Building a Rate Limiter — Algorithms and Real-World Choices
Token bucket, leaky bucket, sliding window — what each actually does, and the practical implementation in distributed systems.
Tag
Token bucket, leaky bucket, sliding window — what each actually does, and the practical implementation in distributed systems.
The three main tenancy models, their trade-offs at scale, and a hybrid approach that often beats the pure cases.
The architecture of a notification service that delivers to web, mobile, email, and SMS reliably at scale. Channel fanout, user preferences, and the delivery guarantees that matter.
What actually matters when designing a product search — indexing, relevance, aggregations, and the operational realities that turn "let's use Elasticsearch" into a multi-month project.
Storing events instead of state — what it is, what it buys you, and the situations where the complexity is worth the audit trail and replayability.
Command Query Responsibility Segregation explained from first principles — the problem it solves, when it's overkill, and what it looks like in real Java systems.