Understanding Memory and CPU Interaction in a Simple C addition Program: An In-Depth LookIntroductionSep 5Sep 5
Understanding Single-Threaded vs.In this article, we’ll explore the key differences between single-threaded and multi-threaded programs from an OS perspective. We’ll delve…Aug 25Aug 25
Demystifying the Journey of a Data Packet: From Application to Network Transmission: A Must-Know…IntroductionAug 24Aug 24
A Journey from RST Flags to a Kernel BugIntroduction: This article is inspired by a challenging investigation documented by the Netflix engineering team, where they unraveled a…Aug 19Aug 19
Pod to Pod Communication in K8In Kubernetes, Layer 2 (L2) networking plays a crucial role in facilitating pod-to-pod communication across the cluster. Kubernetes itself…Apr 9Apr 9
It’s not easy to horizontally scale applications with WebSocket !Introduction: In the realm of modern web development, real-time communication has become a crucial aspect of user engagement and…Aug 9, 2023Aug 9, 2023
Navigating Trade-Offs in Distributed Systems: Striking a Balance for SuccessIn a distributed system, various components work together to achieve the system’s goals. Here are some common components in a distributed…Jun 15, 2023Jun 15, 2023
Zero Copy: Optimizing Data Transfer in Apache KafkaIntroduction: Apache Kafka, a distributed streaming platform, is known for its high-throughput and low-latency data processing…Jun 9, 2023Jun 9, 2023
A Guide to RFCs for HTTP AuthenticationHTTP (Hypertext Transfer Protocol) is a popular protocol used to transfer data over the web. One of the essential components of HTTP is…Feb 24, 2023Feb 24, 2023
“Double Compression: The Risks of Compressing Already Compressed HTTP Responses”We’ll begin by looking into what HTTP response compression is and how it works, as well as some of the most frequently used compression…Feb 20, 2023Feb 20, 2023