Mustafa's zettelkasten 📔
Search
Search
Search
Dark mode
Light mode
Explorer
a.technical
references
GoLang - useful resources
setting up neovim
100% is the wrong reliability target
abstraction
ACID
Acing System Design Interviews
active record pattern
adapter design pattern
amdahl's law
analyzing business domains
article - complexity in software design
availability and reliability
behavioural design patterns
benefits of code consistency
benefits of general-purpose modules
Benefits of Ports & Adapters Pattern
benefits of well-written code comments
benefits of well-written comments
better together or better apart
blog - Transactional Outbox Pattern
bounded context ownership boundaries
bounded context physical boundaries
bounded context vs subdomains
bounded contexts context map
bounded contexts in real life
builder design pattern
building boundaries with bounded context
business problem discovery
CAP Theorem
capture more design information with code comments
causes of complexity
chain of responsibility design pattern
change amplification
choosing names
classitis
code comments might be worthless
code reading
code repetition
cognitive load
command design pattern
comments get out of date
common distributed system patterns
Communication and Coordination
communication for software projects
comparing subdomains
comparing subdomains competitive advantage
comparing subdomains complexity
comparing subdomains solution strategy
comparing subdomains volatility
complexity
complexity in software design
complexity is incremental
conjoined methods
consistency
consistency in databases
contention in distributed systems
converting business domain to a model
core subdomain
corrupting data by distributed transaction
corrupting data by implicit distributed transaction
corrupting data by lack of transactional behaviour
costs of hexagonal architecture pattern
creational design patterns
Customer Reliability Engineering
database dirty reads
database durability
database durability techniques
database engineering
database internals
database isolation levels
database lost updates
database non-repeatable reads
database phantom reads
database read phenomenas
database transaction
DDD - bounded context
DDD - domain abstraction
DDD - domain activities
DDD - domain objects
DDD - hexagonal architecture
decorator design pattern
deep modules
dependancy inversion
dependencies
design it twice
design patterns
designing reactive distributed systems
developer excuses not to write code
DevOps Vs SRE
different layer different abstraction
discovering domain knowledge
dispatcher
distributed systems
distributed systems - async communication
distributed systems - Back Pressure Pattern
distributed systems - communication styles
distributed systems - CQRS
Distributed Systems - Design Patterns for Event-Driven Architecture
distributed systems - Event Carried State Transfer
distributed systems - event sourcing
distributed systems - outbox pattern
distributed systems - saga pattern
Docker Basics
Docker Security
domain driven design
Domain Driven Design a Practical Guide
domain knowledge discovery
dual write problem
effective modeling
encapsulation
error budget
event-based communication
eventual consistency
examples of code consistency
exceptions reasons
facade design pattern
factory design pattern
fighting against complexity
file storage vs object storage
functional programming
general purpose module
general purpose module 1
general purpose modules vs special purpose modules
general-purpose and special-purpose code separation
generic subdomain
Go Lang
Go Lang - doc.go
Go Lang - Functional Option Pattern
Go lang - Modules
Go Lang - Rules of A Go Package
Go Lang - Variadic Functions
GoLang - constants
GoLang - Idiomatic Naming Conventions
GoLang - primitive types
gunther's universal law
Hexagonal Architecture & CQRS
Hexagonal Architecture Actor
Hexagonal Architecture Adapter
Hexagonal Architecture and DDD anti-corruption layer
Hexagonal Architecture Application, Core or System
Hexagonal Architecture Elements
Hexagonal Architecture Explained
hexagonal architecture glossary
Hexagonal Architecture Interactor
Hexagonal Architecture Interface
Hexagonal Architecture Port
Hexagonal Architecture vs Clean Architecture
higher-level comments
higher-order functions
homelab - grafana dashboards to collect personal metrics
homeLab - index
homelab - install k3s on ubuntu
homelab - running private docker registry
horizontal scaling
How Hexagonal Architecture is Related to DDD
how information hiding reduces complexity
how module abstraction can go wrong
how much to invest in strategic programming
how much to invest in strategic programming?
how SLOs help balance operational and project work
how SLOs help build features faster
how SLOs help businesses make decisions
how to avoid database phantom reads
how to ensure code consistency
how to prevent information leakage
how to set SLOs for SLIs
how to write better code comments
how to write better comments - don't repeat the code
how to write better comments - pick conventions
how transaction script pattern can lead to data corruption
i don't have time to write comments
implementation code comments
in-sync replica set
Index
information hiding
information hiding and information leakage
information leakage
information leakage types
inheritance
interface comments
interface segregation
iterator design pattern
kafka
kafka common terms
kafka consumer group
kafka high water mark
kafka in-sync replicas
kafka topic partitions
kafka use cases
kafka workflow as a pub-sub
kafka workflow as a queue
keep the code comments near the code
key characteristics of distributed systems
Kubernetes
Kubernetes - pods - arguments and commands
Kubernetes - configMaps
Kubernetes - env variables
Kubernetes - Master vs Worker Nodes
Kubernetes - Node Selectors
Kubernetes - replication controller and replicaSets
Kubernetes - Resource Requirements
Kubernetes - secrets
Kubernetes - security contexts
Kubernetes - Service Accounts
Kubernetes - Taints and Tolerations
Kubernetes Architecture
Kubernetes Cluster
Kubernetes Commands
Kubernetes Components
Kubernetes Configuration
Kubernetes deployments
Kubernetes Namespaces
Kubernetes Node
Kubernetes Pod
Kubernetes scheduler
Kubernetes YAML Definition Files
laws of scalability
lddd - analyzing business domains
lddd - bounded context ownership boundaries
lddd - bounded context physical boundaries
lddd - bounded context shared kernel
lddd - bounded context vs subdomains
lddd - bounded contexts context map
lddd - bounded contexts in real life
lddd - building boundaries with bounded context
lddd - business problem discovery
lddd - communication
lddd - comparing subdomains
lddd - converting business domain to a model
lddd - discovering domain knowledge
lddd - effective modeling
lddd - Identifying Subdomain Boundaries
lddd - implementing simple business logic
lddd - inconsistent models
lddd - integrating bounded context with cooperation pattern
lddd - integrating bounded context with customer-supplier pattern
lddd - integrating bounded context with separate-ways or duplication
lddd - integrating bounded contexts
lddd - integrating bounded contexts with anticorruption layer
lddd - integrating bounded contexts with conformist pattern
lddd - integrating bounded contexts with open-host service
lddd - integrating bounded contexts with partnership
lddd - knowledge discovery
lddd - managing domain complexity
lddd - model boundaries
lddd - modeling the business domain
lddd - scope of a bounded context
lddd - semantic domains
lddd - size of a bounded context
lddd - subdomains as coherent use cases
lddd - tackling complex business logic
lddd - ubiquitous language refined
lddd - what is a bounded context?
lddd - what is a model
lddd - who are the domain experts
Learning Domain Driven Design
linear scalability
liskove substation
low-level comments
managing domain complexity
message queueing
Microservice Patterns
mindmap - A Philosophy Of Software Design - POSD
mindmap - learning domain driven design
model boundaries
modifying existing code
modular design
module abstraction
module depth
module division and complexity
module implementation
module interface
modules should be deep
my technical toolbox
names should be consistent
names should be precise
object oriented design
Object-oriented programming
obscurity
observability
observer design pattern
open-closed
Outbox Pattern vs Two-Phase Commit
partition tolerance
pass-through methods
pass-through variables
philosophy of software design
PHP
PHP - ArrayObject
PHP - attributes
PHP - class constant
PHP - readonly
platform engineering
Pod YAML Definition
polymorphism
POSD - modifying existing code
procedural programming
programming paradigms
prototype design pattern
publish-subscribe
pull complexity downwards
pure functions
questions to find the right balance between general and special purpose approach
reactive distributed systems
reactive principles
read committed isolation level
read uncommitted isolation level
repeatable read isolation level
Resiliency
running docker mysql localy
scalability
scalability vs performance
scope of a bounded context
separation of concerns
serializable isolation level
shallow modules
single responsibility
singleton design pattern
Site Reliability Engineering
size of a bounded context
SLAs
SLIs
SLOs
snapshot isolation level
software design red flags
SOLID
special purpose module
splitting and joining methods
state design pattern
strategic programming
strategic programming investment types
strategic vs tactical programming
strategy design pattern
strong consistency
structural design patterns
supporting subdomain
symptoms of complexity
tactical programming
tactical tornado
targeting reliability
template method design pattern
temporal decomposition
the effect of coherency delay
the happiness test
the kano model
the myth of good code is self-documented
the reactive manifesto
things that can make the code more obvious
things that make the code less obvious
Tmux
transaction script pattern
transactional outbox pattern
types of code comments
types of distributed systems architectures
types of subdomains
TypeScript
TypeScript - Enum
TypeScript - Numbers
TypeScript - Type Annotations and Type Inference
TypeScript - Types and Type System
ubiquitous language
unknown unknowns
use different git email based on repository path
using the ubiquitous language
vertical scaling
visitor design pattern
what is a bounded context
what is a domain
what is a messaging system
what is a subdomain
what is new in PHP 8.0
what is new in PHP 8.1
what is new in PHP 8.2
when is interface duplication okay
when is interface duplication okay?
when to bring modules together
Why Code Comments Is More Important Than You Think
why conventions is important
why do you need a read-only database transaction
why do you need a read-only database transaction?
why exception adds complexity
why pass-through methods are bad
why reactive architecture
why to write code comments
write code comments first
write code comments for better abstraction
your code can be more obvious
zooKeeper
b.PKM
references
avoid cramming in writing
books are teachers
how to take smart notes
A System For Writing
avoid multitasking
become an expert writer by practicing
building a seconded brain
building notes bottom-up
compare PKB notes
fleeting notes
folgezettel
get laser-focused
good workflow properties
how to add new permanent notes
how to avoid confirmation bias when taking notes
how to take a fleeting note
how to take reference note
HTNS - let the work carry you forward
HTNS - nobody ever starts from scratch
HTSN - Everything You Need To Do
HTSN - Everything You Need To Know
HTSN - Steps To Successful Writing
HTSN - Writing a Paper step-by-step
HTSN - writing is the only thing that matters
improve thinking by making permanent notes
improve understanding with literature notes
index notes
knowledge building blocks
knowledge workers
literature notes
literature notes vs reference notes
Luhmann's ZettelKasten
make a career one note at a time
new fleeting note workflow
Niklas Luhmann
note taking mistakes
On Writing Well
PARA
permanent notes
PKM - Index
project notes
Rapid Logging
reduce the number of decisions
reference notes
reference notes vs fleeting notes
taking notes and quotes from content to your PKM
understand what you read
What is PKM
what makes a fleeting note a permanent one
Why Having a Knowledge Base Is Important
why there was no much interest in zettelkasten at the beginning
why to take notes
workflow simplicity is essential
Writing To Learn
zettelkasten
zettelkasten as a workflow
zettelkasten as an object
zettelkasten cross-reference links
zettelkasten is organized bottom-up
zettelkasten method explained
zettelkasten note categories
Home
❯
a.technical
Folder: a.technical
386 items under this folder.
Feb 02, 2025
what is a domain
software-design
ddd
Feb 02, 2025
what is a messaging system
system-design
distributed-systems
Feb 02, 2025
what is a subdomain
book-notes
ddd
Feb 02, 2025
what is new in PHP 8.0
tools
Feb 02, 2025
what is new in PHP 8.1
tools
Feb 02, 2025
what is new in PHP 8.2
tools
Feb 02, 2025
when is interface duplication okay
book-notes
software-design
Feb 02, 2025
when is interface duplication okay?
book-notes
software-design
Feb 02, 2025
when to bring modules together
book-notes
software-design
Feb 02, 2025
why conventions is important
software-design
Feb 02, 2025
why do you need a read-only database transaction
database
Feb 02, 2025
why do you need a read-only database transaction?
database
Feb 02, 2025
why exception adds complexity
book-notes
software-design
Feb 02, 2025
why pass-through methods are bad
system-design
Feb 02, 2025
why reactive architecture
system-design
distributed-systems
Feb 02, 2025
why to write code comments
book-notes
software-design
Feb 02, 2025
write code comments first
book-notes
software-design
Feb 02, 2025
write code comments for better abstraction
software-design
Feb 02, 2025
your code can be more obvious
book-notes
software-design
Feb 02, 2025
zooKeeper
system-design
distributed-systems
Feb 02, 2025
structural design patterns
oop
software-design/design-patterns
Feb 02, 2025
supporting subdomain
book-notes
ddd
Feb 02, 2025
symptoms of complexity
system-design
Feb 02, 2025
tactical programming
software-design
Feb 02, 2025
tactical tornado
software-design
Feb 02, 2025
targeting reliability
SRE
Feb 02, 2025
template method design pattern
oop
software-design/design-patterns
Feb 02, 2025
temporal decomposition
system-design
Feb 02, 2025
the effect of coherency delay
software-design
distributed-systems
Feb 02, 2025
the happiness test
SRE
Feb 02, 2025
the kano model
Feb 02, 2025
the myth of good code is self-documented
book-notes
software-design
Feb 02, 2025
the reactive manifesto
distributed-systems
system-design
Feb 02, 2025
things that can make the code more obvious
system-design
Feb 02, 2025
things that make the code less obvious
software-design
Feb 02, 2025
transaction script pattern
book-notes
ddd
software-design
Feb 02, 2025
transactional outbox pattern
system-design
distributed-systems
Feb 02, 2025
types of code comments
software-design
Feb 02, 2025
types of distributed systems architectures
software-design
distributed-systems
Feb 02, 2025
types of subdomains
book-notes
ddd
Feb 02, 2025
ubiquitous language
ddd
Feb 02, 2025
unknown unknowns
software-design
Feb 02, 2025
use different git email based on repository path
tools
Feb 02, 2025
using the ubiquitous language
ddd
Feb 02, 2025
vertical scaling
system-design
distributed-systems
Feb 02, 2025
visitor design pattern
oop
software-design/design-patterns
Feb 02, 2025
what is a bounded context
book-notes
ddd
Feb 02, 2025
read uncommitted isolation level
database
Feb 02, 2025
repeatable read isolation level
database
Feb 02, 2025
running docker mysql localy
docker
Feb 02, 2025
scalability vs performance
software-design
distributed-systems
Feb 02, 2025
scalability
distributed-systems
system-design
Feb 02, 2025
scope of a bounded context
book-notes
ddd
Feb 02, 2025
separation of concerns
oop
software-design
Feb 02, 2025
serializable isolation level
database
Feb 02, 2025
shallow modules
software-design
book-notes
Feb 02, 2025
single responsibility
software-design
oop
Feb 02, 2025
singleton design pattern
oop
software-design/design-patterns
Feb 02, 2025
size of a bounded context
book-notes
ddd
Feb 02, 2025
snapshot isolation level
database
Feb 02, 2025
software design red flags
software-design
Feb 02, 2025
special purpose module
book-notes
software-design
Feb 02, 2025
splitting and joining methods
book-notes
software-design
Feb 02, 2025
state design pattern
oop
software-design/design-patterns
Feb 02, 2025
strategic programming investment types
software-design
Feb 02, 2025
strategic programming
software-design
Feb 02, 2025
strategic vs tactical programming
software-design
book-notes
Feb 02, 2025
strategy design pattern
oop
software-design/design-patterns
Feb 02, 2025
strong consistency
distributed-systems
Feb 02, 2025
modules should be deep
software-design
book-notes
Feb 02, 2025
my technical toolbox
tools
Index
Feb 02, 2025
names should be consistent
book-notes
software-design
Feb 02, 2025
names should be precise
book-notes
software-design
Feb 02, 2025
object oriented design
software-engineering
software-design
oop
Feb 02, 2025
obscurity
book-notes
software-design
Feb 02, 2025
observability
tools
distributed-systems
Feb 02, 2025
observer design pattern
oop
software-design/design-patterns
Feb 02, 2025
open-closed
oop
software-design
Feb 02, 2025
partition tolerance
software-design
distributed-systems
Feb 02, 2025
pass-through methods
software-design
Feb 02, 2025
pass-through variables
book-notes
software-design
Feb 02, 2025
philosophy of software design
software-design
book
Feb 02, 2025
platform engineering
platform-engineering
Feb 02, 2025
polymorphism
software-design
oop
Feb 02, 2025
procedural programming
software-design
Feb 02, 2025
programming paradigms
software-design
Feb 02, 2025
prototype design pattern
oop
software-design/design-patterns
Feb 02, 2025
publish-subscribe
distributed-systems
system-design
Feb 02, 2025
pull complexity downwards
book-notes
software-design
Feb 02, 2025
pure functions
fp
software-design
Feb 02, 2025
questions to find the right balance between general and special purpose approach
system-design
Feb 02, 2025
reactive distributed systems
system-design
distributed-systems
Feb 02, 2025
reactive principles
system-design
distributed-systems
Feb 02, 2025
read committed isolation level
database
Feb 02, 2025
lddd - model boundaries
book-notes
ddd
Feb 02, 2025
lddd - modeling the business domain
book-notes
ddd
Feb 02, 2025
lddd - scope of a bounded context
book-notes
ddd
Feb 02, 2025
lddd - semantic domains
book-notes
ddd
Feb 02, 2025
lddd - size of a bounded context
book-notes
ddd
Feb 02, 2025
lddd - subdomains as coherent use cases
book-notes
ddd
Feb 02, 2025
lddd - tackling complex business logic
ddd
system-design
Feb 02, 2025
lddd - ubiquitous language refined
book-notes
ddd
Feb 02, 2025
lddd - what is a bounded context?
book-notes
ddd
Feb 02, 2025
lddd - what is a model
book-notes
ddd
Feb 02, 2025
lddd - who are the domain experts
book-notes
ddd
Feb 02, 2025
linear scalability
software-design
distributed-systems
Feb 02, 2025
liskove substation
software-design
oop
Feb 02, 2025
low-level comments
software-design
Feb 02, 2025
managing domain complexity
book-notes
ddd
Feb 02, 2025
message queueing
system-design
distributed-systems
Feb 02, 2025
mindmap - A Philosophy Of Software Design - POSD
Feb 02, 2025
mindmap - learning domain driven design
Feb 02, 2025
model boundaries
book-notes
ddd
Feb 02, 2025
modifying existing code
book-notes
software-design
Feb 02, 2025
modular design
system-design
Feb 02, 2025
module abstraction
software-design
book-notes
Feb 02, 2025
module depth
software-design
Feb 02, 2025
module division and complexity
book-notes
software-design
Feb 02, 2025
module implementation
software-design
book-notes
Feb 02, 2025
module interface
system-design
book-notes
Feb 02, 2025
lddd - bounded context ownership boundaries
book-notes
ddd
Feb 02, 2025
lddd - bounded context physical boundaries
book-notes
ddd
Feb 02, 2025
lddd - bounded context shared kernel
book-notes
ddd
Feb 02, 2025
lddd - bounded context vs subdomains
book-notes
ddd
Feb 02, 2025
lddd - bounded contexts context map
book-notes
ddd
Feb 02, 2025
lddd - bounded contexts in real life
book-notes
ddd
Feb 02, 2025
lddd - building boundaries with bounded context
book-notes
ddd
Feb 02, 2025
lddd - business problem discovery
book-notes
ddd
Feb 02, 2025
lddd - communication
book-notes
ddd
Feb 02, 2025
lddd - comparing subdomains
book-notes
ddd
Feb 02, 2025
lddd - converting business domain to a model
book-notes
ddd
Feb 02, 2025
lddd - discovering domain knowledge
book-notes
ddd
Feb 02, 2025
lddd - effective modeling
book-notes
ddd
Feb 02, 2025
lddd - implementing simple business logic
ddd
book-notes
Feb 02, 2025
lddd - inconsistent models
book-notes
ddd
Feb 02, 2025
lddd - integrating bounded context with cooperation pattern
book-notes
ddd
Feb 02, 2025
lddd - integrating bounded context with customer-supplier pattern
book-notes
ddd
Feb 02, 2025
lddd - integrating bounded context with separate-ways or duplication
book-notes
ddd
Feb 02, 2025
lddd - integrating bounded contexts with anticorruption layer
book-notes
ddd
Feb 02, 2025
lddd - integrating bounded contexts with conformist pattern
book-notes
ddd
Feb 02, 2025
lddd - integrating bounded contexts with open-host service
book-notes
ddd
Feb 02, 2025
lddd - integrating bounded contexts with partnership
book-notes
ddd
Feb 02, 2025
lddd - integrating bounded contexts
book-notes
ddd
Feb 02, 2025
lddd - knowledge discovery
book-notes
ddd
Feb 02, 2025
lddd - managing domain complexity
book-notes
ddd
Feb 02, 2025
kafka
system-design
distributed-systems
tools
Feb 02, 2025
keep the code comments near the code
system-design
Feb 02, 2025
key characteristics of distributed systems
software-design
distributed-systems
Feb 02, 2025
laws of scalability
software-design
distributed-systems
Feb 02, 2025
lddd - analyzing business domains
book-notes
ddd
Feb 02, 2025
lddd - Identifying Subdomain Boundaries
book-notes
ddd
Feb 02, 2025
how to prevent information leakage
book-notes
software-design
Feb 02, 2025
how to set SLOs for SLIs
SRE
Feb 02, 2025
how to write better code comments
book-notes
software-design
Feb 02, 2025
how to write better comments - don't repeat the code
software-design
Feb 02, 2025
how to write better comments - pick conventions
book-notes
software-design
Feb 02, 2025
how transaction script pattern can lead to data corruption
ddd
Feb 02, 2025
i don't have time to write comments
system-design
Feb 02, 2025
implementation code comments
book-notes
software-design
Feb 02, 2025
in-sync replica set
system-design
distributed-systems
Feb 02, 2025
information hiding and information leakage
software-design
book-notes
Feb 02, 2025
information hiding
system-design
Feb 02, 2025
information leakage types
book-notes
software-design
Feb 02, 2025
information leakage
software-design
book-notes
Feb 02, 2025
inheritance
software-design
oop
Feb 02, 2025
interface comments
book-notes
software-design
Feb 02, 2025
interface segregation
software-design
oop
Feb 02, 2025
iterator design pattern
software-design/design-patterns
oop
Feb 02, 2025
kafka common terms
system-design
distributed-systems
Feb 02, 2025
kafka consumer group
system-design
distributed-systems
Feb 02, 2025
kafka high water mark
system-design
distributed-systems
Feb 02, 2025
kafka in-sync replicas
system-design
distributed-systems
Feb 02, 2025
kafka topic partitions
distributed-systems
system-design
Feb 02, 2025
kafka use cases
system-design
distributed-systems
Feb 02, 2025
kafka workflow as a pub-sub
system-design
distributed-systems
Feb 02, 2025
kafka workflow as a queue
system-design
distributed-systems
Feb 02, 2025
factory design pattern
oop
software-design/design-patterns
Feb 02, 2025
fighting against complexity
system-design
Feb 02, 2025
file storage vs object storage
system-design
Feb 02, 2025
functional programming
software-design
Feb 02, 2025
general purpose module 1
software-design
Feb 02, 2025
general purpose module
software-design
Feb 02, 2025
general purpose modules vs special purpose modules
software-design
book
Feb 02, 2025
general-purpose and special-purpose code separation
software-design
book-notes
Feb 02, 2025
generic subdomain
book-notes
ddd
Feb 02, 2025
gunther's universal law
system-design
distributed-systems
Feb 02, 2025
hexagonal architecture glossary
ddd
book-notes
system-design
Feb 02, 2025
higher-level comments
system-design
Feb 02, 2025
higher-order functions
software-design
fp
Feb 02, 2025
homeLab - index
homelab
Index
Feb 02, 2025
homelab - grafana dashboards to collect personal metrics
Feb 02, 2025
homelab - install k3s on ubuntu
kubernetes
homelab
Feb 02, 2025
homelab - running private docker registry
homelab
docker
Feb 02, 2025
horizontal scaling
software-design
distributed-systems
Feb 02, 2025
how SLOs help balance operational and project work
SRE
Feb 02, 2025
how SLOs help build features faster
SRE
Feb 02, 2025
how SLOs help businesses make decisions
SRE
Feb 02, 2025
how information hiding reduces complexity
software-design
Feb 02, 2025
how module abstraction can go wrong
software-design
Feb 02, 2025
how much to invest in strategic programming
software-design
Feb 02, 2025
how much to invest in strategic programming?
software-design
Feb 02, 2025
how to avoid database phantom reads
database
Feb 02, 2025
how to ensure code consistency
system-design
Feb 02, 2025
different layer different abstraction
book-notes
system-design
Feb 02, 2025
discovering domain knowledge
book-notes
ddd
Feb 02, 2025
dispatcher
software-design
Feb 02, 2025
distributed systems - Back Pressure Pattern
distributed-systems
Feb 02, 2025
distributed systems - CQRS
distributed-systems
Feb 02, 2025
distributed systems - Event Carried State Transfer
distributed-systems
Feb 02, 2025
distributed systems - async communication
distributed-systems
Feb 02, 2025
distributed systems - communication styles
distributed-systems
system-design
Feb 02, 2025
distributed systems - event sourcing
distributed-systems
Feb 02, 2025
distributed systems - outbox pattern
system-design
distributed-systems
Feb 02, 2025
distributed systems - saga pattern
distributed-systems
Feb 02, 2025
distributed systems
software-design
distributed-systems
Feb 02, 2025
domain driven design
software-design
ddd
Feb 02, 2025
domain knowledge discovery
book-notes
ddd
Feb 02, 2025
dual write problem
distributed-systems
Feb 02, 2025
effective modeling
book-notes
ddd
Feb 02, 2025
encapsulation
software-design
oop
Feb 02, 2025
error budget
SRE
Feb 02, 2025
event-based communication
distributed-systems
system-design
Feb 02, 2025
eventual consistency
distributed-systems
Feb 02, 2025
examples of code consistency
software-design
Feb 02, 2025
exceptions reasons
system-design
Feb 02, 2025
facade design pattern
oop
software-design/design-patterns
Feb 02, 2025
contention in distributed systems
software-design
distributed-systems
Feb 02, 2025
converting business domain to a model
book-notes
ddd
Feb 02, 2025
core subdomain
book-notes
ddd
Feb 02, 2025
corrupting data by distributed transaction
ddd
system-design
Feb 02, 2025
corrupting data by implicit distributed transaction
ddd
system-design
Feb 02, 2025
corrupting data by lack of transactional behaviour
ddd
system-design
Feb 02, 2025
costs of hexagonal architecture pattern
book
book-notes
Feb 02, 2025
creational design patterns
oop
software-design/design-patterns
Feb 02, 2025
database dirty reads
database
Feb 02, 2025
database durability techniques
database
Feb 02, 2025
database durability
database
Feb 02, 2025
database engineering
database
Feb 02, 2025
database internals
database
distributed-systems
book
Feb 02, 2025
database isolation levels
database
Feb 02, 2025
database lost updates
database
Feb 02, 2025
database non-repeatable reads
database
Feb 02, 2025
database phantom reads
database
Feb 02, 2025
database read phenomenas
database
Feb 02, 2025
database transaction
database
Feb 02, 2025
decorator design pattern
oop
software-design/design-patterns
Feb 02, 2025
deep modules
software-design
book-notes
Feb 02, 2025
dependancy inversion
software-design
oop
Feb 02, 2025
dependencies
book-notes
software-design
Feb 02, 2025
design it twice
book-notes
software-design
Feb 02, 2025
design patterns
software-design
oop
Feb 02, 2025
designing reactive distributed systems
distributed-systems
system-design
Feb 02, 2025
developer excuses not to write code
software-design
Feb 02, 2025
business problem discovery
book-notes
ddd
Feb 02, 2025
capture more design information with code comments
software-design
Feb 02, 2025
causes of complexity
software-design
Feb 02, 2025
chain of responsibility design pattern
oop
software-design/design-patterns
Feb 02, 2025
change amplification
software-design
Feb 02, 2025
choosing names
software-design
Feb 02, 2025
classitis
software-design
Feb 02, 2025
code comments might be worthless
book-notes
software-design
Feb 02, 2025
code reading
dddeu24
Feb 02, 2025
code repetition
software-design
Feb 02, 2025
cognitive load
software-design
Feb 02, 2025
command design pattern
oop
software-design/design-patterns
Feb 02, 2025
comments get out of date
book-notes
software-design
Feb 02, 2025
common distributed system patterns
system-design
distributed-systems
Feb 02, 2025
communication for software projects
book-notes
ddd
Feb 02, 2025
comparing subdomains competitive advantage
ddd
software-design
Feb 02, 2025
comparing subdomains complexity
ddd
software-design
Feb 02, 2025
comparing subdomains solution strategy
ddd
software-design
Feb 02, 2025
comparing subdomains volatility
ddd
software-design
Feb 02, 2025
comparing subdomains
book-notes
ddd
Feb 02, 2025
complexity in software design
software-design
book-notes
Feb 02, 2025
complexity is incremental
book-notes
software-design
Feb 02, 2025
complexity
software-design
Feb 02, 2025
conjoined methods
book-notes
software-design
Feb 02, 2025
consistency in databases
database
Feb 02, 2025
consistency
distributed-systems
software-design
Feb 02, 2025
TypeScript
tools
Feb 02, 2025
Why Code Comments Is More Important Than You Think
book-notes
Feb 02, 2025
abstraction
software-design
Feb 02, 2025
active record pattern
book-notes
ddd
Feb 02, 2025
adapter design pattern
oop
software-design/design-patterns
Feb 02, 2025
amdahl's law
software-design
distributed-systems
Feb 02, 2025
analyzing business domains
book-notes
ddd
Feb 02, 2025
article - complexity in software design
writing
software-design
Feb 02, 2025
availability and reliability
software-design
distributed-systems
Feb 02, 2025
behavioural design patterns
oop
software-design/design-patterns
Feb 02, 2025
benefits of code consistency
book-notes
software-design
Feb 02, 2025
benefits of general-purpose modules
system-design
Feb 02, 2025
benefits of well-written code comments
software-design
book-notes
Feb 02, 2025
benefits of well-written comments
software-design
Feb 02, 2025
better together or better apart
software-design
Feb 02, 2025
blog - Transactional Outbox Pattern
distributed-systems
Feb 02, 2025
bounded context ownership boundaries
book-notes
ddd
Feb 02, 2025
bounded context physical boundaries
book-notes
ddd
Feb 02, 2025
bounded context vs subdomains
book-notes
ddd
Feb 02, 2025
bounded contexts context map
book-notes
ddd
Feb 02, 2025
bounded contexts in real life
book-notes
ddd
Feb 02, 2025
builder design pattern
oop
software-design/design-patterns
Feb 02, 2025
building boundaries with bounded context
book-notes
ddd
Feb 02, 2025
Site Reliability Engineering
distributed-systems
SRE
Feb 02, 2025
Tmux
tools
Feb 02, 2025
TypeScript - Enum
tools
Feb 02, 2025
TypeScript - Numbers
tools
Feb 02, 2025
TypeScript - Type Annotations and Type Inference
tools
Feb 02, 2025
TypeScript - Types and Type System
tools
Feb 02, 2025
POSD - modifying existing code
book-notes
software-design
Feb 02, 2025
Pod YAML Definition
kubernetes
infrastructure
Feb 02, 2025
Resiliency
distributed-systems
Feb 02, 2025
SLAs
SRE
Feb 02, 2025
SLIs
SRE
Feb 02, 2025
SLOs
SRE
Feb 02, 2025
SOLID
software-design
oop
Feb 02, 2025
Kubernetes - Taints and Tolerations
kubernetes
infrastructure
Feb 02, 2025
Kubernetes - configMaps
kubernetes
infrastructure
Feb 02, 2025
Kubernetes - env variables
kubernetes
infrastructure
Feb 02, 2025
Kubernetes - replication controller and replicaSets
kubernetes
infrastructure
Feb 02, 2025
Kubernetes - secrets
kubernetes
infrastructure
Feb 02, 2025
Kubernetes - security contexts
kubernetes
infrastructure
Feb 02, 2025
Kubernetes Architecture
kubernetes
infrastructure
Feb 02, 2025
Kubernetes Cluster
kubernetes
infrastructure
Feb 02, 2025
Kubernetes Commands
kubernetes
infrastructure
Feb 02, 2025
Kubernetes Components
kubernetes
infrastructure
Feb 02, 2025
Kubernetes Configuration
kubernetes
infrastructure
Feb 02, 2025
Kubernetes Namespaces
kubernetes
infrastructure
Feb 02, 2025
Kubernetes Node
kubernetes
infrastructure
Feb 02, 2025
Kubernetes Pod
kubernetes
infrastructure
Feb 02, 2025
Kubernetes YAML Definition Files
kubernetes
infrastructure
Feb 02, 2025
Kubernetes deployments
kubernetes
infrastructure
Feb 02, 2025
Kubernetes scheduler
infrastructure
kubernetes
Feb 02, 2025
Kubernetes
distributed-systems
kubernetes
infrastructure
Feb 02, 2025
Learning Domain Driven Design
book
book-notes
ddd
software-design
Feb 02, 2025
Microservice Patterns
system-design
distributed-systems
book-notes
Feb 02, 2025
Object-oriented programming
software-design
Feb 02, 2025
Outbox Pattern vs Two-Phase Commit
distributed-systems
software-engineering
Feb 02, 2025
PHP - ArrayObject
tools
Feb 02, 2025
PHP - attributes
tools
Feb 02, 2025
PHP - class constant
tools
Feb 02, 2025
PHP - readonly
tools
Feb 02, 2025
PHP
tools
Feb 02, 2025
Domain Driven Design a Practical Guide
software-design
Feb 02, 2025
Go Lang - Functional Option Pattern
goLang
Feb 02, 2025
Go Lang - Rules of A Go Package
tools
goLang
Feb 02, 2025
Go Lang - Variadic Functions
goLang
Feb 02, 2025
Go Lang - doc.go
goLang
Feb 02, 2025
Go Lang
tools
Index
Feb 02, 2025
Go lang - Modules
goLang
Feb 02, 2025
GoLang - Idiomatic Naming Conventions
tools
goLang
Feb 02, 2025
GoLang - constants
tools
goLang
Feb 02, 2025
GoLang - primitive types
tools
goLang
Feb 02, 2025
Hexagonal Architecture & CQRS
system-design
book-notes
ddd
Feb 02, 2025
Hexagonal Architecture Actor
ddd
Feb 02, 2025
Hexagonal Architecture Adapter
ddd
system-design
Feb 02, 2025
Hexagonal Architecture Application, Core or System
ddd
system-design
Feb 02, 2025
Hexagonal Architecture Elements
ddd
system-design
Feb 02, 2025
Hexagonal Architecture Explained
book
book-notes
software-design
Feb 02, 2025
Hexagonal Architecture Interactor
ddd
system-design
Feb 02, 2025
Hexagonal Architecture Interface
ddd
system-design
Feb 02, 2025
Hexagonal Architecture Port
ddd
system-design
Feb 02, 2025
Hexagonal Architecture and DDD anti-corruption layer
system-design
ddd
Feb 02, 2025
Hexagonal Architecture vs Clean Architecture
system-design
ddd
Feb 02, 2025
How Hexagonal Architecture is Related to DDD
system-design
Feb 02, 2025
Index
writing
Index
Feb 02, 2025
Kubernetes - pods - arguments and commands
kubernetes
infrastructure
Feb 02, 2025
Kubernetes - Master vs Worker Nodes
kubernetes
infrastructure
Feb 02, 2025
Kubernetes - Node Selectors
infrastructure
kubernetes
Feb 02, 2025
Kubernetes - Resource Requirements
kubernetes
infrastructure
Feb 02, 2025
Kubernetes - Service Accounts
kubernetes
infrastructure
Feb 02, 2025
100% is the wrong reliability target
SRE
Feb 02, 2025
ACID
database
Feb 02, 2025
Acing System Design Interviews
book-notes
system-design
Feb 02, 2025
Benefits of Ports & Adapters Pattern
ddd
book-notes
software-design
Feb 02, 2025
CAP Theorem
software-design
distributed-systems
Feb 02, 2025
Communication and Coordination
distributed-systems
system-design
Feb 02, 2025
Customer Reliability Engineering
SRE
Feb 02, 2025
DDD - bounded context
system-design
ddd
Feb 02, 2025
DDD - domain abstraction
ddd
software-design
Feb 02, 2025
DDD - domain activities
ddd
software-design
Feb 02, 2025
DDD - domain objects
ddd
software-design
Feb 02, 2025
DDD - hexagonal architecture
ddd
software-design
Feb 02, 2025
DevOps Vs SRE
SRE
Feb 02, 2025
Distributed Systems - Design Patterns for Event-Driven Architecture
distributed-systems
system-design
Feb 02, 2025
Docker Basics
infrastructure
Feb 02, 2025
Docker Security
docker
infrastructure