline Explained in Simple Terms - [--] Data Structures That Power Your Databases - Top" [X Link](https://x.com/alexxubyte/status/1715757301599224148) 2023-10-21T15:49Z 206K followers, 328.1K engagements "How Do C++ Java and Python Function We just made a video on this topic. The illustration details the processes of compilation and execution. Languages that compile transform source code into machine code using a compiler. This machine code can subsequently be run directly by the CPU. For instance: C C++ Go. In contrast languages like Java first convert the source code into bytecode. The Java Virtual Machine (JVM) then runs the program. Occasionally a Just-In-Time (JIT) compiler translates the source code into machine code to enhance execution speed. Some examples are Java and C#. Languages" [X Link](https://x.com/alexxubyte/status/1716478069945532810) 2023-10-23T15:33Z 209.9K followers, 151.5K engagements "A handy cheat sheet for the most popular cloud services (2023 edition). The method to download the high-resolution PDF is available at the end. Whats included - AWS Azure Google Cloud Oracle Cloud Alibaba Cloud - Cloud servers - Databases - Message queues and streaming platforms - Load balancing DNS routing software - Security - Monitoring Over to you - which company is the best at naming things Subscribe to our newsletter to download the - . After signing up find the download link on the success page: https://bytebytego.ck.page/533f09b521 https://bytebytego.ck.page/533f09b521" [X Link](https://x.com/alexxubyte/status/1716844495097217463) 2023-10-24T15:49Z 277.6K followers, 170.6K engagements "Explain the Top [--] Use Cases of Object Stores. 🔹 What is an object store Object store uses objects to store data. Compared with file storage which uses a hierarchical structure to store files or block storage which divides files into equal block sizes object storage stores metadata together with the objects. Typical products include AWS S3 Google Cloud Storage and Azure Blob Storage. An object store provides flexibility in formats and scales easily. 🔹 Case 1: Data Archiving With the ever-growing amounts of business data we cannot store all the data in core storage systems. We need to have" [X Link](https://x.com/alexxubyte/status/1717202997456064649) 2023-10-25T15:34Z 208.6K followers, 91.1K engagements "System Design for Everyone We've open-sourced the 'System Design 101' GitHub repo last week which has just reached [-----] stars. Thanks to everyone who has starred forked or contributed to the repository. We got our 1st GitHub badge We are actively working on improving it and have merged [--] pull requests last week. Everyone is welcome to contribute. What's included in the GitHub repository: - [---] byte-sized system concepts with visuals. - Real-world case studies. - Tips on how to prepare for system design interviews. Topics included (and many many more): - SOAP vs. REST vs. GraphQL vs. RPC -" [X Link](https://x.com/alexxubyte/status/1717408131964371098) 2023-10-26T05:09Z 210.2K followers, 214.8K engagements "Explaining [--] types of API testing. The method to download the high-resolution PDF is available at the end. 🔹 Smoke Testing This is done after API development is complete. Simply validate if the APIs are working and nothing breaks. 🔹 Functional Testing This creates a test plan based on the functional requirements and compares the results with the expected results. 🔹 Integration Testing This test combines several API calls to perform end-to-end tests. The intra-service communications and data transmissions are tested. 🔹 Regression Testing This test ensures that bug fixes or new features" [X Link](https://x.com/alexxubyte/status/1717566324208230449) 2023-10-26T15:38Z 275.6K followers, 343.5K engagements "API Vs SDK API (Application Programming Interface) and SDK (Software Development Kit) are essential tools in the software development world but they serve distinct purposes: API: An API is a set of rules and protocols that allows different software applications and services to communicate with each other. [--]. It defines how software components should interact. [--]. Facilitates data exchange and functionality access between software components. [--]. Typically consists of endpoints requests and responses. SDK: An SDK is a comprehensive package of tools libraries sample code and documentation that" [X Link](https://x.com/alexxubyte/status/1717924971195097136) 2023-10-27T15:23Z 253.7K followers, 243.9K engagements "What tech stack is commonly used for microservices Below you will find a diagram showing the microservice tech stack both for the development phase and for production. - 🔹 Define API - This establishes a contract between frontend and backend. We can use Postman or OpenAPI for this. 🔹 Development - Node.js or react is popular for frontend development and java/python/go for backend development. Also we need to change the configurations in the API gateway according to API definitions. 🔹 Continuous Integration - JUnit and Jenkins for automated testing. The code is packaged into a Docker image" [X Link](https://x.com/alexxubyte/status/1718875007798104135) 2023-10-30T06:18Z 275.3K followers, 132.5K engagements "How To Release A Mobile App The mobile app release process differs from conventional methods. This illustration simplifies the journey to help you understand. Typical Stages in a Mobile App Release Process: [--]. Registration & Development (iOS & Android): - Enroll in Apple's Developer Program and Google Play Console as iOS and Android developer - Code using platform-specific tools: Swift/Obj-C for iOS and Java/Kotlin for Android [--]. Build & Test (iOS & Android): Compile the app's binary run extensive tests on both platforms to ensure functionality and performance. Create a release candidate" [X Link](https://x.com/alexxubyte/status/1719369583545749658) 2023-10-31T15:03Z 210K followers, 242.6K engagements "Our recommended materials to crack your next tech interview. You can find the link to watch a detailed video explanation at the end of the post. Coding - Leetcode - Cracking the coding interview book - Neetcode System Design Interview - System Design Interview book [--] [--] by Alex Xu - Grokking the system design by Design Guru - Design Data-intensive Application book Behavioral interview - Tech Interview Handbook (Github repo) - A Life Engineered (YT) - STAR method (general method) OOD Interview - Interviewready - OOD by educative - Head First Design Patterns Book Mock interviews - Interviewingio" [X Link](https://x.com/alexxubyte/status/1720103447109009410) 2023-11-02T15:39Z 210K followers, 373.6K engagements "*BIG* announcement: weve launched an Instagram account We will post some instagram reels and some videos: We'll be covering a wide range of topics including: 🔹 What happens when you type a URL into your browser 🔹 HTTPs illustrated 🔹 How to avoid double charges 🔹 Why is Kafka fast 🔹How to choose the right database 🔹REST vs GraphQL 🔹Design Facebook newsfeed 🔹Design WhatsApp 🔹Design a URL shortener 🔹Design Robinhood (stock trading app) 🔹Design a proximity service 🔹Design a distributed scheduler 🔹Design Google Docs 🔹And much more Account name: bytebytego If you're interested in" [X Link](https://x.com/alexxubyte/status/1720460548285092138) 2023-11-03T15:18Z 210K followers, 69.3K engagements "Top [--] Tips for API Security. Next week's topics will be listed at the end. - Use HTTPS - Use OAuth2 - Use WebAuthn - Use Leveled API Keys - Authorization - Rate Limiting - API Versioning - Whitelisting - Check OWASP API Security Risks - Use API Gateway - Error Handling - Input Validation Next week we will talk about: - Release code to production (YouTube) - API landscape - Top log parsing commands - System Design cheatsheet - Top HTTP request methods Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1720823476825788596) 2023-11-04T15:21Z 210K followers, 259.4K engagements "Which latency numbers you should know Please note those are not precise numbers. They are based on some online benchmarks (Jeff Deans latency numbers + some other sources). 🔹L1 and L2 caches: [--] ns [--] ns E.g.: They are usually built onto the microprocessor chip. Unless you work with hardware directly you probably dont need to worry about them. 🔹RAM access: [---] ns E.g.: It takes around [---] ns to read data from memory. Redis is an in-memory data store so it takes about [---] ns to read data from Redis. 🔹Send 1K bytes over [--] Gbps network: [--] us E.g.: It takes around [--] us to send 1KB of data" [X Link](https://x.com/alexxubyte/status/1721203706555998345) 2023-11-05T16:31Z 212K followers, 113.6K engagements "Diving into the world of computer memory and storage. - The fundamental duo: RAM and ROM - DDR4 and DDR5 - Firmware and BIOS - SRAM and DRAM - HDD SSD USB Drive SD Card - and more -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1722643327718502423) 2023-11-09T15:52Z 211.8K followers, 98.3K engagements "Next week we will talk about the following: Single sign-on (SSO) [--] popular network protocols (YouTube) System design acronyms Functional programming vs. imperative programming vs. OOP What happens when Linux starts up -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1723379247333667068) 2023-11-11T16:36Z 212.1K followers, 91.7K engagements "Why is PostgreSQL voted the by Stackoverflow [----] Developer Survey The diagram shows the many use cases by PostgreSQL - one database that includes almost developers need. 🔹OLTP (Online Transaction Processing) We can use PostgreSQL for CRUD (Create-Read-Update-Delete) operations. 🔹OLAP (Online Analytical Processing) We can use PostgreSQL for analytical processing. PostgreSQL is based on (Hybrid transactional/analytical processing) architecture so it can handle both OLTP and OLAP well. 🔹FDW (Foreign Data Wrapper) A FDW is an extension available in PostgreSQL that allows us to access a" [X Link](https://x.com/alexxubyte/status/1723745371829293401) 2023-11-12T16:51Z 221.3K followers, 214.4K engagements "Single Sign-On (SSO) explained in simple terms. The method to download the high-resolution PDF is available at the end. The concepts of SSO revolve around the three key players: the User the Identity Provider (IDP) and the Application. [--]. The end-user or individual who seeks access to various applications. [--]. Identity Provider (IDP): An entity responsible for user authentication and verification. Common IDPs include Google Facebook and company-specific systems. [--]. Application: The software or service that the user wants to access. Applications rely on the IDP for user authentication. With SSO" [X Link](https://x.com/alexxubyte/status/1724827440953040998) 2023-11-15T16:31Z 213.8K followers, 231.2K engagements "Data is cached everywhere from the front end to the back end This diagram illustrates where we cache data in a typical architecture. There are along the flow. 🔹 [--]. Client apps: HTTP responses can be cached by the browser. We request data over HTTP for the first time and it is returned with an expiry policy in the HTTP header; we request data again and the client app tries to retrieve the data from the browser cache first. 🔹 [--]. CDN: CDN caches static web resources. The clients can retrieve data from a CDN node nearby. 🔹 [--]. Load Balancer: The load Balancer can cache resources as well. 🔹 4." [X Link](https://x.com/alexxubyte/status/1726276559819223450) 2023-11-19T16:29Z 213.4K followers, 157.2K engagements "🎁 Giving Away [---] Digital System Design ML System Design & Newsletter Subscriptions 🎁 : ✅ Like & retweet ✅ Subscribe to our free weekly newsletter: ✅ Winners get all [--] Happy Thanksgiving ❤ The giveaway ends in [--] hours. Winners will receive an email on how to redeem the rewards on Nov 26" [X Link](https://x.com/alexxubyte/status/1727727893843988811) 2023-11-23T16:36Z 215.9K followers, 150.2K engagements "Thanksgiving Giveaway. Last chance to enter it's the final day Giving Away [---] Digital System Design ML System Design & Newsletter Subscriptions. : ✅ Like & retweet ✅ Subscribe to our free weekly newsletter: ✅ Winners get all [--] Winners will receive an email on how to redeem the rewards on Nov [--]. Happy Thanksgiving ❤" [X Link](https://x.com/alexxubyte/status/1728452614004801884) 2023-11-25T16:36Z 214.8K followers, 104.8K engagements "Almost every software engineer has used Linux before but only a handful know how its Boot Process works :) Let's dive in. The diagram below shows the steps. Step [--] - When we turn on the power BIOS (Basic Input/Output System) or UEFI (Unified Extensible Firmware Interface) firmware is loaded from non-volatile memory and executes POST (Power On Self Test). Step [--] - BIOS/UEFI detects the devices connected to the system including CPU RAM and storage. Step [--] - Choose a booting device to boot the OS from. This can be the hard drive the network server or CD ROM. Step [--] - BIOS/UEFI runs the boot" [X Link](https://x.com/alexxubyte/status/1730268298414321833) 2023-11-30T16:51Z 215.6K followers, 127.9K engagements "Explaining JSON Web Token (JWT) with simple terms. We've made a video (YouTube Link at the end). Imagine you have a special box called a JWT. Inside this box there are three parts: a header a payload and a signature. The header is like the label on the outside of the box. It tells us what type of box it is and how it's secured. It's usually written in a format called JSON which is just a way to organize information using curly braces and colons : . The payload is like the actual message or information you want to send. It could be your name age or any other data you want to share. It's also" [X Link](https://x.com/alexxubyte/status/1732077250626179578) 2023-12-05T16:39Z 246.3K followers, 119.4K engagements "Netflix's Tech Stack. This post is based on research from many Netflix engineering blogs and open-source projects. If you come across any inaccuracies please feel free to inform us. Mobile and web: Netflix has adopted Swift and Kotlin to build native mobile apps. For its web application it uses React. Frontend/server communication: GraphQL. Backend services: Netflix relies on ZUUL Eureka the Spring Boot framework and other technologies. Databases: Netflix utilizes EV cache Cassandra CockroachDB and other databases. Messaging/streaming: Netflix employs Apache Kafka and Fink for messaging and" [X Link](https://x.com/alexxubyte/status/1733891233859473857) 2023-12-10T16:47Z 225.9K followers, 224.8K engagements "The nice thing about having a strong community is that when I make stupid errors many people notice them and point them out enabling me to fix them quickly and allowing everyone to learn. Thank you This is the updated version" [X Link](https://x.com/alexxubyte/status/1734410242774167619) 2023-12-12T03:10Z 216.9K followers, 68K engagements "What are the differences between cookies and sessions The diagram below shows how they work. Cookies and sessions are both used to carry user information over HTTP requests including user login status user permissions etc. 🔹 Cookies Cookies typically have size limits (4KB). They carry small pieces of information and are stored on the users devices. Cookies are sent with each subsequent user request. Users can choose to ban cookies in their browsers. 🔹 Sessions Unlike cookies sessions are created and stored on the server side. There is usually a unique session ID generated on the server" [X Link](https://x.com/alexxubyte/status/1734978179167875496) 2023-12-13T16:46Z 216.9K followers, 128.9K engagements "Types of Memory and Storage - The fundamental duo: RAM and ROM - DDR4 and DDR5 - Firmware and BIOS - SRAM and DRAM - HDD SSD USB Drive SD Card Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1735555480779694114) 2023-12-15T07:00Z 216.9K followers, 56.7K engagements "A handy cheat sheet for the most popular cloud services (2023 edition). The method to download the high-resolution PDF is available at the end. Whats included - AWS Azure Google Cloud Oracle Cloud Alibaba Cloud - Cloud servers - Databases - Message queues and streaming platforms - Load balancing DNS routing software - Security - Monitoring Over to you - which company is the best at naming things Subscribe to our newsletter to download the - . After signing up find the download link on the success page:" [X Link](https://x.com/alexxubyte/status/1735700099261780259) 2023-12-15T16:35Z 216.9K followers, 64.6K engagements "Symmetric encryption vs asymmetric encryption Symmetric encryption and asymmetric encryption are two types of cryptographic techniques used to secure data and communications but they differ in their methods of encryption and decryption. 🔹 In symmetric encryption a single key is used for both encryption and decryption of data. It is faster and can be applied to bulk data encryption/decryption. For example we can use it to encrypt massive amounts of PII (Personally Identifiable Information) data. It poses challenges in key management because the sender and receiver share the same key. 🔹" [X Link](https://x.com/alexxubyte/status/1736791518873268304) 2023-12-18T16:52Z 216.9K followers, 68.1K engagements "There are over [----] engineering blogs. Here are my top [--] favorites: - Netflix TeachBlog - Uber Blog - Cloudflare Blog - Engineering at Meta - LinkedIn Engineering - Discord Blog - AWS Architecture - Slack Engineering - Stripe Blog Over to you - What are some of your favorite engineering blogs -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1737508363490177482) 2023-12-20T16:20Z 216.9K followers, 95.9K engagements "How does Redis persist data Redis is an in-memory database. If the server goes down the data will be lost. The diagram below shows two ways to persist Redis data on disk: [--]. AOF (Append-Only File) [--]. RDB (Redis Database) Note that data persistence is not performed on the critical path and doesn't block the write process in Redis. 🔹 AOF Unlike a write-ahead log the Redis AOF log is a write-after log. Redis executes commands to modify the data in memory first and then writes it to the log file. AOF log records the commands instead of the data. The event-based design simplifies data recovery." [X Link](https://x.com/alexxubyte/status/1737875875381830058) 2023-12-21T16:41Z 213.4K followers, 47.2K engagements "IBM MQ - RabbitMQ - Kafka -Pulsar How do message queue architectures evolve 🔹 IBM MQ IBM MQ was launched in [----]. It was originally called MQSeries and was renamed WebSphere MQ in [----]. It was renamed to IBM MQ in [----]. IBM MQ is a very successful product widely used in the financial sector. Its revenue still reached [--] billion dollars in [----]. 🔹 RabbitMQ RabbitMQ architecture differs from IBM MQ and is more similar to Kafka concepts. The producer publishes a message to an exchange with a specified exchange type. It can be direct topic or fanout. The exchange then routes the message into the" [X Link](https://x.com/anyuser/status/1738965868556730827) 2023-12-24T16:52Z [--] followers, 81.4K engagements "How is data sent over the internet What does that have to do with the OSI model How does TCP/IP fit into this [--] Layers in the OSI model are: [--]. Physical Layer [--]. Data Link Layer [--]. Network Layer [--]. Transport Layer [--]. Session Layer [--]. Presentation Layer [--]. Application Layer -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1739322957753966598) 2023-12-25T16:31Z 221.3K followers, 105.5K engagements "Logging tracing and metrics are [--] pillars of system observability. The diagram below shows their definitions and typical architectures. 🔹 Logging Logging records discrete events in the system. For example we can record an incoming request or a visit to databases as events. It has the highest volume. ELK (Elastic-Logstash-Kibana) stack is often used to build a log analysis platform. We often define a standardized logging format for different teams to implement so that we can leverage keywords when searching among massive amounts of logs. 🔹 Tracing Tracing is usually request-scoped. For" [X Link](https://x.com/alexxubyte/status/1740414203155116128) 2023-12-28T16:47Z 221.8K followers, 115.1K engagements "How do we incorporate Event Sourcing into the systems Event sourcing changes the programming paradigm from persisting states to persisting events. The event store is the source of truth. Let's look at three examples. [--]. New York Times The newspaper website stores every article image and byline since [----] in an event store. The raw data is then denormalized into different views and fed into different ElasticSearch nodes for website searches. [--]. CDC (Change Data Capture) A CDC connector pulls data from the tables and transforms it into events. These events are pushed to Kafka and other sinks" [X Link](https://x.com/alexxubyte/status/1742585517013922096) 2024-01-03T16:35Z 251.1K followers, 50.2K engagements "How can Cache Systems go wrong The diagram below shows [--] typical cases where caches can go wrong and their solutions. [--]. Thunder herd problem This happens when a large number of keys in the cache expire at the same time. Then the query requests directly hit the database which overloads the database. There are two ways to mitigate this issue: one is to avoid setting the same expiry time for the keys adding a random number in the configuration; the other is to allow only the core business data to hit the database and prevent non-core data to access the database until the cache is back up. 2." [X Link](https://x.com/alexxubyte/status/1742950604622946443) 2024-01-04T16:46Z 221.4K followers, 61.2K engagements "API Vs SDK. API (Application Programming Interface) and SDK (Software Development Kit) are essential tools in the software development world but they serve distinct purposes: API: An API is a set of rules and protocols that allows different software applications and services to communicate with each other. [--]. It defines how software components should interact. [--]. Facilitates data exchange and functionality access between software components. [--]. Typically consists of endpoints requests and responses. SDK: An SDK is a comprehensive package of tools libraries sample code and documentation that" [X Link](https://x.com/alexxubyte/status/1745847854961492384) 2024-01-12T16:38Z 253.7K followers, 41.6K engagements "A nice cheat sheet of different monitoring infrastructure in cloud services. This cheat sheet offers a concise yet comprehensive comparison of key monitoring elements across the three major cloud providers and open-source / 3rd party tools. Let's delve into the essential monitoring aspects covered: - Data Collection: Gather information from diverse sources to enhance decision-making. - Data Storage: Safely store and manage data for future analysis and reference. - Data Analysis: Extract valuable insights from data to drive informed actions. - Alerting: Receive real-time notifications about" [X Link](https://x.com/alexxubyte/status/1746574171457630252) 2024-01-14T16:45Z 221.3K followers, 53K engagements "Key Use Cases for Load Balancers The diagram below shows top [--] use cases where we use a load balancer. 🔹 Traffic Distribution Load balancers evenly distribute incoming traffic among multiple servers preventing any single server from becoming overwhelmed. This helps maintain optimal performance scalability and reliability of applications or websites. 🔹 High Availability Load balancers enhance system availability by rerouting traffic away from failed or unhealthy servers to healthy ones. This ensures uninterrupted service even if certain servers experience issues. 🔹 SSL Termination Load" [X Link](https://x.com/alexxubyte/status/1747288920138948898) 2024-01-16T16:05Z 221.4K followers, 33.1K engagements "How does Git work To begin with it's essential to identify where our code is stored. The common assumption is that there are only two locations - one on a remote server like Github and the other on our local machine. However this isn't entirely accurate. Git maintains three local storages on our machine which means that our code can be found in four places: - Working directory: where we edit files - Staging area: a temporary location where files are kept for the next commit - Local repository: contains the code that has been committed - Remote repository: the remote server that stores the" [X Link](https://x.com/alexxubyte/status/1749103235082953050) 2024-01-21T16:14Z 221.3K followers, 59.9K engagements "A cheat sheet for system designs. The diagram below lists [--] core concepts when we design systems. The cheat sheet is straightforward to go through one by one. Save it for future reference 🔹 Requirement gathering 🔹 System architecture 🔹 Data design 🔹 Domain design 🔹 Scalability 🔹 Reliability 🔹 Availability 🔹 Performance 🔹 Security 🔹 Maintainability 🔹 Testing 🔹 User experience design 🔹 Cost estimation 🔹 Documentation 🔹 Migration plan Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1749827644772986953) 2024-01-23T16:13Z 224.2K followers, 62.5K engagements "@chipro Congrats Chip" [X Link](https://x.com/alexxubyte/status/1750214034933317728) 2024-01-24T17:48Z 221.3K followers, [----] engagements "Visualizing a SQL query SQL statements are executed by the database system in several steps including: - Parsing the SQL statement and checking its validity - Transforming the SQL into an internal representation such as relational algebra - Optimizing the internal representation and creating an execution plan that utilizes index information - Executing the plan and returning the results -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1750560163101315463) 2024-01-25T16:44Z 222.4K followers, 87.1K engagements "Git Merge vs. Rebase vs. Squash Commit What are the differences When we from one Git branch to another we can use git merge or git rebase. The diagram below shows how the two commands work. This creates a new commit G in the main branch. G ties the histories of both main and feature branches. Git merge is -. Neither the main nor the feature branch is changed. Git rebase moves the feature branch histories to the head of the main branch. It creates new commits E F and G for each commit in the feature branch. The benefit of rebase is that it has . Rebase can be dangerous if the golden rule" [X Link](https://x.com/alexxubyte/status/1751645221602152881) 2024-01-28T16:35Z 221.4K followers, [--] engagements "The world is a dangerous place. The diagram below shows some possible network attacks in [--] OSI model layers. 🔹 Application Layer - Pushing - Malware injection - DDos attacks 🔹 Presentation Layer - Encoding/decoding vulnerabilities - Format string attacks - Malicious code injection 🔹 Session Layer - Session hijacking - Session fixation attacks - Brute force attacks 🔹 Transport Layer - Man-in-the-middle attacks - SYN/ACK flood 🔹 Network Layer - IP spoofing - Route table manipulation - DDos attacks 🔹 Data Link Layer - MAC address spoofing - ARP spoofing - VLAN hopping 🔹 Physical Layer -" [X Link](https://x.com/alexxubyte/status/1752001717699592287) 2024-01-29T16:12Z 222.6K followers, 45K engagements "What is a cookie Imagine Bob goes to a coffee shop for the first time orders a medium-sized espresso with two sugars. The cashier records Bobs identity and preferences on a card and hands it over to Bob with a cup of coffee. The next time Bob goes to the cafe he shows the cashier the preference card. The cashier immediately knows who the customer is and what kind of coffee he likes. A cookie acts as the preference card. When we log in to a website the server issues a cookie to us with a small amount of data. The cookie is stored on the client side so the next time we send a request to the" [X Link](https://x.com/alexxubyte/status/1752367480008511909) 2024-01-30T16:25Z 222K followers, 32K engagements "How does a VPN work This diagram below shows how we access the internet with and without VPNs. A VPN or Virtual Private Network is a technology that creates a secure encrypted connection over a less secure network such as the public internet. The primary purpose of a VPN is to provide privacy and security to data and communications. A VPN acts as a tunnel through which the encrypted data goes from one location to another. Any external party cannot see the data transferring. A VPN works in [--] steps: 🔹 Step [--] - Establish a secure tunnel between our device and the VPN server. 🔹 Step [--] - Encrypt" [X Link](https://x.com/alexxubyte/status/1753089419438166268) 2024-02-01T16:14Z 222.8K followers, 46.6K engagements "Understanding Database Types To make the best decision for our projects it is essential to understand the various types of databases available in the market. We need to consider key characteristics of different database types including popular options for each and compare their use cases. Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1754186699327070321) 2024-02-04T16:54Z 223K followers, 64.1K engagements "How do you pay from your digital wallet such as Paypal Venmo Paytm by scanning the QR code To understand the process involved we need to divide the scan to pay process into two sub-processes: [--]. Merchant generates a QR code and displays it on the screen [--]. Consumer scans the QR code and pays Here are the steps for generating the QR code: [--]. When you want to pay for your shopping the cashier tallies up all the goods and calculates the total amount due for example $123.45. The checkout has an order ID of SN129803. The cashier clicks the checkout button. [--]. The cashiers computer sends the order" [X Link](https://x.com/alexxubyte/status/1755266417082130502) 2024-02-07T16:24Z 223.1K followers, 61.6K engagements "Flowchart of how slack decides to send a notification It is a great example of why a simple feature may take much longer to develop than many people think. When we have a great design users may not notice the complexity because it feels like the feature just working as intended. Whats your takeaway from this diagram Image source: Slack Eng blog Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1756359022092153178) 2024-02-10T16:46Z 223.4K followers, 98K engagements "Git Merge vs. Rebase vs. Squash Commit What are the differences When we from one Git branch to another we can use git merge or git rebase. The diagram below shows how the two commands work. This creates a new commit G in the main branch. G ties the histories of both main and feature branches. Git merge is -. Neither the main nor the feature branch is changed. Git rebase moves the feature branch histories to the head of the main branch. It creates new commits E F and G for each commit in the feature branch. The benefit of rebase is that it has . Rebase can be dangerous if the golden rule" [X Link](https://x.com/alexxubyte/status/1756733474449641967) 2024-02-11T17:34Z 222.5K followers, [--] engagements "How do you pay from your digital wallet such as Paypal Venmo and Paytm by scanning the QR code To understand the process involved we need to divide the scan to pay process into two sub-processes: [--]. Merchant generates a QR code and displays it on the screen [--]. Consumer scans the QR code and pays Here are the steps for generating the QR code: [--]. When you want to pay for your shopping the cashier tallies up all the goods and calculates the total amount due for example $123.45. The checkout has an order ID of SN129803. The cashier clicks the checkout button. [--]. The cashiers computer sends the" [X Link](https://x.com/alexxubyte/status/1757068554145575301) 2024-02-12T15:46Z 223.5K followers, 40.3K engagements "How do we manage configurations in a system The diagram shows a comparison between traditional configuration management and IaC (Infrastructure as Code). 🔹 Configuration Management The practice is designed to manage and provision IT infrastructure through systematic and repeatable processes. This is critical for ensuring that the system performs as intended. Traditional configuration management focuses on maintaining the desired state of the system's configuration items such as servers network devices and applications after they have been provisioned. It usually involves initial manual setup" [X Link](https://x.com/alexxubyte/status/1759617715378278641) 2024-02-19T16:35Z 247.4K followers, 48.1K engagements "What is GraphQL Is it a replacement for the REST API The diagram below explains different aspects of GraphQL. GraphQL is a query language for APIs and a runtime for executing those queries by using a type system you define for your data. It was developed internally by Meta in [----] before being publicly released in [----]. Unlike the more traditional REST API GraphQL allows clients to request exactly the data they need making it possible to fetch data from multiple sources with a single query. This efficiency in data retrieval can lead to improved performance for web and mobile applications." [X Link](https://x.com/alexxubyte/status/1760348010578690095) 2024-02-21T16:57Z 223.9K followers, 38.5K engagements "System Design Blueprint: The Ultimate Guide. We've created a template to tackle various system design problems in interviews. Hope this checklist is useful to guide your discussions during the interview process. This briefly touches on the following discussion points: - Load Balancing - API Gateway - Communication Protocols - Content Delivery Network (CDN) - Database - Cache - Message Queue - Unique ID Generation - Scalability - Availability - Performance - Security - Fault Tolerance and Resilience - And more Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1760707367552045557) 2024-02-22T16:45Z 223.9K followers, 60.1K engagements "Polling Vs Webhooks - Polling Polling involves repeatedly checking the external service or endpoint at fixed intervals to retrieve updated information. Its like constantly asking Do you have something new for me even where there might not be any update. This approach is resource-intensive and inefficient. Also you get updates only when you ask for it thereby missing any real-time information. However developers have more control over when and how the data is fetched. - Webhooks Webhooks are like having a built-in notification system. You dont continuously ask for information. Instead you" [X Link](https://x.com/alexxubyte/status/1761064005316255993) 2024-02-23T16:22Z 224.2K followers, 60.4K engagements "Cloud Load Balancer Cheat Sheet Efficient load balancing is vital for optimizing the performance and availability of your applications in the cloud. However managing load balancers can be overwhelming given the various types and configuration options available. In today's multi-cloud landscape mastering load balancing is essential to ensure seamless user experiences and maximize resource utilization especially when orchestrating applications across multiple cloud providers. Having the right knowledge is key to overcoming these challenges and achieving consistent reliable application delivery." [X Link](https://x.com/alexxubyte/status/1762887275174879709) 2024-02-28T17:07Z 224.5K followers, 56.7K engagements "Wouldn't it be nice if a system could automatically detect and fix bugs for us Meta released a paper about how they automated end-to-end repair at the Facebook scale. Let's take a closer look. The goal of a tool called SapFix is to simplify debugging by automatically generating fixes for specific issues. How successful has SapFix been Here are some details that have been made available: Used on six key apps in the Facebook app family (Facebook Messenger Instagram FBLite Workplace and Workchat). Each app consists of tens of millions of lines of code It generated [---] patches for [--] crashes in a" [X Link](https://x.com/alexxubyte/status/1764698681260019908) 2024-03-04T17:05Z 225.1K followers, 39.7K engagements "There are over [----] engineering blogs. Here are my top [--] favorites: - Netflix TechBlog - Uber Blog - Cloudflare Blog - Engineering at Meta - LinkedIn Engineering - Discord Blog - AWS Architecture - Slack Engineering - Stripe Blog Over to you - What are some of your favorite engineering blogs -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1766142422390837458) 2024-03-08T16:42Z 225.8K followers, 110.3K engagements "OAuth [---] Flows Authorization Code Flow: The most common OAuth flow. After user authentication the client receives an authorization code and exchanges it for an access token and refresh token. Client Credentials Flow: Designed for single-page applications. The access token is returned directly to the client without an intermediate authorization code. Implicit Code Flow: Designed for single-page applications. The access token is returned directly to the client without an intermediate authorization code. Resource Owner Password Grant Flow: Allows users to provide their username and password" [X Link](https://x.com/alexxubyte/status/1766348476395470964) 2024-03-09T06:21Z 225.5K followers, 49.5K engagements "How is data sent over the internet What does that have to do with the OSI model How does TCP/IP fit into this [--] Layers in the OSI model are: [--]. Physical Layer [--]. Data Link Layer [--]. Network Layer [--]. Transport Layer [--]. Session Layer [--]. Presentation Layer [--]. Application Layer -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):" [X Link](https://x.com/alexxubyte/status/1767073393114026263) 2024-03-11T06:21Z 225.8K followers, 56.3K engagements "Top [--] Database Models. Data models provide the foundation for storing retrieving and manipulating data in database management systems (DBMS) and influence how data is structured and accessed. The diagram below shows top [--] data models. 🔹 Flat Model The flat data model is one of the simplest forms of database models. It organizes data into a single table where each row represents a record and each column represents an attribute. This model is similar to a spreadsheet and is straightforward to understand and implement. However it lacks the ability to efficiently handle complex relationships" [X Link](https://x.com/alexxubyte/status/1767214595037597826) 2024-03-11T15:42Z 225.7K followers, 42K engagements "One picture is worth a thousand words - Typical AWS Network Architecture in one diagram. Amazon Web Services (AWS) offers a comprehensive suite of networking services designed to provide businesses with secure scalable and highly available network infrastructure. AWS's network architecture components enable seamless connectivity between the internet remote workers corporate data centers and within the AWS ecosystem itself. 🔹 VPC (Virtual Private Cloud) At the heart of AWS's networking services is the Amazon VPC which allows users to provision a logically isolated section of the AWS Cloud." [X Link](https://x.com/alexxubyte/status/1767925952812867664) 2024-03-13T14:49Z 235.7K followers, 50.3K engagements "15 Open-Source Projects That Changed the World To come up with the list we tried to look at the overall impact these projects have created on the industry and related technologies. Also weve focused on projects that have led to a big change in the day-to-day lives of many software developers across the world. Web Development - Node.js: The cross-platform server-side Javascript runtime that brought JS to server-side development - React: The library that became the foundation of many web development frameworks. - Apache HTTP Server: The highly versatile web server loved by enterprises and" [X Link](https://x.com/alexxubyte/status/1768296322665476275) 2024-03-14T15:21Z 226.3K followers, 102.6K engagements "Top [--] website performance metrics you cannot ignore: Load Time: This is the time taken by the web browser to download and display the webpage. Its measured in milliseconds. Time to First Byte (TTFB): Its the time taken by the browser to receive the first byte of data from the web server. TTFB is crucial because it indicates the general ability of the server to handle traffic. Request Count: The number of HTTP requests a browser has to make to fully load the page. The lower this count the faster a website will feel to the user. DOMContentLoaded (DCL): This is the time it takes for the full" [X Link](https://x.com/alexxubyte/status/1769748487317651962) 2024-03-18T15:31Z 225.9K followers, 36.8K engagements "Have you heard of the 12-Factor App The "12 Factor App" offers a set of best practices for building modern software applications. Following these [--] principles can help developers and teams in building reliable scalable and manageable applications. Here's a brief overview of each principle: [--]. Codebase: Have one place to keep all your code and manage it using version control like Git. [--]. Dependencies: List all the things your app needs to work properly and make sure they're easy to install. [--]. Config: Keep important settings like database credentials separate from your code so you can change" [X Link](https://x.com/alexxubyte/status/1772284282146582915) 2024-03-25T15:27Z 227.2K followers, 82.9K engagements "Rome wasn't built in a day. How does Redis architecture evolve Redis is a popular in-memory cache. How did it evolve to the architecture it is today 🔹 [----] - Standalone Redis When Redis [---] was released in [----] the architecture was quite simple. It is usually used as a cache to the business application. However Redis stores data in memory. When we restart Redis we will lose all the data and the traffic directly hits the database. 🔹 [----] - Persistence When Redis [---] was released in [----] it addressed the previous restrictions. Redis introduced RDB in-memory snapshots to persist data. It also" [X Link](https://x.com/alexxubyte/status/1772650411327136146) 2024-03-26T15:42Z 250.2K followers, 36.5K engagements "What does API gateway do The diagram below shows the detail. Step [--] - The client sends an HTTP request to the API gateway. Step [--] - The API gateway parses and validates the attributes in the HTTP request. Step [--] - The API gateway performs allow-list/deny-list checks. Step [--] - The API gateway talks to an identity provider for authentication and authorization. Step [--] - The rate limiting rules are applied to the request. If it is over the limit the request is rejected. Steps [--] and [--] - Now that the request has passed basic checks the API gateway finds the relevant service to route to by path" [X Link](https://x.com/alexxubyte/status/1773010360708317344) 2024-03-27T15:33Z 226.8K followers, 63.6K engagements "There are over [----] engineering blogs. Here are my top [--] favorites: - Netflix TechBlog - Uber Blog - Cloudflare Blog - Engineering at Meta - LinkedIn Engineering - Discord Blog - AWS Architecture - Slack Engineering - Stripe Blog Over to you - What are some of your favorite engineering blogs Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/3KCnWXq https://bit.ly/3KCnWXq" [X Link](https://x.com/alexxubyte/status/1773735191246438805) 2024-03-29T15:33Z 228.1K followers, 133.7K engagements "A handy cheat sheet for the most popular cloud services. Whats included - AWS Azure Google Cloud Oracle Cloud Alibaba Cloud - Cloud servers - Databases - Message queues and streaming platforms - Load balancing DNS routing software - Security - Monitoring Over to you - which company is the best at naming things Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/3KCnWXq https://bit.ly/3KCnWXq" [X Link](https://x.com/alexxubyte/status/1774470307551830153) 2024-03-31T16:14Z 271.2K followers, 45.9K engagements "What does a typical microservice architecture look like 👇 The diagram below shows a typical microservice architecture. 🔹Load Balancer: This distributes incoming traffic across multiple backend services. 🔹CDN (Content Delivery Network): CDN is a group of geographically distributed servers that hold static content for faster delivery. The clients look for content in CDN first then progress to backend services. 🔹API Gateway: This handles incoming requests and routes them to the relevant services. It talks to the identity provider and service discovery. 🔹Identity Provider: This handles" [X Link](https://x.com/alexxubyte/status/1774688322780361009) 2024-04-01T06:40Z 227.2K followers, 33.1K engagements "Roadmap for Learning Cyber Security By Henry Jiang. Redrawn by ByteByteGo. Cybersecurity is crucial for protecting information and systems from theft damage and unauthorized access. Whether you're a beginner or looking to advance your technical skills there are numerous resources and paths you can take to learn more about cybersecurity. Here are some structured suggestions to help you get started or deepen your knowledge: 🔹 Security Architecture 🔹 Frameworks & Standards 🔹 Application Security 🔹 Risk Assessment 🔹 Enterprise Risk Management 🔹 Threat Intelligence 🔹 Security Operation" [X Link](https://x.com/alexxubyte/status/1775185529124065609) 2024-04-02T15:36Z 275.9K followers, 61.2K engagements "How does Javascript Work The cheat sheet below shows most important characteristics of Javascript. 🔹 Interpreted Language JavaScript code is executed by the browser or JavaScript engine rather than being compiled into machine language beforehand. This makes it highly portable across different platforms. Modern engines such as V8 utilize Just-In-Time (JIT) technology to compile code into directly executable machine code. 🔹 Function is First-Class Citizen In JavaScript functions are treated as first-class citizens meaning they can be stored in variables passed as arguments to other functions" [X Link](https://x.com/alexxubyte/status/1775545424327418144) 2024-04-03T15:26Z 227.4K followers, 55K engagements Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
@alexxubyte Alex XuAlex Xu posts on X about ai, api, $googl, linkedin the most. They currently have [-------] followers and [---] posts still getting attention that total [------] engagements in the last [--] hours.
Social category influence technology brands stocks social networks finance celebrities currencies countries travel destinations exchanges products
Social topic influence ai, api, $googl, linkedin, azure, youtube, pdf, discord, meta, redis
Top assets mentioned Alphabet Inc Class A (GOOGL) Uber Technologies, Inc. (UBER) Cloudflare, Inc. (NET) Microsoft Corp. (MSFT) Mastercard, Inc. (MA) Balancer (BAL) PayPal Holdings Inc (PYPL) IBM (IBM) MongoDB, Inc. (MDB) WalletConnect Token (WCT) Shopify Inc (SHOP)
Top posts by engagements in the last [--] hours
"A content delivery network (CDN) refers to geographically distributed servers (also called edge servers) that provide fast delivery of static and dynamic content. Lets take a look at how it works"
X Link 2022-02-22T16:53Z 247.3K followers, [---] engagements
"Many people asked about the table of contents for the System Design Interview (Volume 2). Here you go: Table Of Contents: Chapter 1: Proximity Service Chapter 2: Nearby Friends Chapter 3: Google Maps Chapter 4: Distributed Message Queue Chapter 5: Metrics Monitoring"
X Link 2022-03-16T15:40Z 247.4K followers, [----] engagements
"Chapter 6: Ad Event Aggregation Chapter 7: Hotel Reservation Chapter 8: Distributed Email Service Chapter 9: S3-like Object Storage Chapter 10: Leaderboard Chapter 11: Payment System Chapter 12: Digital Wallet Chapter 13: Stock Exchange Link to the book: https://amzn.to/34G2vmC https://amzn.to/34G2vmC"
X Link 2022-03-16T15:40Z 247.4K followers, [---] engagements
"Which cloud provider should be used when building a big data solution The diagram below illustrates the detailed comparison of AWS Google Cloud and Microsoft Azure. The common parts of the solutions: [--]. Data ingestion of structured or unstructured data. [--]. Raw data storage"
X Link 2022-04-07T16:01Z 248.1K followers, [----] engagements
"What are the differences between Virtualization (VMware) and Containerization (Docker) The diagram below illustrates the layered architecture of virtualization and containerization"
X Link 2022-04-08T15:31Z 261.4K followers, [---] engagements
"@YirenLu We dealt with the same issue a while ago and settled with the following workflow: 1). Save Google Docs as .docx locally 2). Convert .docx to .mdx using pandoc with filters to adjust the markdown output. 3). Adjust images and code blocks manually. It works relatively well"
X Link 2022-05-17T23:11Z 275.7K followers, [--] engagements
"Evolution of the Netflix API architecture. The Netflix API architecture went through [--] main stages. . The application is packaged and deployed as a monolith such as a single Java WAR file Rails app etc. Most startups begin with a monolith architecture"
X Link 2022-05-25T15:47Z 251.6K followers, [----] engagements
"🔹Step 2: The third-party processor generates ACH files on behalf of the originator. The files are uploaded to an SFTP established by the ODFI. This should be done by the [--] PM cut-off time as specified by the ODFI bank"
X Link 2022-07-28T15:11Z 247.4K followers, [--] engagements
"Evolution of Airbnbs microservice architecture. This post is based on a tech talk. Check out the reference link at the end of the thread to read more. Help me reach 100k this week (System Design Newsletter currently at 97160). Subscribe here: https://bit.ly/3FEGliw https://bit.ly/3FEGliw"
X Link 2022-08-02T15:49Z 274.1K followers, [----] engagements
"+ (2020 - present) This is what Airbnb is working on now. The micro and macroservice hybrid model focuses on the unification of APIs"
X Link 2022-08-02T15:49Z 274.2K followers, [--] engagements
"Over to you - why do you think both Airbnb and Netflix use GraphQL Reference: https://www.infoq.com/presentations/airbnb-culture-soa/ https://www.infoq.com/presentations/airbnb-culture-soa/"
X Link 2022-08-02T15:49Z 274.1K followers, [--] engagements
"/1 Why is single-threaded Redis so fast There are [--] main reasons as shown in the diagram below. If you prefer video you can watch our YouTube video here If you prefer text keep reading: https://bit.ly/3QlWFti https://bit.ly/3QlWFti"
X Link 2022-08-10T15:45Z 250.2K followers, [----] engagements
"/1 How to explain to a 10-year-old what all the symbols/numbers on the smart credit card mean Do you know that smart credit cards have ISO standards Lets take a look:"
X Link 2022-08-24T15:30Z 253.2K followers, [---] engagements
"/1 How do Apple Pay and Google Pay handle sensitive card info The diagram below shows the differences. Both approaches are very secure but the implementations are different. To understand the difference we break down the process into two flows"
X Link 2022-09-21T15:53Z 247.4K followers, 59.7K engagements
"6/ [--]. NPCI acts as a switch between acquiring banks and issuing banks. It resolves the account detail from VPA with different issuing banks. [--]. Bob authenticates with account details and sets the PIN which is used for 2FA. This goes all the way to the issuing bank"
X Link 2022-09-22T15:10Z 247.4K followers, [---] engagements
"/1 What is (Content Delivery Network) How does CDN make content delivery The diagram below shows why A CDN refers to geographically distributed servers (edge servers) that provide fast delivery of"
X Link 2022-09-26T15:50Z 247.4K followers, [----] engagements
"/1 One picture is worth a thousand words. Interesting database selection trees. iQIYI is one of the largest online video sites in the world with over [---] million monthly active users. Let's look at how they choose relational and NoSQL databases"
X Link 2022-10-03T15:43Z 276.8K followers, [----] engagements
"/3 - Big data analytical systems like Hive and Impala - Other databases like MongoDB HiGraph and TiKV The database selection trees below explain how they choose a database"
X Link 2022-10-03T15:43Z 247.7K followers, [--] engagements
"/1 How will you design the Stack Overflow website If your answer is on-premise servers and monolith (bottom) you would likely fail the interview but that's how it is built in reality"
X Link 2022-10-05T15:38Z 251.7K followers, [----] engagements
"/3 🔸Steps 2-5: The acquiring process. The payment gateway accepts the transaction and collects payment info. It is then sent to a payment processor which uses customer information to collect payments. The acquiring processor sends the transaction to the card network"
X Link 2022-10-13T15:45Z 247.3K followers, [--] engagements
"/1 Have you heard of Domain-Driven Design (DDD) a major software design approach"
X Link 2022-11-08T16:25Z 277.6K followers, [----] engagements
"Many people love GraphQL many people hate it. How about you In this video we talk about: - What is GraphQL - When to use it - Trade-offs - GraphQL vs. REST Watch the YouTube video now: https://www.youtube.com/watchv=yWzKJPw_VzM https://www.youtube.com/watchv=yWzKJPw_VzM"
X Link 2022-11-10T16:32Z 273.8K followers, [----] engagements
"/4 [--]. The Gmail server stores the email and makes it available to Bob the recipient. [--]. Gmail client fetches new emails through the IMAP/POP server when Bob logs in to Gmail"
X Link 2022-11-18T16:11Z 247.6K followers, [--] engagements
"/5 If you are unfamiliar with email protocols here is a short summary: SMTP: Simple Mail Transfer Protocol (SMTP) is the standard protocol for sending emails from one mail server to another"
X Link 2022-11-18T16:11Z 247.5K followers, [--] engagements
"Twitter Architecture [----] vs. [----]. Whats changed over the past [--] years Thank you @elonmusk for the transparency. 1/2"
X Link 2022-11-19T16:42Z 249.3K followers, 38.8K engagements
"What is a CDN Why should we developers all take advantage of it In this video we will talk about what CDN is and the benefits of CDN including: - Improving latency - Reducing bandwidth - Increasing content availability - DDoS protection Watch it https://www.youtube.com/watchv=RI9np1LWzqw https://www.youtube.com/watchv=RI9np1LWzqw"
X Link 2022-11-29T16:54Z 247.4K followers, [----] engagements
"1/ What are the differences between monolithic and microservice architecture The diagram compares monolithic and microservice architecture in the ideal world"
X Link 2022-11-30T16:45Z 269.3K followers, [----] engagements
"/1 How do you decide which type of database to use There are hundreds or even thousands of databases available today such as Oracle MySQL MariaDB SQLite PostgreSQL Redis ClickHouse MongoDB S3 Ceph etc. How do you select the architecture for your system"
X Link 2022-12-07T16:30Z 272.5K followers, [----] engagements
"/1 What is a DDos (Distributed Denial-of-Service) Attack Why is it hazardous to the services Here is an example of how DDoS works"
X Link 2022-12-16T16:45Z 251K followers, 108.7K engagements
"/1 What is cloud-native Below is a diagram showing the evolution of architecture and processes since the 1980s. Organizations can build and run scalable applications on public private and hybrid clouds using cloud-native technologies"
X Link 2022-12-26T16:45Z 275.4K followers, 235.7K engagements
"Really cool thread about many concepts about the cloud: - IaaS CaaS PaaS FaaS SaaS - Benefits of Cloud Computing - Migrating applications to cloud & modernizing applications - Benefits and use cases of storage in cloud - Object store Block store File store - and more. I have been in cloud tech for 10+ years. Here are some basic concepts that everyone in or aspiring to be in cloud should know Read on 👇 I have been in cloud tech for 10+ years. Here are some basic concepts that everyone in or aspiring to be in cloud should know Read on 👇"
X Link 2023-01-13T06:10Z 270.2K followers, 19.9K engagements
"/6 Step 6-8. Bob now pays the $25 down payment to BNPL. Stripe processes the payment transaction. It is then forwarded to the card network by Stripe. The card network must be paid an interchange fee since this goes through them as well"
X Link 2023-01-26T16:00Z 275.1K followers, [----] engagements
"/7 Step [--]. Bob can now receive the product since it has been released. Steps 10-11. The BNPL provider receives installment payments from Bob every two weeks. Payment gateways process installments by deducting them from credit/debit cards"
X Link 2023-01-26T16:00Z 275.2K followers, [----] engagements
"Next week we will cover: 🔹System Design Interview - Step-by-Step Guide (YT) 🔹Git workflow 🔹Why is Redis fast 🔹API gateway vs. load balancer 🔹Considerations when using cache Subscribe to our weekly free newsletter to learn something new every week: https://bit.ly/3FEGliw https://bit.ly/3FEGliw"
X Link 2023-02-04T16:45Z 247.4K followers, 173.4K engagements
"/1 Git Workflow & Immutability Immutability here means that once data is written into Git it cannot be changed. Modifications only create new data versions. The old data remains unchanged"
X Link 2023-02-06T16:45Z 246K followers, 90.6K engagements
"ChatGPT Jasper AI copy ai How are AI writers different The diagram below shows how we can use popular AI writers. In general the tools cover the workflow of copywriting and content creation. They can choose topics write content and optimize the content"
X Link 2023-02-10T16:45Z 247.3K followers, 121.2K engagements
"Most people think Redis is just for caching. But it can do so much more than that. Redis is good for: - Session store - Distributed lock - Counter - Rate limiter - Ranking/leaderboard - etc. Watch and subscribe here: https://youtu.be/a4yX7RUgTxI https://youtu.be/a4yX7RUgTxI"
X Link 2023-02-16T16:33Z 250.2K followers, 148.2K engagements
"/7 When a third-party payment service is done it notifies the payment service if the payment is successful or failed. Webhook calls are usually part of the systems state machine"
X Link 2023-02-27T16:45Z 247.4K followers, 12.1K engagements
"/8 🔹 [--]. gRPC Released in [----] gRPC is used for communications among microservices. 🔹 [--]. SOAP SOAP stands for Simple Object Access Protocol. Its payload is XML only suitable for communications between internal systems"
X Link 2023-02-27T16:45Z 247.4K followers, [--] engagements
"/1 Which SQL statements are most commonly used A database consists of three types of objects: - Database - Table - Index Each object type has four operations (known as CRUD): - Create - Read - Update - Delete"
X Link 2023-03-31T15:45Z 247.4K followers, 85K engagements
"/2 Therefore there are a total of [--] categories of SQL statements. Some categories have been excluded from the graph because they are less commonly used. It is highly recommended that you become familiar with the remaining categories"
X Link 2023-03-31T15:45Z 247.3K followers, [----] engagements
"/4 The build config minimizes the build requirement including language versioning dependencies major versions and lastly how to resolve version conflicts"
X Link 2023-04-17T15:45Z 276K followers, [----] engagements
"/5 For local builds the Brazil build tool interprets the build configuration as a Directed Acyclic Graph (DAG) retrieves packages from the myservices private space (VersionSet) called myservice-cpp-version-set generates the language-specific build configuration"
X Link 2023-04-17T15:45Z 276K followers, [----] engagements
"System Design Blueprint: The Ultimate Guide. Hope this checklist is useful to guide your discussions during the interview process. This briefly touches on: - LB - Gateway - Communication - CDN - Database - Cache - MQ - ID Generation - Scalability - Availability - More"
X Link 2023-04-20T15:45Z 248.1K followers, 245.3K engagements
"/2 🔹 When we swipe a credit/debit card at a merchant it is a pull payment where the money is sent from the cardholder to the merchant. The merchant pulls money from the cardholders account and the cardholder approves the transaction"
X Link 2023-05-18T15:45Z 238K followers, [----] engagements
"/3 🔹 With Visa Direct or Mastercard Send the push payments enable merchant corporate and government disbursements. Step 1: The merchant initiates the push payment through a digital channel. It can be a mobile phone or a bank branch etc"
X Link 2023-05-18T15:45Z 237.7K followers, [----] engagements
"/6 Push payments are indeed an interesting innovation which complements the digital wallet strategy in Visa and Mastercard. The abstraction of account masks the complication of different funding or consuming channels"
X Link 2023-05-18T15:45Z 221.4K followers, [--] engagements
"What is the journey of a Slack message In a recent technical article Slack explains how its real-time messaging framework works. Here is my short summary: 🔹Because there are too many channels the Channel Server (CS) uses consistent hashing to allocate millions of channels to many channel servers. 🔹Slack messages are delivered through WebApp and Admin Server to the correct Channel Server. 🔹Through Gate Server and Envoy (a proxy) the Channel Server will push messages to message receivers. 🔹Message receivers use WebSocket which is a bi-directional messaging mechanism so they are able to"
X Link 2023-05-24T15:34Z 235.7K followers, 69.3K engagements
"Vector databases are so hot right now but what is a Vector DB The diagram below shows a comparison between a vector database and other types of databases. 🔹 A vector database indexes and stores vector embeddings for fast retrieval and similarity search with capabilities like CRUD operations metadata filtering and horizontal scaling. 🔹 Recent advances in AGI (Artificial General Intelligence) have made vector databases so popular. 🔹 A vector database stores high-dimensional vectors extracted from various unstructured data like audio video image and text. Then we can calculate the similarity"
X Link 2023-06-08T15:18Z 221.4K followers, 148.9K engagements
"How Discord Stores 1000000000000s Of Messages The diagram below shows the evolution of message storage at Discord. MongoDB ➡ Cassandra ➡ ScyllaDB We have created a YouTube video that delves deep into it. Watch and subscribe here: https://www.youtube.com/watchv=O3PwuzCvAjI https://www.youtube.com/watchv=O3PwuzCvAjI"
X Link 2023-06-18T16:57Z 236K followers, 192.3K engagements
"Twitter [---] Tech Stack Mobile: Swift Kotlin PWA Web: JS React Redux Services: Mesos Finagle Caching: Pelikan Cache Redis Databases: Manhattan MySQL PostgreSQL . Based on Twitter engineering blogs. @elonmusk when will Twitter [---] tech stack be available"
X Link 2023-06-27T15:45Z 235.7K followers, 129.6K engagements
"OAuth [---] is an industry-standard protocol for authorization but few know how it works In this video we will delve into: - What Oauth2 is really about - How it works Watch and subscribe here: https://youtu.be/ZV5yTm4pT8g https://youtu.be/ZV5yTm4pT8g"
X Link 2023-06-29T15:32Z 241.8K followers, 140.8K engagements
"We are considering offering one of the following options in the future related to System Design. Which one are you most interested in"
X Link 2023-07-09T20:48Z 221.4K followers, 21.6K engagements
"Top architectural styles In software development architecture plays a crucial role in shaping the structure and behavior of software systems. It provides a blueprint for system design detailing how components interact with each other to deliver specific functionality. They also offer solutions to common problems saving time and effort and leading to more robust and maintainable systems. However with the vast array of architectural styles and patterns available it can take time to discern which approach best suits a particular project or system. Aims to shed light on these concepts helping you"
X Link 2023-07-10T15:17Z 247.4K followers, 307.7K engagements
"Firewall explained to Kids and Adults. A firewall is a network security system that controls and filters network traffic acting as a watchman between a private network and the public Internet. They come in two broad categories: Software-based: installed on individual devices for protection Hardware-based: stand-alone devices that safeguard an entire network. Firewalls have several types each designed for specific security needs: [--]. Packet Filtering Firewalls: Examines packets of data accepting or rejecting based on source destination or protocols. [--]. Circuit-level Gateways: Monitors TCP"
X Link 2023-07-11T15:16Z 221.4K followers, 123.6K engagements
"Top [--] most commonly used Server Types. [--]. Web Server: Hosts websites and delivers web content to clients over the internet [--]. Mail Server: Handles the sending receiving and routing of emails across networks [--]. DNS Server: Translates domain names (like bytebytego .com) into"
X Link 2023-07-19T01:30Z 221.3K followers, 190.5K engagements
"5 important components of Linux 🔹 System In the system component we need to learn modules like system APIs device drivers I/O buses etc. 🔹 Memory In memory management we need to learn modules like physical memory virtual memory memory mappings object allocation etc"
X Link 2023-07-30T06:48Z 221.4K followers, 165.4K engagements
"JPMorgan Wells Fargo and other major banks will use the new Federal Reserve's 'FedNow' instant payment system. Let's take a look at how it works. Federal Reserve launched FedNow instant payment service on [--] Jul. It allows retail clients to send and receive money within"
X Link 2023-08-03T17:27Z 221.4K followers, 262K engagements
"Top [--] Ways to 10x Your API Performance [--]. Pagination This is a common optimization when the size of the result is large. The results are streaming back to the client to improve the service responsiveness. [--]. Asynchronous Logging Synchronous logging deals with the disk for every"
X Link 2023-08-05T02:22Z 221.3K followers, 242.8K engagements
"An interesting list of subjects that should be mandatory in schools. While academics are essential it's crucial to acknowledge that many elements in this diagram would have been beneficial to learn earlier. Over to you: what else should be on the list What are the top 3"
X Link 2023-07-28T15:02Z 221.4K followers, 104.2K engagements
"What does API gateway do The diagram below shows the detail. Step [--] - The client sends an HTTP request to the API gateway. Step [--] - The API gateway parses and validates the attributes in the HTTP request. Step [--] - The API gateway performs allow-list/deny-list checks. Step [--] - The API gateway talks to an identity provider for authentication and authorization. Step [--] - The rate limiting rules are applied to the request. If it is over the limit the request is rejected. Steps [--] and [--] - Now that the request has passed basic checks the API gateway finds the relevant service to route to by path"
X Link 2023-07-29T15:30Z 221.3K followers, 297.5K engagements
"My LinkedIn account has been locked. Im not sure whats going on and received no email alert. I have uploaded my ID already. Can someone work there help me take a look"
X Link 2023-07-31T17:49Z 221.3K followers, 92.5K engagements
"CI/CD Pipeline Explained to Kids Section [--] - SDLC with CI/CD The software development life cycle (SDLC) consists of several key stages: development testing deployment and maintenance. CI/CD automates and integrates these stages to enable faster more reliable releases. When code is pushed to a git repository it triggers an automated build and test process. End-to-end (e2e) test cases are run to validate the code. If tests pass the code can be automatically deployed to staging/production. If issues are found the code is sent back to development for bug fixing. This automation provides fast"
X Link 2023-08-01T15:10Z 248.1K followers, 387.9K engagements
"Docker vs. Kubernetes. Which one should we use What is Docker Docker is an open-source platform that allows you to package distribute and run applications in isolated containers. It focuses on containerization providing lightweight environments that encapsulate applications and their dependencies. What is Kubernetes Kubernetes often referred to as K8s is an open-source container orchestration platform. It provides a framework for automating the deployment scaling and management of containerized applications across a cluster of nodes. How are both different from each other Docker: Docker"
X Link 2023-08-02T15:14Z 221.3K followers, 276.1K engagements
"Cloud Native Anti Patterns By being aware of these anti-patterns and following cloud-native best practices you can design build and operate more robust scalable and cost-efficient cloud-native applications. [--]. Monolithic Architecture: One large tightly coupled application running on the cloud hindering scalability and agility [--]. Ignoring Cost Optimization: Cloud services can be expensive and not optimizing costs can result in budget overruns [--]. Mutable Infrastructure: - Infrastructure components are to be treated as disposable and are never modified in place - Failing to embrace this approach"
X Link 2023-08-03T15:20Z 221.3K followers, 159.3K engagements
"What is GraphQL Is it a replacement for the REST API The diagram below shows the quick comparison between REST and GraphQL. 🔹GraphQL is a query language for APIs developed by Meta. It provides a complete description of the data in the API and gives clients the power to ask for exactly what they need. 🔹GraphQL servers sit in between the client and the backend services. 🔹GraphQL can aggregate multiple REST requests into one query. GraphQL server organizes the resources in a graph. 🔹GraphQL supports queries mutations (applying data modifications to resources) and subscriptions (receiving"
X Link 2023-08-04T15:09Z 221.4K followers, 194.5K engagements
"Next week we will talk about the following: - Git Merge vs. Rebase vs. Squash - the forever workflow debate - Hidden costs of using the cloud - How Chrome works - Uber's CI/CD pipeline - How HTTPS works Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2023-08-05T15:52Z 221.4K followers, 81.2K engagements
"OAuth [---] Explained With Simple Terms. OAuth [---] is a powerful and secure framework that allows different applications to securely interact with each other on behalf of users without sharing sensitive credentials. The entities involved in OAuth are the User the Server and the Identity Provider (IDP). What Can an OAuth Token Do When you use OAuth you get an OAuth token that represents your identity and permissions. This token can do a few important things: Single Sign-On (SSO): With an OAuth token you can log into multiple services or apps using just one login making life easier and safer."
X Link 2023-08-07T15:03Z 221.3K followers, 452.8K engagements
"Uber CI/CD Tech Stack Uber is one of the most innovative companies in the engineering field. Lets take a closer look at their CI/CD tech stacks. This post is based on research on Uber engineering blogs. If you spot any inaccuracies please let us know. Project planning:"
X Link 2023-08-08T14:39Z 221.3K followers, [----] engagements
"Top [--] Forms of Authentication Mechanisms [--]. SSH Keys: Cryptographic keys are used to access remote systems and servers securely [--]. OAuth Tokens: Tokens that provide limited access to user data on third-party applications [--]. SSL Certificates: Digital certificates ensure secure and encrypted communication between servers and clients [--]. Credentials: User authentication information is used to verify and grant access to various systems and services Over to you: How do you manage those security keys Is it a good idea to put them in a GitHub repository Subscribe to our weekly newsletter to get a"
X Link 2023-08-09T15:16Z 221.3K followers, 388.4K engagements
"Git Merge vs. Rebase vs. Squash Commit What are the differences When we from one Git branch to another we can use git merge or git rebase. The diagram below shows how the two commands work. This creates a new commit G in the main branch. G ties the histories of both main and feature branches. Git merge is -. Neither the main nor the feature branch is changed. Git rebase moves the feature branch histories to the head of the main branch. It creates new commits E F and G for each commit in the feature branch. The benefit of rebase is that it has . Rebase can be dangerous if the golden rule"
X Link 2023-08-10T15:42Z 221.4K followers, 258.5K engagements
"Leadership Styles Around The World Do you agree with the diagram Credit: When cultures collide book Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2023-08-11T15:45Z 221.3K followers, 100.9K engagements
"Our system design newsletter recently reached 500k subscribers. Here are the [--] most popular ones: 👇 - Understanding Database Types - Password Session Cookie Token JWT SSO OAuth - Authentication Explained - Part [--] - Database Indexing Strategies - Mastering the Art of API Design - Password Session Cookie Token JWT SSO OAuth - Authentication Explained - Part [--] Subscribe here:"
X Link 2023-08-12T15:36Z 221.4K followers, 153.2K engagements
"How Discord Stores Trillions Of Messages . . The diagram below shows the evolution of message storage at Discord: MongoDB ➡ Cassandra ➡ ScyllaDB In [----] the first version of Discord was built on top of a single MongoDB replica. Around Nov [----] MongoDB stored [---] million messages and the RAM couldnt hold the data and index any longer. The latency became unpredictable. Message storage needs to be moved to another database. Cassandra was chosen. In [----] Discord had [--] Cassandra nodes and stored billions of messages. At the beginning of [----] it had [---] nodes with trillions of messages. At this"
X Link 2023-08-13T15:39Z 221.4K followers, 234.3K engagements
"A cheat sheet of various databases in cloud services along with their corresponding open-source/3rd-party options. Choosing the right database for your project is a complex task. The multitude of database options each suited to distinct use cases can quickly lead to decision fatigue. We hope this cheat sheet provides the high level direction to pinpoint the right service that aligns with your project's needs and avoid potential pitfalls. Note: Google has limited documentation for their database use cases. Even though we did our best to look at what was available and arrived at the best option"
X Link 2023-08-14T15:23Z 221.4K followers, 202.5K engagements
"How does Chrome work The diagram below shows the architecture of a modern browser. It is based on our understanding of Inside look at modern web browser published by the chrome team. There are in general [--] processes: browser process renderer process GPU process and plugin process. 🔹 Browser process controls address bar bookmarks back and forward buttons etc. 🔹 Renderer process controls anything inside of the tab where a website is displayed. 🔹 GPU process handles GPU tasks. 🔹 Plugin process controls the plugins used by the websites. The browser process coordinates with other processes."
X Link 2023-08-15T15:24Z 221.4K followers, 107.3K engagements
"HTTPS SSL Handshake and Data Encryption Explained to Kids. HTTPS: Safeguards your data from eavesdroppers and breaches. Understand how encryption and digital certificates create an impregnable shield. SSL Handshake: Behind the Scenes Witness the cryptographic protocols that establish a secure connection. Experience the intricate exchange of keys and negotiation. Secure Data Transmission: Navigating the Tunnel Journey through the encrypted tunnel forged by HTTPS. Learn how your information travels while shielded from cyber threats. HTML's Role: Peek into HTML's role in structuring the web."
X Link 2023-08-16T15:28Z 221.4K followers, 277.5K engagements
"Top [--] Load Balancing Algorithms Every Developer Should Know The diagram below shows [--] common algorithms. 🔹 Static Algorithms [--]. Round robin The client requests are sent to different service instances in sequential order. The services are usually required to be stateless. [--]. Sticky round-robin This is an improvement of the round-robin algorithm. If Alices first request goes to service A the following requests go to service A as well. [--]. Weighted round-robin The admin can specify the weight for each service. The ones with a higher weight handle more requests than others. [--]. Hash This algorithm"
X Link 2023-08-17T15:37Z 221.3K followers, 136.4K engagements
"HTTP [---] - HTTP [---] - HTTP [---] - HTTP [---] (QUIC). What problem does each generation of HTTP solve The diagram below illustrates the key features. 🔹HTTP [---] was finalized and fully documented in [----]. Every request to the same server requires a separate TCP connection. 🔹HTTP [---] was published in [----]. A TCP connection can be left open for reuse (persistent connection) but it doesnt solve the HOL (head-of-line) blocking issue. HOL blocking - when the number of allowed parallel requests in the browser is used up subsequent requests need to wait for the former ones to complete. 🔹HTTP [---] was"
X Link 2023-08-18T15:35Z 221.4K followers, 247K engagements
"IaaS PaaS Cloud Native How do we get here The diagram below shows two decades of cloud evolution. [----] - VMWare - Virtualization via hypervisor [----] - AWS - IaaS (Infrastructure as a Service) [----] - Heroku - PaaS (Platform as a Service) [----] - OpenStack - Open-source IaaS [----] - CloudFoundry - Open-source PaaS [----] - Docker - Containers [----] - CNCF (Cloud Native Computing Foundation) - Cloud Native 🔹 Over to you: Which ones have you used Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2023-08-21T15:27Z 221.4K followers, 203.9K engagements
"How did AWS grow from just a few services in [----] to over [---] fully-featured services Let's take a look. Since [----] it has become a cloud computing leader offering foundational infrastructure platforms and advanced capabilities like serverless computing and AI. This expansion empowered innovation allowing complex applications without extensive hardware management. AWS also explored edge and quantum computing staying at tech's forefront. This evolution mirrors cloud computing's shift from niche to essential benefiting global businesses with efficiency and scalability Happy to present the"
X Link 2023-08-22T15:11Z 221.4K followers, 134K engagements
"Hidden Costs of the Cloud: The biggest misconception about the cloud is that it's cheap. While it may be inexpensive or even free to get started the complexity often leads to hidden costs resulting in large cloud bills. The purpose of this post is not to discourage using the cloud. Im a big fan of the cloud. I simply want to raise awareness about this issue as it's one of the critical topics that isn't often discussed. While AWS is used as an example similar cost structures apply to other cloud providers. [--]. Free Tier Ambiguity: AWS offers three different types of free offerings for common"
X Link 2023-08-23T15:21Z 249.5K followers, 124K engagements
"Algorithms You Should Know Before You Take System Design Interviews These algorithms arent just useful for acing system design interviews - theyre also great tools for building real-world systems. We made a video on this topic. The video contains an updated list and provides real-world case studies. Watch here:"
X Link 2023-08-24T15:37Z 221.3K followers, 131.4K engagements
"It is still tough to get interviews. People are getting creative with their resumes. This resume is created using Figma. Do you think it will grab recruiters/hiring managers attention Resume credit: Aditya Sharma on LinkedIn Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2023-08-25T15:20Z 221.4K followers, 49.9K engagements
"Understanding Database Types To make the best decision for our projects it is essential to understand the various types of databases available in the market. We need to consider key characteristics of different database types including popular options for each and compare their use cases. Subscribe to our weekly newsletter to get a Free System Design PDF (158"
X Link 2023-08-26T15:38Z 221.4K followers, 99.1K engagements
"URL URI URN - What are the differences The diagram below shows a comparison of URL URI and URN. 🔹 URI URI stands for Uniform Resource Identifier. It identifies a logical or physical resource on the web. URL and URN are subtypes of URI. URL locates a resource while URN names a resource. A URI is composed of the following parts: scheme://authoritypathquery# fragment 🔹 URL URL stands for Uniform Resource Locator the key concept of HTTP. It is the address of a unique resource on the web. It can be used with other protocols like FTP and JDBC. 🔹 URN URN stands for Uniform Resource Name. It uses"
X Link 2023-08-27T15:46Z 221.3K followers, 181.2K engagements
"OAuth [---] Flows Authorization Code Flow: The most common OAuth flow. After user authentication the client receives an authorization code and exchanges it for an access token and refresh token. Client Credentials Flow: Designed for single-page applications. The access token is returned directly to the client without an intermediate authorization code. Implicit Code Flow: Designed for single-page applications. The access token is returned directly to the client without an intermediate authorization code. Resource Owner Password Grant Flow: Allows users to provide their username and password"
X Link 2023-08-28T15:18Z 221.3K followers, 171.9K engagements
"How does a Password Manager such as 1Password or Lastpass work How does it keep our passwords safe The diagram below shows how a typical password manager works. A password manager generates and stores passwords for us. We can use it via application browser extension or command line. Not only does a password manager store passwords for individuals but also it supports password management for teams in small businesses and big enterprises. Lets go through the steps. Step 1: When we sign up for a password manager we enter our email address and set up an account password. The password manager"
X Link 2023-08-29T15:36Z 221.3K followers, 235.8K engagements
"Types of Software Engineers and Their Typically Required Skills In this overview we'll explore three key types of Software engineers: [--]. Front-End Engineer: Specializes in creating user interfaces using HTML CSS and JavaScript. They focus on ensuring that apps are visually"
X Link 2023-08-30T15:25Z 221.4K followers, [----] engagements
"Top [--] Software Architectural Patterns In software development architecture plays a crucial role in shaping the structure and behavior of software systems. It provides a blueprint for system design detailing how components interact with each other to deliver specific functionality. They also offer solutions to common problems saving time and effort and leading to more robust and maintainable systems. However with the vast array of architectural styles and patterns available it can take time to discern which approach best suits a particular project or system. Aims to shed light on these"
X Link 2023-08-31T15:33Z 221.4K followers, 108.4K engagements
"How to design secure web API access for your website When we open web API access to users we need to make sure each API call is authenticated. This means the user must be who they claim to be. In this post we explore two common ways: [--]. Token based authentication [--]. HMAC (Hash-based Message Authentication Code) authentication The diagram below illustrates how they work. Token based Step [--] - the user enters their password into the client and the client sends the password to the Authentication Server. Step [--] - the Authentication Server authenticates the credentials and generates a token with an"
X Link 2023-09-01T15:39Z 241.1K followers, 141.6K engagements
"Do you believe that Google Meta Uber Twitter and Airbnb put almost all of their code in one repository This practice is called a monorepo. Monorepo vs. Microrepo. Which is the best Why do different companies choose different options Monorepo isn't new; Linux and Windows were both created using Monorepo. To improve scalability and build speed Google developed its internal dedicated toolchain to scale it faster and strict coding quality standards to keep it consistent. Amazon and Netflix are major ambassadors of the Microservice philosophy. This approach naturally separates the service code"
X Link 2023-09-02T15:31Z 274.2K followers, 349.3K engagements
"Linux commands illustrated on one page Take a look at how many you know :) 🔹Controlling processes: kill killall nice 🔹Scheduliing jobs: sleep watch crontab 🔹Host location: host whois ping traceroute 🔹Network connections: ssh telnet scp ftp 🔹Screen output: echo printf seq clear 🔹Viewing Processes: ps uptime top free 🔹And many more You can find the full diagram in the reply. -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2023-09-03T15:45Z 210K followers, 93.4K engagements
"How is data transmitted between applications The diagram below shows how a server sends data to another server. Assume a chat application running in the user space sends out a chat message. The message is sent to the send buffer in the kernel space. The data then goes through the network stack and is wrapped with a TCP header an IP header and a MAC header. The data also goes through qdisc (Queueing Disciplines) for flow control. Then the data is sent to the NIC (Network Interface Card) via a ring buffer. The data is sent to the internet via NIC. After many hops among routers and switches the"
X Link 2023-09-04T15:38Z 221.3K followers, 152.8K engagements
"Netflix's Tech Stack. This post is based on research from many Netflix engineering blogs and open-source projects. If you come across any inaccuracies please feel free to inform us. Mobile and web: Netflix has adopted Swift and Kotlin to build native mobile apps. For its web application it uses React. Frontend/server communication: GraphQL. Backend services: Netflix relies on ZUUL Eureka the Spring Boot framework and other technologies. Databases: Netflix utilizes EV cache Cassandra CockroachDB and other databases. Messaging/streaming: Netflix employs Apache Kafka and Fink for messaging and"
X Link 2023-09-05T15:15Z 221.3K followers, 458K engagements
". @NetflixEng would you be interested in collaborating on your official tech stack I'd love to work alongside your engineers to create an easy-to-understand infographic. It could benefit millions of engineers"
X Link 2023-09-05T21:14Z 221.3K followers, 56.7K engagements
"Explaining [--] Popular Network Protocols in [--] Diagram. The diagram below shows how network protocols are used in a typical eCommerce website. [--]. DNS (Domain Name Service) When we type a URL (Uniform Resource Locator) in a web browser a DNS resolver translates the hostname of the URL to an IP address. This helps us locate the web resources. The DNS resolver communicates with a hierarchy of name servers to retrieve this mapping. More details will follow. [--]. HTTP/HTTPS The user interacts with the website via a REST API which leverages HTTP to manage request methods. When a user decides to purchase"
X Link 2023-09-06T15:15Z 221.4K followers, 117.8K engagements
"How Do C++ Java Python Work The diagram shows how the compilation and execution work. Compiled languages are compiled into machine code by the compiler. The machine code can later be executed directly by the CPU.Examples: C C++ Go. A bytecode language like Java compiles the source code into bytecode first then the JVM executes the program. Sometimes JIT (Just-In-Time) compiler compiles the source code into machine code to speed up the execution.Examples: Java C# Interpreted languages are not compiled. They are interpreted by the interpreter during runtime. Examples: Python Javascript Ruby"
X Link 2023-09-07T15:30Z 247.4K followers, 341.5K engagements
"Big milestone : Our system design YouTube channel has grown to half a million subscribers. Here are the top five most-liked topics: - Why is Kafka fast - HTTP/1 to HTTP/2 to HTTP/3 - Top [--] Most Popular API Architecture Styles - Kubernetes Explained in [--] Minutes - What Is REST API Examples And How To Use It Thank you everyone ❤ Subscribe to our YouTube channel here:"
X Link 2023-09-08T15:16Z 210K followers, 137K engagements
"10 Key Data Structures We Use Every Day - list: keep your Twitter feeds - stack: support undo/redo of the word editor - queue: keep printer jobs or send user actions in-game - hash table: cashing systems - Array: math operations - heap: task scheduling - tree: keep the HTML document or for AI decision - suffix tree: for searching string in a document - graph: for tracking friendship or path finding - r-tree: for finding the nearest neighbor - vertex buffer: for sending data to GPU for rendering Over to you: Which additional data structures have we overlooked -- Subscribe to our weekly"
X Link 2023-09-09T15:44Z 221.3K followers, 188.3K engagements
"My recommended materials for cracking your next technical interview: Coding - Leetcode - Cracking the coding interview book - Neetcode System Design Interview - System Design Interview book [--] [--] by Alex Xu - Grokking the system design by Design Guru - Design Data-intensive Application book Behavioral interview - Tech Interview Handbook (Github repo) - A Life Engineered (YT) - STAR method (general method) OOD Interview - Interviewready - OOD by educative - Head First Design Patterns Book Mock interviews - Interviewingio - Pramp - Meetapro Apply for Jobs - Linkedin - Monster - Indeed Over to"
X Link 2023-09-11T15:15Z 221.3K followers, 686.5K engagements
"A nice cheat sheet of different monitoring infrastructure in cloud services. This cheat sheet offers a concise yet comprehensive comparison of key monitoring elements across the three major cloud providers and open-source / 3rd party tools. Let's delve into the essential monitoring aspects covered: - Data Collection: Gather information from diverse sources to enhance decision-making. - Data Storage: Safely store and manage data for future analysis and reference. - Data Analysis: Extract valuable insights from data to drive informed actions. - Alerting: Receive real-time notifications about"
X Link 2023-09-12T15:11Z 276.3K followers, 178.5K engagements
"Uber Tech Stack This post is based on research from many Uber engineering blogs and open-source projects. If you come across any inaccuracies please feel free to inform us. The corresponding links are added in the comment section. Web frontend: Uber builds Fusion.js as a modern React framework to create robust web applications. They also develop visualization.js for geospatial visualization scenarios. Mobile side: Uber builds the RIB cross-platform with the VIPER architecture instead of MVC. This architecture can work with different languages: Swift for iOS and Java for Android. Service mesh:"
X Link 2023-09-13T15:17Z 236.5K followers, 241.9K engagements
"One picture is worth a thousand words - Top [--] Caching Strategies. When we introduce a cache into the architecture synchronization between the cache and the database becomes inevitable. Lets look at [--] common strategies how we keep the data in sync. 🔹 Read Strategies: Cache aside Read through 🔹 Write Strategies: Write around Write back Write through The caching strategies are often used in combination. For example write-around is often used together with cache-aside to make sure the cache is up-to-date. Over to you: What strategies have you used Subscribe to our weekly newsletter to get a"
X Link 2023-09-14T15:40Z 221.4K followers, 56.9K engagements
"Next week we will talk about the following topics: - System Design Blueprint - Database Sharding - Write Code That Works on All Platforms - AWS for the Overachiever - Evolution of message queues Over to you: If you have any topics that you would like us to cover please leave"
X Link 2023-09-16T15:43Z 221.4K followers, [--] engagements
"This is the flowchart of how slack decides to send a notification. It is a great example of why a simple feature may take much longer to develop than many people think. When we have a great design users may not notice the complexity because it feels like the feature just working as intended. Whats your takeaway from this diagram Image source: Slack eng blog Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/3KCnWXq https://bit.ly/3KCnWXq"
X Link 2023-09-17T15:24Z 269.1K followers, 249.5K engagements
"System Design Blueprint: The Ultimate Guide. The method to download the high-resolution PDF is available at the end. We've created a template to tackle various system design problems in interviews. Hope this checklist is useful to guide your discussions during the interview process. This briefly touches on the following discussion points: - Load Balancing - API Gateway - Communication Protocols - Content Delivery Network (CDN) - Database - Cache - Message Queue - Unique ID Generation - Scalability - Availability - Performance - Security - Fault Tolerance and Resilience - And more Subscribe to"
X Link 2023-09-19T15:20Z 221.3K followers, 270.9K engagements
"Many Are Looking for the Definitive Guide on How to Choose the Right Stack The ANSWER is. There is no one-size-fits-all guide; it all depends on your specific needs and picking the right stack is HARD. Fortunately at this point in time technology is usually no longer a limiting factor. Most startups should be able to get by with most technologies they find. So spend less time on picking the perfect tech; instead focus on your customers and keep building. Over to you all: What do you think is causing this fragmentation in tech stack choices Image source: CNCF Cloud Native Interactive Landscape"
X Link 2023-09-21T15:31Z 221.3K followers, 76.2K engagements
"You can find the CNCF Cloud Native Interactive Landscape here. It's pretty cool: https://landscape.cncf.io/ https://landscape.cncf.io/"
X Link 2023-09-21T15:32Z 247.6K followers, [----] engagements
"Made a simple visual guide to help everyone understand the key considerations when designing or using caching systems. - What is a cache - Why do we need cache - Where is cache used - Cache deployment - Distributed cache - Cache replacement and invalidation - Cache strategies - Caching challenges - And more. 📩 We will write more in-depth articles on these topics. Subscribe to our newsletter so you won't miss out:"
X Link 2023-09-23T15:39Z 221.4K followers, 118.2K engagements
"Thanks. A thundering herd occurs in large-scale systems when a sudden influx of requests overwhelms the system. This can lead to performance degradation or even system-wide outages. Such events can arise from various reasons including cache misses on popular items sudden spikes in user traffic or service restarts after maintenance"
X Link 2023-09-23T16:12Z 247.4K followers, [----] engagements
"How do we transform a system to be Cloud Native The diagram below shows the action spectrum and adoption roadmap. You can use it as a blueprint for adopting cloud-native in your organization. For a company to adopt cloud native architecture there are [--] aspects in the spectrum: [--]. Application definition development [--]. Orchestration and management [--]. Runtime [--]. Provisioning [--]. Observability [--]. Serverless Most companies start from Step [--] containerization and gradually adopt CI/CD service orchestration. This microservice architecture significantly increases the number of instances to manage so"
X Link 2023-09-25T15:08Z 221.4K followers, 148.5K engagements
"Explaining Sessions Tokens JWT SSO and OAuth in One Diagram. The method to download the high-resolution PDF is available at the end. Understanding these backstage maneuvers helps us build secure seamless experiences. How do you see the evolution of web session management impacting the future of web applications and user experiences Subscribe to our newsletter to download the - . After signing up find the download link on the success page:"
X Link 2023-09-26T15:43Z 221.4K followers, 159.8K engagements
"What is Event Sourcing How is it different from normal CRUD design The diagram below shows a comparison of normal CRUD system design and event sourcing system design. We use an order service as an example. The event sourcing paradigm is used to design a system with determinism. This changes the philosophy of normal system designs. How does this work Instead of recording the order states in the database the event sourcing design persists the events that lead to the state changes in the event store. The event store is an append-only log. The events must be sequenced with incremental numbers to"
X Link 2023-09-28T15:22Z 221.4K followers, 202.4K engagements
"What is k8s (Kubernetes) k8s is a container orchestration system. It is used for container deployment and management. Its design is greatly impacted by Googles internal system Borg. A k8s cluster consists of a set of worker machines called nodes that run containerized applications. Every cluster has at least one worker node. The worker node(s) host the Pods that are the components of the application workload. The control plane manages the worker nodes and the Pods in the cluster. In production environments the control plane usually runs across multiple computers and a cluster usually runs"
X Link 2023-09-29T16:01Z 246.3K followers, 134.1K engagements
"Almost every software engineer has used Git before but only a handful know how it works. To begin with it's essential to identify where our code is stored. The common assumption is that there are only two locations - one on a remote server like Github and the other on our local machine. However this isn't entirely accurate. Git maintains three local storages on our machine which means that our code can be found in four places: - Working directory: where we edit files - Staging area: a temporary location where files are kept for the next commit - Local repository: contains the code that has"
X Link 2023-09-30T15:41Z 221.4K followers, 340.8K engagements
"How to store passwords safely in the database and how to validate a password Lets take a look. 🔹 Storing passwords in plain text is not a good idea because anyone with internal access can see them. 🔹 Storing password hashes directly is not sufficient because it is pruned to precomputation attacks such as rainbow tables. 🔹 To mitigate precomputation attacks we salt the passwords. According to OWASP guidelines a salt is a unique randomly generated string that is added to each password as part of the hashing process. [--] A salt is not meant to be secret and it can be stored in plain text"
X Link 2023-10-01T15:30Z 221.3K followers, 470.2K engagements
"IBM MQ - RabbitMQ - Kafka -Pulsar How do message queue architectures evolve 🔹 IBM MQ IBM MQ was launched in [----]. It was originally called MQSeries and was renamed WebSphere MQ in [----]. It was renamed to IBM MQ in [----]. IBM MQ is a very successful product widely used in the financial sector. Its revenue still reached [--] billion dollars in [----]. 🔹 RabbitMQ RabbitMQ architecture differs from IBM MQ and is more similar to Kafka concepts. The producer publishes a message to an exchange with a specified exchange type. It can be direct topic or fanout. The exchange then routes the message into the"
X Link 2023-10-03T15:11Z 240.7K followers, 625.1K engagements
"Visualizing global temperature changes from [----] to [----] by NASA Research shows that July [----] was the warmest month since [----] probably because of human activities. Some argue that [---] years is just a blip in Earth's long history millions of years. Do you believe human activities cause global warming Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2023-10-06T14:56Z 221.3K followers, 82.3K engagements
"A cheat sheet of various databases in cloud services along with their corresponding open-source/3rd-party options. Choosing the right database for your project is a complex task. The multitude of database options each suited to distinct use cases can quickly lead to decision fatigue. We hope this cheat sheet provides the high level direction to pinpoint the right service that aligns with your project's needs and avoid potential pitfalls. Note: Google has limited documentation for their database use cases. Even though we did our best to look at what was available and arrived at the best option"
X Link 2023-10-07T15:37Z 224.6K followers, 278.2K engagements
"Writing Code that Runs on All Platforms Developing code that functions seamlessly across different platforms is a crucial skill for modern programmers. The need arises from the fact that users access software on a wide range of devices and operating systems. Achieving this universal compatibility can be complex due to differences in hardware software environments and user expectations. Creating code that works on all platforms requires careful planning and understanding of the unique challenges presented by each platform. Better planning and comprehension of cross-platform development not"
X Link 2023-10-08T15:48Z 210K followers, 121.2K engagements
"What happens when you type a URL into a browser The method to download the high-resolution PDF is available at the end. Lets look at the process step by step. Step 1: The user enters a URL (bytebytego .com) into the browser and hits Enter. The first thing we need to do is to translate the URL to an IP address. The mapping is usually stored in a cache so the browser looks for the IP address in multiple layers of cache: the browser cache OS cache local cache and ISP cache. If the browser couldnt find the mapping in the cache it will ask the DNS (Domain Name System) resolver to resolve it. Step"
X Link 2023-10-09T15:41Z 210K followers, 921.5K engagements
"How do companies ship code to production The method to download the high-resolution PDF is available at the end. The diagram below illustrates the typical workflow. Step 1: The process starts with a product owner creating user stories based on requirements. Step 2: The dev team picks up the user stories from the backlog and puts them into a sprint for a two-week dev cycle. Step 3: The developers commit source code into the code repository Git. Step 4: A build is triggered in Jenkins. The source code must pass unit tests code coverage threshold and gates in SonarQube. Step 5: Once the build is"
X Link 2023-10-10T15:34Z 213.7K followers, 1.1M engagements
"Top [--] API Gateway Use Cases. API gateway sits between the clients and services providing API communications between them. [--]. API gateway helps build an ecosystem. The users can leverage an API gateway to access a wider set of tools. The partners in the ecosystem collaborate with each other to provide better integrations for the users. [--]. API gateway builds API marketplace The API marketplace hosts fundamental functionalities for everyone. The developers and businesses can easily develop or innovate in this ecosystem and sell APIs on the marketplace. [--]. API gateway provides compatibility with"
X Link 2023-10-11T15:21Z 207.2K followers, 482.5K engagements
"Docker 101: Streamlining App Deployment. The method to download the high-resolution PDF is available at the end. Fed up with the "it works on my machine" dilemma Docker could be your salvation Docker revolutionizes software development and deployment. Explore the essentials: [--]. Bundle Everything: Docker packs your app and its dependencies into a portable container code runtime tools libraries and settings a tidy self-contained package. [--]. Virtual Isolation: Containers offer packaging and isolation. Run diverse apps with different settings on a single host without conflicts thanks to Linux"
X Link 2023-10-13T15:27Z 209.9K followers, 391.6K engagements
"Best ways to test system functionality Testing system functionality is a crucial step in software development and engineering processes. It ensures that a system or software application performs as expected meets user requirements and operates reliably. Here we delve into the best ways: [--]. Unit Testing: Ensures individual code components work correctly in isolation. [--]. Integration Testing: Verifies that different system parts function seamlessly together. [--]. System Testing: Assesses the entire system's compliance with user requirements and performance. [--]. Load Testing: Tests a system's"
X Link 2023-10-17T15:25Z 209.3K followers, 402.4K engagements
"Cloud Network Components Cheat Sheet. The method to download the high-resolution PDF is available at the end. Network components form the backbone of cloud infrastructure enabling connectivity scalability and functionality in cloud services. These components include routers load balancers and firewalls which ensure data flows efficiently and securely between servers and clients. Additionally Content Delivery Networks (CDNs) optimize content delivery by caching data at edge locations reducing latency and improving user experience. In essence these network elements work together to create a"
X Link 2023-10-19T15:33Z 208.6K followers, 113.1K engagements
"Explaining [--] unique ID generators in distributed systems. The diagram below shows how they work. Each generator has its pros and cons. [--]. UUID A UUID has [---] bits. It is simple to generate and no need to call another service. However it is not sequential and inefficient for database indexing. Additionally UUID doesnt guarantee global uniqueness. We need to be careful with ID conflicts (although the chances are slim.) [--]. Snowflake Snowflakes ID generation process has multiple components: timestamp machine ID and serial number. The first bit is unused to ensure positive IDs. This generator"
X Link 2023-10-20T15:03Z 208.4K followers, 300K engagements
"Our System Design [---] GitHub repo has just reached [-----] stars in [--] days. It's probably one of the fastest-growing repos in history. Thanks to everyone who has starred forked or contributed to the repository What's included in the GitHub repository: - [---] byte-sized system concepts with visuals. - Real-world case studies. - Tips on how to prepare for system design interviews. Topics included (and many many more): - SOAP vs. REST vs. GraphQL vs. RPC - HTTP [---] - HTTP [---] - HTTP [---] - HTTP [---] (QUIC) - CI/CD Pipeline Explained in Simple Terms - [--] Data Structures That Power Your Databases - Top"
X Link 2023-10-21T15:49Z 206K followers, 328.1K engagements
"How Do C++ Java and Python Function We just made a video on this topic. The illustration details the processes of compilation and execution. Languages that compile transform source code into machine code using a compiler. This machine code can subsequently be run directly by the CPU. For instance: C C++ Go. In contrast languages like Java first convert the source code into bytecode. The Java Virtual Machine (JVM) then runs the program. Occasionally a Just-In-Time (JIT) compiler translates the source code into machine code to enhance execution speed. Some examples are Java and C#. Languages"
X Link 2023-10-23T15:33Z 209.9K followers, 151.5K engagements
"A handy cheat sheet for the most popular cloud services (2023 edition). The method to download the high-resolution PDF is available at the end. Whats included - AWS Azure Google Cloud Oracle Cloud Alibaba Cloud - Cloud servers - Databases - Message queues and streaming platforms - Load balancing DNS routing software - Security - Monitoring Over to you - which company is the best at naming things Subscribe to our newsletter to download the - . After signing up find the download link on the success page: https://bytebytego.ck.page/533f09b521 https://bytebytego.ck.page/533f09b521"
X Link 2023-10-24T15:49Z 277.6K followers, 170.6K engagements
"Explain the Top [--] Use Cases of Object Stores. 🔹 What is an object store Object store uses objects to store data. Compared with file storage which uses a hierarchical structure to store files or block storage which divides files into equal block sizes object storage stores metadata together with the objects. Typical products include AWS S3 Google Cloud Storage and Azure Blob Storage. An object store provides flexibility in formats and scales easily. 🔹 Case 1: Data Archiving With the ever-growing amounts of business data we cannot store all the data in core storage systems. We need to have"
X Link 2023-10-25T15:34Z 208.6K followers, 91.1K engagements
"System Design for Everyone We've open-sourced the 'System Design 101' GitHub repo last week which has just reached [-----] stars. Thanks to everyone who has starred forked or contributed to the repository. We got our 1st GitHub badge We are actively working on improving it and have merged [--] pull requests last week. Everyone is welcome to contribute. What's included in the GitHub repository: - [---] byte-sized system concepts with visuals. - Real-world case studies. - Tips on how to prepare for system design interviews. Topics included (and many many more): - SOAP vs. REST vs. GraphQL vs. RPC -"
X Link 2023-10-26T05:09Z 210.2K followers, 214.8K engagements
"Explaining [--] types of API testing. The method to download the high-resolution PDF is available at the end. 🔹 Smoke Testing This is done after API development is complete. Simply validate if the APIs are working and nothing breaks. 🔹 Functional Testing This creates a test plan based on the functional requirements and compares the results with the expected results. 🔹 Integration Testing This test combines several API calls to perform end-to-end tests. The intra-service communications and data transmissions are tested. 🔹 Regression Testing This test ensures that bug fixes or new features"
X Link 2023-10-26T15:38Z 275.6K followers, 343.5K engagements
"API Vs SDK API (Application Programming Interface) and SDK (Software Development Kit) are essential tools in the software development world but they serve distinct purposes: API: An API is a set of rules and protocols that allows different software applications and services to communicate with each other. [--]. It defines how software components should interact. [--]. Facilitates data exchange and functionality access between software components. [--]. Typically consists of endpoints requests and responses. SDK: An SDK is a comprehensive package of tools libraries sample code and documentation that"
X Link 2023-10-27T15:23Z 253.7K followers, 243.9K engagements
"What tech stack is commonly used for microservices Below you will find a diagram showing the microservice tech stack both for the development phase and for production. - 🔹 Define API - This establishes a contract between frontend and backend. We can use Postman or OpenAPI for this. 🔹 Development - Node.js or react is popular for frontend development and java/python/go for backend development. Also we need to change the configurations in the API gateway according to API definitions. 🔹 Continuous Integration - JUnit and Jenkins for automated testing. The code is packaged into a Docker image"
X Link 2023-10-30T06:18Z 275.3K followers, 132.5K engagements
"How To Release A Mobile App The mobile app release process differs from conventional methods. This illustration simplifies the journey to help you understand. Typical Stages in a Mobile App Release Process: [--]. Registration & Development (iOS & Android): - Enroll in Apple's Developer Program and Google Play Console as iOS and Android developer - Code using platform-specific tools: Swift/Obj-C for iOS and Java/Kotlin for Android [--]. Build & Test (iOS & Android): Compile the app's binary run extensive tests on both platforms to ensure functionality and performance. Create a release candidate"
X Link 2023-10-31T15:03Z 210K followers, 242.6K engagements
"Our recommended materials to crack your next tech interview. You can find the link to watch a detailed video explanation at the end of the post. Coding - Leetcode - Cracking the coding interview book - Neetcode System Design Interview - System Design Interview book [--] [--] by Alex Xu - Grokking the system design by Design Guru - Design Data-intensive Application book Behavioral interview - Tech Interview Handbook (Github repo) - A Life Engineered (YT) - STAR method (general method) OOD Interview - Interviewready - OOD by educative - Head First Design Patterns Book Mock interviews - Interviewingio"
X Link 2023-11-02T15:39Z 210K followers, 373.6K engagements
"BIG announcement: weve launched an Instagram account We will post some instagram reels and some videos: We'll be covering a wide range of topics including: 🔹 What happens when you type a URL into your browser 🔹 HTTPs illustrated 🔹 How to avoid double charges 🔹 Why is Kafka fast 🔹How to choose the right database 🔹REST vs GraphQL 🔹Design Facebook newsfeed 🔹Design WhatsApp 🔹Design a URL shortener 🔹Design Robinhood (stock trading app) 🔹Design a proximity service 🔹Design a distributed scheduler 🔹Design Google Docs 🔹And much more Account name: bytebytego If you're interested in"
X Link 2023-11-03T15:18Z 210K followers, 69.3K engagements
"Top [--] Tips for API Security. Next week's topics will be listed at the end. - Use HTTPS - Use OAuth2 - Use WebAuthn - Use Leveled API Keys - Authorization - Rate Limiting - API Versioning - Whitelisting - Check OWASP API Security Risks - Use API Gateway - Error Handling - Input Validation Next week we will talk about: - Release code to production (YouTube) - API landscape - Top log parsing commands - System Design cheatsheet - Top HTTP request methods Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2023-11-04T15:21Z 210K followers, 259.4K engagements
"Which latency numbers you should know Please note those are not precise numbers. They are based on some online benchmarks (Jeff Deans latency numbers + some other sources). 🔹L1 and L2 caches: [--] ns [--] ns E.g.: They are usually built onto the microprocessor chip. Unless you work with hardware directly you probably dont need to worry about them. 🔹RAM access: [---] ns E.g.: It takes around [---] ns to read data from memory. Redis is an in-memory data store so it takes about [---] ns to read data from Redis. 🔹Send 1K bytes over [--] Gbps network: [--] us E.g.: It takes around [--] us to send 1KB of data"
X Link 2023-11-05T16:31Z 212K followers, 113.6K engagements
"Diving into the world of computer memory and storage. - The fundamental duo: RAM and ROM - DDR4 and DDR5 - Firmware and BIOS - SRAM and DRAM - HDD SSD USB Drive SD Card - and more -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2023-11-09T15:52Z 211.8K followers, 98.3K engagements
"Next week we will talk about the following: Single sign-on (SSO) [--] popular network protocols (YouTube) System design acronyms Functional programming vs. imperative programming vs. OOP What happens when Linux starts up -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2023-11-11T16:36Z 212.1K followers, 91.7K engagements
"Why is PostgreSQL voted the by Stackoverflow [----] Developer Survey The diagram shows the many use cases by PostgreSQL - one database that includes almost developers need. 🔹OLTP (Online Transaction Processing) We can use PostgreSQL for CRUD (Create-Read-Update-Delete) operations. 🔹OLAP (Online Analytical Processing) We can use PostgreSQL for analytical processing. PostgreSQL is based on (Hybrid transactional/analytical processing) architecture so it can handle both OLTP and OLAP well. 🔹FDW (Foreign Data Wrapper) A FDW is an extension available in PostgreSQL that allows us to access a"
X Link 2023-11-12T16:51Z 221.3K followers, 214.4K engagements
"Single Sign-On (SSO) explained in simple terms. The method to download the high-resolution PDF is available at the end. The concepts of SSO revolve around the three key players: the User the Identity Provider (IDP) and the Application. [--]. The end-user or individual who seeks access to various applications. [--]. Identity Provider (IDP): An entity responsible for user authentication and verification. Common IDPs include Google Facebook and company-specific systems. [--]. Application: The software or service that the user wants to access. Applications rely on the IDP for user authentication. With SSO"
X Link 2023-11-15T16:31Z 213.8K followers, 231.2K engagements
"Data is cached everywhere from the front end to the back end This diagram illustrates where we cache data in a typical architecture. There are along the flow. 🔹 [--]. Client apps: HTTP responses can be cached by the browser. We request data over HTTP for the first time and it is returned with an expiry policy in the HTTP header; we request data again and the client app tries to retrieve the data from the browser cache first. 🔹 [--]. CDN: CDN caches static web resources. The clients can retrieve data from a CDN node nearby. 🔹 [--]. Load Balancer: The load Balancer can cache resources as well. 🔹 4."
X Link 2023-11-19T16:29Z 213.4K followers, 157.2K engagements
"🎁 Giving Away [---] Digital System Design ML System Design & Newsletter Subscriptions 🎁 : ✅ Like & retweet ✅ Subscribe to our free weekly newsletter: ✅ Winners get all [--] Happy Thanksgiving ❤ The giveaway ends in [--] hours. Winners will receive an email on how to redeem the rewards on Nov 26"
X Link 2023-11-23T16:36Z 215.9K followers, 150.2K engagements
"Thanksgiving Giveaway. Last chance to enter it's the final day Giving Away [---] Digital System Design ML System Design & Newsletter Subscriptions. : ✅ Like & retweet ✅ Subscribe to our free weekly newsletter: ✅ Winners get all [--] Winners will receive an email on how to redeem the rewards on Nov [--]. Happy Thanksgiving ❤"
X Link 2023-11-25T16:36Z 214.8K followers, 104.8K engagements
"Almost every software engineer has used Linux before but only a handful know how its Boot Process works :) Let's dive in. The diagram below shows the steps. Step [--] - When we turn on the power BIOS (Basic Input/Output System) or UEFI (Unified Extensible Firmware Interface) firmware is loaded from non-volatile memory and executes POST (Power On Self Test). Step [--] - BIOS/UEFI detects the devices connected to the system including CPU RAM and storage. Step [--] - Choose a booting device to boot the OS from. This can be the hard drive the network server or CD ROM. Step [--] - BIOS/UEFI runs the boot"
X Link 2023-11-30T16:51Z 215.6K followers, 127.9K engagements
"Explaining JSON Web Token (JWT) with simple terms. We've made a video (YouTube Link at the end). Imagine you have a special box called a JWT. Inside this box there are three parts: a header a payload and a signature. The header is like the label on the outside of the box. It tells us what type of box it is and how it's secured. It's usually written in a format called JSON which is just a way to organize information using curly braces and colons : . The payload is like the actual message or information you want to send. It could be your name age or any other data you want to share. It's also"
X Link 2023-12-05T16:39Z 246.3K followers, 119.4K engagements
"Netflix's Tech Stack. This post is based on research from many Netflix engineering blogs and open-source projects. If you come across any inaccuracies please feel free to inform us. Mobile and web: Netflix has adopted Swift and Kotlin to build native mobile apps. For its web application it uses React. Frontend/server communication: GraphQL. Backend services: Netflix relies on ZUUL Eureka the Spring Boot framework and other technologies. Databases: Netflix utilizes EV cache Cassandra CockroachDB and other databases. Messaging/streaming: Netflix employs Apache Kafka and Fink for messaging and"
X Link 2023-12-10T16:47Z 225.9K followers, 224.8K engagements
"The nice thing about having a strong community is that when I make stupid errors many people notice them and point them out enabling me to fix them quickly and allowing everyone to learn. Thank you This is the updated version"
X Link 2023-12-12T03:10Z 216.9K followers, 68K engagements
"What are the differences between cookies and sessions The diagram below shows how they work. Cookies and sessions are both used to carry user information over HTTP requests including user login status user permissions etc. 🔹 Cookies Cookies typically have size limits (4KB). They carry small pieces of information and are stored on the users devices. Cookies are sent with each subsequent user request. Users can choose to ban cookies in their browsers. 🔹 Sessions Unlike cookies sessions are created and stored on the server side. There is usually a unique session ID generated on the server"
X Link 2023-12-13T16:46Z 216.9K followers, 128.9K engagements
"Types of Memory and Storage - The fundamental duo: RAM and ROM - DDR4 and DDR5 - Firmware and BIOS - SRAM and DRAM - HDD SSD USB Drive SD Card Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2023-12-15T07:00Z 216.9K followers, 56.7K engagements
"A handy cheat sheet for the most popular cloud services (2023 edition). The method to download the high-resolution PDF is available at the end. Whats included - AWS Azure Google Cloud Oracle Cloud Alibaba Cloud - Cloud servers - Databases - Message queues and streaming platforms - Load balancing DNS routing software - Security - Monitoring Over to you - which company is the best at naming things Subscribe to our newsletter to download the - . After signing up find the download link on the success page:"
X Link 2023-12-15T16:35Z 216.9K followers, 64.6K engagements
"Symmetric encryption vs asymmetric encryption Symmetric encryption and asymmetric encryption are two types of cryptographic techniques used to secure data and communications but they differ in their methods of encryption and decryption. 🔹 In symmetric encryption a single key is used for both encryption and decryption of data. It is faster and can be applied to bulk data encryption/decryption. For example we can use it to encrypt massive amounts of PII (Personally Identifiable Information) data. It poses challenges in key management because the sender and receiver share the same key. 🔹"
X Link 2023-12-18T16:52Z 216.9K followers, 68.1K engagements
"There are over [----] engineering blogs. Here are my top [--] favorites: - Netflix TeachBlog - Uber Blog - Cloudflare Blog - Engineering at Meta - LinkedIn Engineering - Discord Blog - AWS Architecture - Slack Engineering - Stripe Blog Over to you - What are some of your favorite engineering blogs -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2023-12-20T16:20Z 216.9K followers, 95.9K engagements
"How does Redis persist data Redis is an in-memory database. If the server goes down the data will be lost. The diagram below shows two ways to persist Redis data on disk: [--]. AOF (Append-Only File) [--]. RDB (Redis Database) Note that data persistence is not performed on the critical path and doesn't block the write process in Redis. 🔹 AOF Unlike a write-ahead log the Redis AOF log is a write-after log. Redis executes commands to modify the data in memory first and then writes it to the log file. AOF log records the commands instead of the data. The event-based design simplifies data recovery."
X Link 2023-12-21T16:41Z 213.4K followers, 47.2K engagements
"IBM MQ - RabbitMQ - Kafka -Pulsar How do message queue architectures evolve 🔹 IBM MQ IBM MQ was launched in [----]. It was originally called MQSeries and was renamed WebSphere MQ in [----]. It was renamed to IBM MQ in [----]. IBM MQ is a very successful product widely used in the financial sector. Its revenue still reached [--] billion dollars in [----]. 🔹 RabbitMQ RabbitMQ architecture differs from IBM MQ and is more similar to Kafka concepts. The producer publishes a message to an exchange with a specified exchange type. It can be direct topic or fanout. The exchange then routes the message into the"
X Link 2023-12-24T16:52Z [--] followers, 81.4K engagements
"How is data sent over the internet What does that have to do with the OSI model How does TCP/IP fit into this [--] Layers in the OSI model are: [--]. Physical Layer [--]. Data Link Layer [--]. Network Layer [--]. Transport Layer [--]. Session Layer [--]. Presentation Layer [--]. Application Layer -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2023-12-25T16:31Z 221.3K followers, 105.5K engagements
"Logging tracing and metrics are [--] pillars of system observability. The diagram below shows their definitions and typical architectures. 🔹 Logging Logging records discrete events in the system. For example we can record an incoming request or a visit to databases as events. It has the highest volume. ELK (Elastic-Logstash-Kibana) stack is often used to build a log analysis platform. We often define a standardized logging format for different teams to implement so that we can leverage keywords when searching among massive amounts of logs. 🔹 Tracing Tracing is usually request-scoped. For"
X Link 2023-12-28T16:47Z 221.8K followers, 115.1K engagements
"How do we incorporate Event Sourcing into the systems Event sourcing changes the programming paradigm from persisting states to persisting events. The event store is the source of truth. Let's look at three examples. [--]. New York Times The newspaper website stores every article image and byline since [----] in an event store. The raw data is then denormalized into different views and fed into different ElasticSearch nodes for website searches. [--]. CDC (Change Data Capture) A CDC connector pulls data from the tables and transforms it into events. These events are pushed to Kafka and other sinks"
X Link 2024-01-03T16:35Z 251.1K followers, 50.2K engagements
"How can Cache Systems go wrong The diagram below shows [--] typical cases where caches can go wrong and their solutions. [--]. Thunder herd problem This happens when a large number of keys in the cache expire at the same time. Then the query requests directly hit the database which overloads the database. There are two ways to mitigate this issue: one is to avoid setting the same expiry time for the keys adding a random number in the configuration; the other is to allow only the core business data to hit the database and prevent non-core data to access the database until the cache is back up. 2."
X Link 2024-01-04T16:46Z 221.4K followers, 61.2K engagements
"API Vs SDK. API (Application Programming Interface) and SDK (Software Development Kit) are essential tools in the software development world but they serve distinct purposes: API: An API is a set of rules and protocols that allows different software applications and services to communicate with each other. [--]. It defines how software components should interact. [--]. Facilitates data exchange and functionality access between software components. [--]. Typically consists of endpoints requests and responses. SDK: An SDK is a comprehensive package of tools libraries sample code and documentation that"
X Link 2024-01-12T16:38Z 253.7K followers, 41.6K engagements
"A nice cheat sheet of different monitoring infrastructure in cloud services. This cheat sheet offers a concise yet comprehensive comparison of key monitoring elements across the three major cloud providers and open-source / 3rd party tools. Let's delve into the essential monitoring aspects covered: - Data Collection: Gather information from diverse sources to enhance decision-making. - Data Storage: Safely store and manage data for future analysis and reference. - Data Analysis: Extract valuable insights from data to drive informed actions. - Alerting: Receive real-time notifications about"
X Link 2024-01-14T16:45Z 221.3K followers, 53K engagements
"Key Use Cases for Load Balancers The diagram below shows top [--] use cases where we use a load balancer. 🔹 Traffic Distribution Load balancers evenly distribute incoming traffic among multiple servers preventing any single server from becoming overwhelmed. This helps maintain optimal performance scalability and reliability of applications or websites. 🔹 High Availability Load balancers enhance system availability by rerouting traffic away from failed or unhealthy servers to healthy ones. This ensures uninterrupted service even if certain servers experience issues. 🔹 SSL Termination Load"
X Link 2024-01-16T16:05Z 221.4K followers, 33.1K engagements
"How does Git work To begin with it's essential to identify where our code is stored. The common assumption is that there are only two locations - one on a remote server like Github and the other on our local machine. However this isn't entirely accurate. Git maintains three local storages on our machine which means that our code can be found in four places: - Working directory: where we edit files - Staging area: a temporary location where files are kept for the next commit - Local repository: contains the code that has been committed - Remote repository: the remote server that stores the"
X Link 2024-01-21T16:14Z 221.3K followers, 59.9K engagements
"A cheat sheet for system designs. The diagram below lists [--] core concepts when we design systems. The cheat sheet is straightforward to go through one by one. Save it for future reference 🔹 Requirement gathering 🔹 System architecture 🔹 Data design 🔹 Domain design 🔹 Scalability 🔹 Reliability 🔹 Availability 🔹 Performance 🔹 Security 🔹 Maintainability 🔹 Testing 🔹 User experience design 🔹 Cost estimation 🔹 Documentation 🔹 Migration plan Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2024-01-23T16:13Z 224.2K followers, 62.5K engagements
"@chipro Congrats Chip"
X Link 2024-01-24T17:48Z 221.3K followers, [----] engagements
"Visualizing a SQL query SQL statements are executed by the database system in several steps including: - Parsing the SQL statement and checking its validity - Transforming the SQL into an internal representation such as relational algebra - Optimizing the internal representation and creating an execution plan that utilizes index information - Executing the plan and returning the results -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2024-01-25T16:44Z 222.4K followers, 87.1K engagements
"Git Merge vs. Rebase vs. Squash Commit What are the differences When we from one Git branch to another we can use git merge or git rebase. The diagram below shows how the two commands work. This creates a new commit G in the main branch. G ties the histories of both main and feature branches. Git merge is -. Neither the main nor the feature branch is changed. Git rebase moves the feature branch histories to the head of the main branch. It creates new commits E F and G for each commit in the feature branch. The benefit of rebase is that it has . Rebase can be dangerous if the golden rule"
X Link 2024-01-28T16:35Z 221.4K followers, [--] engagements
"The world is a dangerous place. The diagram below shows some possible network attacks in [--] OSI model layers. 🔹 Application Layer - Pushing - Malware injection - DDos attacks 🔹 Presentation Layer - Encoding/decoding vulnerabilities - Format string attacks - Malicious code injection 🔹 Session Layer - Session hijacking - Session fixation attacks - Brute force attacks 🔹 Transport Layer - Man-in-the-middle attacks - SYN/ACK flood 🔹 Network Layer - IP spoofing - Route table manipulation - DDos attacks 🔹 Data Link Layer - MAC address spoofing - ARP spoofing - VLAN hopping 🔹 Physical Layer -"
X Link 2024-01-29T16:12Z 222.6K followers, 45K engagements
"What is a cookie Imagine Bob goes to a coffee shop for the first time orders a medium-sized espresso with two sugars. The cashier records Bobs identity and preferences on a card and hands it over to Bob with a cup of coffee. The next time Bob goes to the cafe he shows the cashier the preference card. The cashier immediately knows who the customer is and what kind of coffee he likes. A cookie acts as the preference card. When we log in to a website the server issues a cookie to us with a small amount of data. The cookie is stored on the client side so the next time we send a request to the"
X Link 2024-01-30T16:25Z 222K followers, 32K engagements
"How does a VPN work This diagram below shows how we access the internet with and without VPNs. A VPN or Virtual Private Network is a technology that creates a secure encrypted connection over a less secure network such as the public internet. The primary purpose of a VPN is to provide privacy and security to data and communications. A VPN acts as a tunnel through which the encrypted data goes from one location to another. Any external party cannot see the data transferring. A VPN works in [--] steps: 🔹 Step [--] - Establish a secure tunnel between our device and the VPN server. 🔹 Step [--] - Encrypt"
X Link 2024-02-01T16:14Z 222.8K followers, 46.6K engagements
"Understanding Database Types To make the best decision for our projects it is essential to understand the various types of databases available in the market. We need to consider key characteristics of different database types including popular options for each and compare their use cases. Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2024-02-04T16:54Z 223K followers, 64.1K engagements
"How do you pay from your digital wallet such as Paypal Venmo Paytm by scanning the QR code To understand the process involved we need to divide the scan to pay process into two sub-processes: [--]. Merchant generates a QR code and displays it on the screen [--]. Consumer scans the QR code and pays Here are the steps for generating the QR code: [--]. When you want to pay for your shopping the cashier tallies up all the goods and calculates the total amount due for example $123.45. The checkout has an order ID of SN129803. The cashier clicks the checkout button. [--]. The cashiers computer sends the order"
X Link 2024-02-07T16:24Z 223.1K followers, 61.6K engagements
"Flowchart of how slack decides to send a notification It is a great example of why a simple feature may take much longer to develop than many people think. When we have a great design users may not notice the complexity because it feels like the feature just working as intended. Whats your takeaway from this diagram Image source: Slack Eng blog Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2024-02-10T16:46Z 223.4K followers, 98K engagements
"Git Merge vs. Rebase vs. Squash Commit What are the differences When we from one Git branch to another we can use git merge or git rebase. The diagram below shows how the two commands work. This creates a new commit G in the main branch. G ties the histories of both main and feature branches. Git merge is -. Neither the main nor the feature branch is changed. Git rebase moves the feature branch histories to the head of the main branch. It creates new commits E F and G for each commit in the feature branch. The benefit of rebase is that it has . Rebase can be dangerous if the golden rule"
X Link 2024-02-11T17:34Z 222.5K followers, [--] engagements
"How do you pay from your digital wallet such as Paypal Venmo and Paytm by scanning the QR code To understand the process involved we need to divide the scan to pay process into two sub-processes: [--]. Merchant generates a QR code and displays it on the screen [--]. Consumer scans the QR code and pays Here are the steps for generating the QR code: [--]. When you want to pay for your shopping the cashier tallies up all the goods and calculates the total amount due for example $123.45. The checkout has an order ID of SN129803. The cashier clicks the checkout button. [--]. The cashiers computer sends the"
X Link 2024-02-12T15:46Z 223.5K followers, 40.3K engagements
"How do we manage configurations in a system The diagram shows a comparison between traditional configuration management and IaC (Infrastructure as Code). 🔹 Configuration Management The practice is designed to manage and provision IT infrastructure through systematic and repeatable processes. This is critical for ensuring that the system performs as intended. Traditional configuration management focuses on maintaining the desired state of the system's configuration items such as servers network devices and applications after they have been provisioned. It usually involves initial manual setup"
X Link 2024-02-19T16:35Z 247.4K followers, 48.1K engagements
"What is GraphQL Is it a replacement for the REST API The diagram below explains different aspects of GraphQL. GraphQL is a query language for APIs and a runtime for executing those queries by using a type system you define for your data. It was developed internally by Meta in [----] before being publicly released in [----]. Unlike the more traditional REST API GraphQL allows clients to request exactly the data they need making it possible to fetch data from multiple sources with a single query. This efficiency in data retrieval can lead to improved performance for web and mobile applications."
X Link 2024-02-21T16:57Z 223.9K followers, 38.5K engagements
"System Design Blueprint: The Ultimate Guide. We've created a template to tackle various system design problems in interviews. Hope this checklist is useful to guide your discussions during the interview process. This briefly touches on the following discussion points: - Load Balancing - API Gateway - Communication Protocols - Content Delivery Network (CDN) - Database - Cache - Message Queue - Unique ID Generation - Scalability - Availability - Performance - Security - Fault Tolerance and Resilience - And more Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2024-02-22T16:45Z 223.9K followers, 60.1K engagements
"Polling Vs Webhooks - Polling Polling involves repeatedly checking the external service or endpoint at fixed intervals to retrieve updated information. Its like constantly asking Do you have something new for me even where there might not be any update. This approach is resource-intensive and inefficient. Also you get updates only when you ask for it thereby missing any real-time information. However developers have more control over when and how the data is fetched. - Webhooks Webhooks are like having a built-in notification system. You dont continuously ask for information. Instead you"
X Link 2024-02-23T16:22Z 224.2K followers, 60.4K engagements
"Cloud Load Balancer Cheat Sheet Efficient load balancing is vital for optimizing the performance and availability of your applications in the cloud. However managing load balancers can be overwhelming given the various types and configuration options available. In today's multi-cloud landscape mastering load balancing is essential to ensure seamless user experiences and maximize resource utilization especially when orchestrating applications across multiple cloud providers. Having the right knowledge is key to overcoming these challenges and achieving consistent reliable application delivery."
X Link 2024-02-28T17:07Z 224.5K followers, 56.7K engagements
"Wouldn't it be nice if a system could automatically detect and fix bugs for us Meta released a paper about how they automated end-to-end repair at the Facebook scale. Let's take a closer look. The goal of a tool called SapFix is to simplify debugging by automatically generating fixes for specific issues. How successful has SapFix been Here are some details that have been made available: Used on six key apps in the Facebook app family (Facebook Messenger Instagram FBLite Workplace and Workchat). Each app consists of tens of millions of lines of code It generated [---] patches for [--] crashes in a"
X Link 2024-03-04T17:05Z 225.1K followers, 39.7K engagements
"There are over [----] engineering blogs. Here are my top [--] favorites: - Netflix TechBlog - Uber Blog - Cloudflare Blog - Engineering at Meta - LinkedIn Engineering - Discord Blog - AWS Architecture - Slack Engineering - Stripe Blog Over to you - What are some of your favorite engineering blogs -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2024-03-08T16:42Z 225.8K followers, 110.3K engagements
"OAuth [---] Flows Authorization Code Flow: The most common OAuth flow. After user authentication the client receives an authorization code and exchanges it for an access token and refresh token. Client Credentials Flow: Designed for single-page applications. The access token is returned directly to the client without an intermediate authorization code. Implicit Code Flow: Designed for single-page applications. The access token is returned directly to the client without an intermediate authorization code. Resource Owner Password Grant Flow: Allows users to provide their username and password"
X Link 2024-03-09T06:21Z 225.5K followers, 49.5K engagements
"How is data sent over the internet What does that have to do with the OSI model How does TCP/IP fit into this [--] Layers in the OSI model are: [--]. Physical Layer [--]. Data Link Layer [--]. Network Layer [--]. Transport Layer [--]. Session Layer [--]. Presentation Layer [--]. Application Layer -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages):"
X Link 2024-03-11T06:21Z 225.8K followers, 56.3K engagements
"Top [--] Database Models. Data models provide the foundation for storing retrieving and manipulating data in database management systems (DBMS) and influence how data is structured and accessed. The diagram below shows top [--] data models. 🔹 Flat Model The flat data model is one of the simplest forms of database models. It organizes data into a single table where each row represents a record and each column represents an attribute. This model is similar to a spreadsheet and is straightforward to understand and implement. However it lacks the ability to efficiently handle complex relationships"
X Link 2024-03-11T15:42Z 225.7K followers, 42K engagements
"One picture is worth a thousand words - Typical AWS Network Architecture in one diagram. Amazon Web Services (AWS) offers a comprehensive suite of networking services designed to provide businesses with secure scalable and highly available network infrastructure. AWS's network architecture components enable seamless connectivity between the internet remote workers corporate data centers and within the AWS ecosystem itself. 🔹 VPC (Virtual Private Cloud) At the heart of AWS's networking services is the Amazon VPC which allows users to provision a logically isolated section of the AWS Cloud."
X Link 2024-03-13T14:49Z 235.7K followers, 50.3K engagements
"15 Open-Source Projects That Changed the World To come up with the list we tried to look at the overall impact these projects have created on the industry and related technologies. Also weve focused on projects that have led to a big change in the day-to-day lives of many software developers across the world. Web Development - Node.js: The cross-platform server-side Javascript runtime that brought JS to server-side development - React: The library that became the foundation of many web development frameworks. - Apache HTTP Server: The highly versatile web server loved by enterprises and"
X Link 2024-03-14T15:21Z 226.3K followers, 102.6K engagements
"Top [--] website performance metrics you cannot ignore: Load Time: This is the time taken by the web browser to download and display the webpage. Its measured in milliseconds. Time to First Byte (TTFB): Its the time taken by the browser to receive the first byte of data from the web server. TTFB is crucial because it indicates the general ability of the server to handle traffic. Request Count: The number of HTTP requests a browser has to make to fully load the page. The lower this count the faster a website will feel to the user. DOMContentLoaded (DCL): This is the time it takes for the full"
X Link 2024-03-18T15:31Z 225.9K followers, 36.8K engagements
"Have you heard of the 12-Factor App The "12 Factor App" offers a set of best practices for building modern software applications. Following these [--] principles can help developers and teams in building reliable scalable and manageable applications. Here's a brief overview of each principle: [--]. Codebase: Have one place to keep all your code and manage it using version control like Git. [--]. Dependencies: List all the things your app needs to work properly and make sure they're easy to install. [--]. Config: Keep important settings like database credentials separate from your code so you can change"
X Link 2024-03-25T15:27Z 227.2K followers, 82.9K engagements
"Rome wasn't built in a day. How does Redis architecture evolve Redis is a popular in-memory cache. How did it evolve to the architecture it is today 🔹 [----] - Standalone Redis When Redis [---] was released in [----] the architecture was quite simple. It is usually used as a cache to the business application. However Redis stores data in memory. When we restart Redis we will lose all the data and the traffic directly hits the database. 🔹 [----] - Persistence When Redis [---] was released in [----] it addressed the previous restrictions. Redis introduced RDB in-memory snapshots to persist data. It also"
X Link 2024-03-26T15:42Z 250.2K followers, 36.5K engagements
"What does API gateway do The diagram below shows the detail. Step [--] - The client sends an HTTP request to the API gateway. Step [--] - The API gateway parses and validates the attributes in the HTTP request. Step [--] - The API gateway performs allow-list/deny-list checks. Step [--] - The API gateway talks to an identity provider for authentication and authorization. Step [--] - The rate limiting rules are applied to the request. If it is over the limit the request is rejected. Steps [--] and [--] - Now that the request has passed basic checks the API gateway finds the relevant service to route to by path"
X Link 2024-03-27T15:33Z 226.8K followers, 63.6K engagements
"There are over [----] engineering blogs. Here are my top [--] favorites: - Netflix TechBlog - Uber Blog - Cloudflare Blog - Engineering at Meta - LinkedIn Engineering - Discord Blog - AWS Architecture - Slack Engineering - Stripe Blog Over to you - What are some of your favorite engineering blogs Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/3KCnWXq https://bit.ly/3KCnWXq"
X Link 2024-03-29T15:33Z 228.1K followers, 133.7K engagements
"A handy cheat sheet for the most popular cloud services. Whats included - AWS Azure Google Cloud Oracle Cloud Alibaba Cloud - Cloud servers - Databases - Message queues and streaming platforms - Load balancing DNS routing software - Security - Monitoring Over to you - which company is the best at naming things Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/3KCnWXq https://bit.ly/3KCnWXq"
X Link 2024-03-31T16:14Z 271.2K followers, 45.9K engagements
"What does a typical microservice architecture look like 👇 The diagram below shows a typical microservice architecture. 🔹Load Balancer: This distributes incoming traffic across multiple backend services. 🔹CDN (Content Delivery Network): CDN is a group of geographically distributed servers that hold static content for faster delivery. The clients look for content in CDN first then progress to backend services. 🔹API Gateway: This handles incoming requests and routes them to the relevant services. It talks to the identity provider and service discovery. 🔹Identity Provider: This handles"
X Link 2024-04-01T06:40Z 227.2K followers, 33.1K engagements
"Roadmap for Learning Cyber Security By Henry Jiang. Redrawn by ByteByteGo. Cybersecurity is crucial for protecting information and systems from theft damage and unauthorized access. Whether you're a beginner or looking to advance your technical skills there are numerous resources and paths you can take to learn more about cybersecurity. Here are some structured suggestions to help you get started or deepen your knowledge: 🔹 Security Architecture 🔹 Frameworks & Standards 🔹 Application Security 🔹 Risk Assessment 🔹 Enterprise Risk Management 🔹 Threat Intelligence 🔹 Security Operation"
X Link 2024-04-02T15:36Z 275.9K followers, 61.2K engagements
"How does Javascript Work The cheat sheet below shows most important characteristics of Javascript. 🔹 Interpreted Language JavaScript code is executed by the browser or JavaScript engine rather than being compiled into machine language beforehand. This makes it highly portable across different platforms. Modern engines such as V8 utilize Just-In-Time (JIT) technology to compile code into directly executable machine code. 🔹 Function is First-Class Citizen In JavaScript functions are treated as first-class citizens meaning they can be stored in variables passed as arguments to other functions"
X Link 2024-04-03T15:26Z 227.4K followers, 55K engagements
Limited data mode. Full metrics available with subscription: lunarcrush.com/pricing
/creator/x::alexxubyte