Telemetry and Tracing: A Comprehensive OverviewExplore telemetry & tracing: understand data flow, boost performance, enhance reliability, and simplify troubleshooting.Jan 2Jan 2
A Comprehensive Guide to Multi-Tenancy ArchitectureMulti-tenancy is an architectural approach where a single instance of a software application serves multiple tenants or customers.Sep 1, 2024Sep 1, 2024
Chaos Engineering: Embracing UncertaintyChaos Engineering will intentionally inject failures into systems to ultimately identify any underlying weaknessesAug 17, 20243Aug 17, 20243
Everything we know about Chrome Dino GameEverything we know about Chrome Dino Game: From Game Mechanics to the Hacks for invincibility and speed!!!Jul 30, 2024Jul 30, 2024
Beyond Money: The Impact of Enabling Widespread NFT MintingThe concept of Blockchain and NFT is rapidly revolutionizing the whole web landscape. Non-fungible tokens (NFTs) are transforming the…Jun 8, 20241Jun 8, 20241
Canary Release: For Deployment SuccessCanary Release for deployment successSep 29, 202350Sep 29, 202350
Lambda Architecture: Revolutionizing Data Processing for Big DataLambda Architecture is a data processing architecture that can handle large amounts of data in a fault-tolerant and scalable way.Sep 26, 202351Sep 26, 202351
Consensus Algorithms: Paxos and RaftConsensus Algorithms are the foundation of distributed computing systems. It enables multiple nodes to reach an agreement on a shared value…Sep 23, 202372Sep 23, 202372
API GatewayWe have API management tools that help create a bridge between a client and the backend services. As the name gateway itself suggests, this…Sep 19, 202350Sep 19, 202350
SSL, TLS, and mTLSSSL is a protocol that encrypts and secures communication happening over the internet.Aug 21, 20231Aug 21, 20231
ResilienceThe term resilience means the ability of a system to keep functioning correctly and reliably in case of unexpected events like hardware…Jun 6, 20236Jun 6, 20236
Redundancy and AvailabilityAvailability is the time portion when the system is up and running for a particular mission time. It is usually represented in percentages…May 6, 202311May 6, 202311
Redundancy and ReliabilityReliability is the ability of a system with consistency and dependability to perform as expected under specific conditions over time. With…Apr 25, 202314Apr 25, 202314
RedundancyRedundancy is the most common approach to making reliability and availability better in a system. To accomplish this, we use some extra or…Apr 19, 202314Apr 19, 202314
Security Assertion Markup Language (SAML) Vs. OAuth 2.0 and OpenID Connect (OIDC)We previously discussed Security Assertion Markup Language (SAML), OAuth 2.0, and OpenID Connect individually. In this one, we will discuss…Apr 13, 202320Apr 13, 202320
Single Sign On (SSO)SSO — Single Sign On is an authentication process where a user can access multiple applications using a single set of credentials. It…Apr 10, 202313Apr 10, 202313
Open Authorization (OAuth 2.0)OAuth 2.0 is an authorization protocol that provides consented access to the available resources on behalf of the user. No user credentials…Apr 2, 202317Apr 2, 202317
Rate Limiting in Distributed SystemsRate limiting is great with distributed systems but not without some complications. We already read about rate limiting and distributed…Mar 27, 20238Mar 27, 20238