We live in a time of complex distributed systems, where knowing what happens to an application in a...
As cloud computing and Software as a Service (SaaS) models rapidly dominate the software landscape,...
Web applications are getting more complex and interdependent by the day. This means we need to make...
A small dino-shaped creature appears on our screen whenever our device is disconnected from the...
The concept of Blockchain and NFT is rapidly revolutionizing the whole web landscape. Non-fungible...
For a software developer devoted to software development and continuous delivery, ensuring a smooth...
We are living in a digital era where organizations deal with massive amounts of data generated from...
Consensus Algorithms are the foundation of distributed computing systems. It enables multiple nodes...
We have API management tools that help create a bridge between a client and the backend services. As...
System Design has many background concepts that might not sound so important but are always good to...
What is a Virtual Machine? Virtual machines (VMs) are virtual environments that work as a...
The term resilience means the ability of a system to keep functioning correctly and reliably in case...
Availability is the time portion when the system is up and running for a particular mission time. It...
Reliability is the ability of a system with consistency and dependability to perform as expected...
Redundancy is the most common approach to making reliability and availability better in a system. To...
We previously discussed Security Assertion Markup Language (SAML), OAuth 2.0, and OpenID Connect...
SSO — Single Sign On is an authentication process where a user can access multiple applications using...
Previously, we talked about Open Authorization (OAuth 2.0). While the Open Authorization was...
OAuth 2.0 is an authorization protocol that provides consented access to the available resources on...
Rate limiting is great with distributed systems but not without some complications. We already read...
We briefly discussed rate limiting in Endpoint Protection. Let’s see it in detail here. Rate...
Distributed transactions are those operations held over the data across two or more databases. When...
Transactions are a series of database operations. Each transaction is a single unit of the main task....
Message brokers are a system that eases the communication between different applications, systems,...
The N-Tier Architecture is when the application is divided into logical layers and physical tiers so...
Service discovery is a process of detecting services within network clusters. It works on Service...
The term database replication means sharing the data to make sure it stays consistent between...
In a database, when it needs to be split up by functions, we use federation architecture. In common...
TCP The Transmission Control Protocol (TCP) is a connection-oriented service where the...
The indexes in a database are a data structure that acts like a table of contents to point us toward...