In this blog post, we will go over a simple intuitive approach on how to atomically update a hashmap which has been distributed across multiple nodes.
Proxy Server – Proxying at Different TCP / IP Model Levels
Understanding Basics of the Network Proxy - Part II
Proxy Server – TCP / IP Model Internals
Understanding Basics of the Network Proxy - Part I
API Best Practices
Learn about the design practices we followed and fixes we made to improve the page load performance of our product
Evaluating Product Architecture
Different dimensions for evaluating Product Architecture.
Whitelisting IPs with NGINX Ingress K8s
Understand how to whitelist IPs with NGINX via Ingress Objects and securing your kubernetes infrastructure
FREAD vs MMAP
In this blog post, we will understand the differences between MMAPs and READs system calls and its internals.
When not to use MMAPs !!!
In the previous blog post, we developed an understanding for the READ and MMAP system calls. If you haven't read Part 1 of this, we suggest you go to this link. In this blog post, we are going to answer this simple question "Why not to use MMAP everywhere". Advantages of MMAP over READ Data … Continue reading When not to use MMAPs !!!
Improving Software design through Execution Flows
In this blog post, lets understand how one can leverage execution flow between the classes in a software to improve the design of the softwares
Data at Rest / Data in Transit Encryption
Basics of What , Why and Hows of Data at Rest and Data in Transit Encryption