As the number of cyber security attacks are growing exponentially, In 2020, approximately 75% of enterprises around the world will have experienced a phishing attack. In this blog, we will cover what do you mean by a phishing attack, the most commonly used phishing techniques, the life cycle of a phishing technique, and ways to prevent a phishing technique.Read More Things to know about Phishing attacks
With the continuing growth of micro services and the cloud best practice of designing decoupled systems, it’s imperative that developers have the ability to utilize a service, or system for better scalability and availability. Event-driven architecture focuses on function as a service, giving the developers more availability, elasticity, scalability, and cost optimization. This blog covers what do you mean by serverless architecture, when to use it, and various AWS serverless services such as API Gateway, Lambda, SQS, SNS, and SES.Read More Things to know about Event-Driven Architecture
This blog focuses on how operating system memory manages processes and Memory. Along with Memory allocation with fragmentation(Paging and segmentation). And, a little introduction to virtual memory in operating systems.Read More How does OS manage memory and virtual memory?
This blog focuses on operating system evolution and structures, process management with process scheduling algorithms, and process synchronization with semaphores and monitors.Read More Information to know about Operating System
In this blog, we will focus on fault tolerance in distributed systems, two phase commit protocol and Voting Protocol. Also focus on recovery in distributed systems, backward and forward error recovery, database modification with state based approach and Checkpoint algorithm. Also a little information on Distributed database.Read More Fault Tolerance and Recovery in Distributed systems
In this blog, we will focus on how to prevent a deadlock, how to detect a deadlock, centralized, decentralized and hierarchical resolution algorithms for deadlock.Read More How to detect a Deadlock and resolve it in Distributed Systems?
In this blog, we will focus on how to synchronize distributed systems( actual time, relative time, Based on mutual exclusion, Election algorithms and Transactions).Read More How to Synchronize Distributed systems?
In this blog, we will focus on what do you mean by Central, Network, and Distributed systems along with Issues while designing a distributed system. We will also be covering Distributed Shared Memory along with coherence protocols. We will be covering the architecture of Distributed File Systems along with design Issues.Read More What do you mean by Distributed Systems, Shared Memory and File Systems
There is no database that fits for all problems. This blog cover the 4 types of NoSQL databases which are Key value pairs, Columnar, Document and Graph. Along with some example of where to use each type of data base.Read More intro to 4 types of NoSQL databases
This blog focuses primarily on graph value data stores, its example along with their architecture and features. Example used is Neo 4J.Read More Introduction to Graph value data store along with a use case