The Power of Database SynonymsSynonym is an often ignored and rarely used term. However, the power of synonyms are incredible. Enjoy this article to harness its power.Jul 7Jul 7
A Look at Confidential ComputingIn today’s world, data while in-transit is protected via many encryption methods. However, what about they’re being processed by the CPU?Jan 25Jan 25
Code Review PyramidCode review is an essential practice in software development, this article provides the cruicial steps to practice for effectiv code…Jun 25, 2023Jun 25, 2023
Improvement to Raft for Faster Distributed Key-Value StoreThis article describes the improvement to existing Raft algorithm to reduce latency in Key-Value pair like databases.Jun 10, 2023Jun 10, 2023
Network Devices ExplainedThere are various types of network devices such as repeaters, hubs, bridges, switches and routers. knowing how they work is fascinating.Apr 22, 2023Apr 22, 2023
Published inMobile App CircularWhat to Do in the First 90 Days of Your New Job?A curated list of things to do during your first 90 days of a new job, to help you settled in the new organization, helps you achieve…Apr 16, 2023Apr 16, 2023
An Era of Virtual Threads: JavaThe concept of “Virtual threads” has gained considerable attention in recent times. This article deep dives into virtual thread concepts.Apr 11, 20237Apr 11, 20237
Top Behavioural Interview Questions and example Answers for Software EngineersBehavioural interview questions are commonly used by software companies to assess a candidate’s potential fit for a job role.Mar 19, 2023Mar 19, 2023
Deadlock, Livelock, Race condition and StarvationDeadlock, Livelock, Race condition and Starvation are the four nightmares when you develop a multi-threaded application.Mar 9, 20231Mar 9, 20231
You must be aware of File Descriptor LeakingA FD is a handle the operating system uses to track all the opened files or other I/O resources, such as a pipe or socket.Feb 15, 2023Feb 15, 2023