Highlights from “The Engineering Executive’s Primer”I recently read “The Engineering Executive’s Primer“, a comprehensive guide for helping engineering leaders navigate challenges like…Sep 8Sep 8
From Code to Production: A Checklist for Reliable, Scalable, and Secure DeploymentsBuilding and maintaining distributed systems is challenging due to complex intricacies of production environments, configuration…Sep 1Sep 1
Insights from “Become a Great Engineering Leader”I recently read “Become a Great Engineering Leader” (currently in beta version B5.0), which introduces tools, techniques, and secrets for…Aug 25Aug 25
Key Takeaways from “Leading Effective Engineering Teams”I recently read Leading Effective Engineering Teams by Addy Osmani, which shares the author’s experiences at Google and presents best…Aug 171Aug 171
Effective Load Shedding and Throttling Strategies for Managing Traffic Spikes and DDoS AttacksOnline services experiencing rapid growth often encounter abrupt surges in traffic and may become targets of Distributed Denial of Service…Apr 20Apr 20
Lessons from “Tidy First?”I just finished reading “Tidy First?” by Kent Beck. I have been following Kent for a long time since early days of XUnit and Extreme…Jan 1Jan 1
Implementing FIDO and WebAuthn based Multi-Factor AuthenticationMulti-Factor Authentication (MFA) or 2FA allows multiple method of authentication to verify the user’s identity. The authentication factors…Dec 16, 2023Dec 16, 2023