Understanding keyof and extends in Generics — TypescriptDisclaimer: This is my personal blog. The opinions expressed in this blogpost are my own & do not necessarily represent the opinions…Oct 21Oct 21
Core Design Patterns for Efficient Low-Level Programming — Part 1Design patterns provide proven solutions to common problems encountered during software development, particularly in low-level design…Aug 22Aug 22
How Redis achieve concurrent operation with single threadRedis uses I/O multiplexing to handle multiple network connections simultaneously with high efficiency. This is crucial for a…Jul 27Jul 27
Concurrency Made Simple: The Role of Atomic ReferenceAtomicReference is a class in the java.util.concurrent.atomic package that provides atomic operations on object references. It is…Jul 25Jul 25
Concurrency Made Simple: The Role of Atomic VariablesAtomic variables in Java are part of the java.util.concurrent.atomic package and provide a way to perform atomic operations on single…Jul 25Jul 25
Error detection in data storage using CRCCyclic Redundancy Check (CRC) is an error-detecting code used to detect accidental changes to raw data. It is widely used in digital…Jun 25Jun 25
Partitioning in Distributed DatabasesPartitioning data across multiple nodes is a fundamental strategy to handle the physical limitations of single-server databases. Effective…Jun 25Jun 25
How database maintains resiliency in case of multiple failures?In our previous discussion on How database maintains resiliency? we explored how databases handle single points of failure. In this…Jun 25Jun 25
How database maintains resiliency?A Write-Ahead Log (WAL) is a technique used in databases to ensure data integrity and durability. Here’s an easy way to understand it:Jun 25Jun 25
What if refresh token gets stolen? — oAuth 2In order to minimize risk in the event of compromise, refresh tokens are essential tools for getting new access tokens and enabling the…May 26May 26