Robust Retry Strategies for Building Resilient Distributed SystemsIntroductionSep 21, 2024Sep 21, 2024
Highlights from “The Engineering Executive’s Primer”I recently read “The Engineering Executive’s Primer“, a comprehensive guide for helping engineering leaders navigate challenges like…Sep 8, 2024Sep 8, 2024
From Code to Production: A Checklist for Reliable, Scalable, and Secure DeploymentsBuilding and maintaining distributed systems is challenging due to complex intricacies of production environments, configuration…Sep 1, 2024Sep 1, 2024
Insights from “Become a Great Engineering Leader”I recently read “Become a Great Engineering Leader” (currently in beta version B5.0), which introduces tools, techniques, and secrets for…Aug 25, 2024Aug 25, 2024
Key Takeaways from “Leading Effective Engineering Teams”I recently read Leading Effective Engineering Teams by Addy Osmani, which shares the author’s experiences at Google and presents best…Aug 17, 20241Aug 17, 20241
Effective Load Shedding and Throttling Strategies for Managing Traffic Spikes and DDoS AttacksOnline services experiencing rapid growth often encounter abrupt surges in traffic and may become targets of Distributed Denial of Service…Apr 20, 2024Apr 20, 2024
Building a distributed orchestration and graph processing system1. IntroductionFeb 23, 2024Feb 23, 2024
Lessons from “Tidy First?”I just finished reading “Tidy First?” by Kent Beck. I have been following Kent for a long time since early days of XUnit and Extreme…Jan 1, 2024Jan 1, 2024
Implementing FIDO and WebAuthn based Multi-Factor AuthenticationMulti-Factor Authentication (MFA) or 2FA allows multiple method of authentication to verify the user’s identity. The authentication factors…Dec 16, 2023Dec 16, 2023
When Caching is not a Silver BulletCaching is often considered a “silver bullet” in software development due to its immediate and significant impact on the performance and…Dec 11, 2023Dec 11, 2023
Building a Secured Family-friendly Password Manager with Multi-Factor AuthenticationWith the proliferation of online services and accounts, it has become almost impossible for users to remember unique and strong passwords…Nov 11, 2023Nov 11, 2023
Building a Hybrid Authorization System for Granular Access ControlAn access control system establishes a structure to manage the accessibility of resources within an organization or digital environment. It…Sep 17, 2023Sep 17, 2023
Mitigate Production Risks with Phased DeploymentPhased deployment is a software deployment strategy where new software features, changes, or updates are gradually released to a subset of…Aug 29, 2023Aug 29, 2023
Modern Software Development ProcessThe technologies, methodologies, and paradigms that have shaped the way software is designed, built, and delivered have evolved from the…Aug 27, 2023Aug 27, 2023
Failures in MicroService ArchitectureMicroservice architecture is an evolution of Monolithic and Service-Oriented Architecture (SOA), where an application is built as a…Aug 23, 2023Aug 23, 2023
Systems PerformanceThis blog summarizes learnings from Systems Performance by Brendan Gregg that covers concepts, tools, and performance tuning for operating…Jun 24, 2023Jun 24, 2023
Patterns for API DesignI recently read Olaf Zimmermann’s book “Patterns for API Design” that reviews theory and practice of API design patterns. These patterns…May 29, 2023May 29, 2023
Heuristics from “Code That Fits in Your Head”The code maintenance and readability are important aspects of writing software systems and the “Code That Fits in Your Head” comes with a…May 21, 2023May 21, 2023
Applying Domain-Driven Design and Clean/Onion/Hexagonal Architecture to MicroServic1. AbstractMay 10, 2023May 10, 2023