Algorithm patterns & code templates
End-to-end architecture problems
Design patterns & practical code
Deep dives into core tech
Production systems & operations
TCP, HTTP, TLS, DNS & more
Consensus, replication & more
Kernel, networking & system calls
Quick reference cards for interviews
“Shift-left security works only when security tooling integrates into existing developer workflows, not alongside them”
“Conway's Law says your system architecture will mirror the communication structure of the org that builds it. This isn't a suggestion. It's just what happens.”
Distributed key-value store that delivers transactions without giving up range scans
Not all data deserves the same storage. Hot data sits in memory or NVMe SSDs, warm data on cheaper SSDs, cold data on object storage. The cost difference between tiers is 100x
OT lets multiple users edit the same document simultaneously by transforming each operation against every concurrent operation before applying it. The transform adjusts character positions so that every client converges to the same final document, even when edits arrive out of order