PinnedPublished ininspiringbrillianceLocking in Databases and Isolation MechanismsA peek into the world of database locks, their types, and issues associatedJul 20, 2022A response icon4Jul 20, 2022A response icon4
PinnedTwitter’s Tough Architectural DecisionHow Twitter solved it’s scaling problems using hard decisionsFeb 23, 2022A response icon6Feb 23, 2022A response icon6
Published ininspiringbrillianceA Practical guide to using Advisory Locks in your ApplicationDatabases like PostgreSQL and MySQL provide various locking mechanisms to control concurrency and to avoid data corruption. We looked at…Aug 30, 2023Aug 30, 2023
Facebook Live’s InfrastructureAn overview of what went into designing Live video on scaleMar 30, 2022A response icon1Mar 30, 2022A response icon1
Authentication Methods: JWT or Session basedComparison between JWT and session based authMar 22, 2022A response icon2Mar 22, 2022A response icon2
Bash Commands For Effective Software EngineersYou should know these commands to boost your productivityMar 8, 2022Mar 8, 2022
How We Built a Serverless Application on AWSAn introduction to Serverless architectureFeb 24, 2022Feb 24, 2022
Asynchronous Servers & Django 3.1: An ExplainerIntuitive understanding of asynchronous servers and APIsFeb 16, 2022A response icon1Feb 16, 2022A response icon1
Published inBetter ProgrammingSQL, NoSQL, Graph: A Commentary on DatabasesUnderstand why there are new kinds of databases coming outFeb 10, 2022Feb 10, 2022
I Used SigmaOS for 1 Week: Here’s My Review of the Modern BrowserSwitching to a new Browser wasn’t easy!Feb 6, 2022A response icon6Feb 6, 2022A response icon6