Building a Rate Limiter — Algorithms and Real-World Choices
Token bucket, leaky bucket, sliding window — what each actually does, and the practical implementation in distributed systems.
Category
Token bucket, leaky bucket, sliding window — what each actually does, and the practical implementation in distributed systems.
The three main tenancy models, their trade-offs at scale, and a hybrid approach that often beats the pure cases.
Audit logs sound trivial and get messy fast. The data model, the event capture, and the retrieval patterns that make audit logs useful instead of write-only.
The architecture of a notification service that delivers to web, mobile, email, and SMS reliably at scale. Channel fanout, user preferences, and the delivery guarantees that matter.
What actually matters when designing a product search — indexing, relevance, aggregations, and the operational realities that turn "let's use Elasticsearch" into a multi-month project.
The data models and constraints that make a banking ledger both performant and provably correct, learned the hard way over several years of building them.