Robust Retry Strategies for Building Resilient Distributed SystemsIntroductionSep 21, 2024Sep 21, 2024
Highlights from “The Engineering Executive’s Primer”I recently read “The Engineering Executive’s Primer“, a comprehensive guide for helping engineering leaders navigate challenges like…Sep 8, 2024Sep 8, 2024
From Code to Production: A Checklist for Reliable, Scalable, and Secure DeploymentsBuilding and maintaining distributed systems is challenging due to complex intricacies of production environments, configuration…Sep 1, 2024Sep 1, 2024
Insights from “Become a Great Engineering Leader”I recently read “Become a Great Engineering Leader” (currently in beta version B5.0), which introduces tools, techniques, and secrets for…Aug 25, 2024Aug 25, 2024
Key Takeaways from “Leading Effective Engineering Teams”I recently read Leading Effective Engineering Teams by Addy Osmani, which shares the author’s experiences at Google and presents best…Aug 17, 20241Aug 17, 20241
Effective Load Shedding and Throttling Strategies for Managing Traffic Spikes and DDoS AttacksOnline services experiencing rapid growth often encounter abrupt surges in traffic and may become targets of Distributed Denial of Service…Apr 20, 2024Apr 20, 2024
Building a distributed orchestration and graph processing system1. IntroductionFeb 23, 2024Feb 23, 2024
Lessons from “Tidy First?”I just finished reading “Tidy First?” by Kent Beck. I have been following Kent for a long time since early days of XUnit and Extreme…Jan 1, 2024Jan 1, 2024
Implementing FIDO and WebAuthn based Multi-Factor AuthenticationMulti-Factor Authentication (MFA) or 2FA allows multiple method of authentication to verify the user’s identity. The authentication factors…Dec 16, 2023Dec 16, 2023