PinnedPublished inJavarevisitedThe Twelve-Factor App: What are these?This article covers the 12 Factor methodology used for building distributed systemsJun 9, 20231Jun 9, 20231
Mastering System Design: Key Concepts Explained with UberImagine you’re in the interview room, facing a panel of senior engineers. They seem friendly, but then come the big question: “Can you…Aug 12Aug 12
Testing Microservices Before Production Deployment: A Guide for Software DevelopersThis article covers all possible ways of testing a microservice before deploying it in PROD, essentially for Software Developers.Feb 10Feb 10
Journey of Java’s Garbage Collector so far!This article covers the journey of Khachara Seth (Garbage Collector) of Java from 1.7 to the latest!Dec 25, 20232Dec 25, 20232
Authentication 4/7 : 2FA OR MFAThis article of the Authentication series talks about how identification can be made more difficult using 2FA/MF and explains 2FA’s…Oct 13, 2023Oct 13, 2023
Authentication 3/7 : Password-BasedThis article of the Authentication series talks about how secured communication is achieved using password-based authentication with…Oct 8, 2023Oct 8, 2023
Authentication 2/7 : SSL CertificatesThis article of the Authentication series talks about how authentication and encryption can be achieved using SSL Certificates with…Oct 8, 2023Oct 8, 2023
Authentication 1/7 : SSH KeysThis is the first article from my authentication articles series. It explains SSH, its usage and its working in detail.Oct 8, 2023Oct 8, 2023
Published inJavarevisitedGet Going with GitThis article provides comprehensive steps for starting with Git, covering the top 15 Git commands software developers use.Oct 2, 2023Oct 2, 2023
What is a Virtual Machine? :hehUnderstand the virtual Machine from Noob to ExpertAug 12, 2023Aug 12, 2023