Design a key-value store
A Key-Value store is just a hash table, until it isn't. At scale, keys shard across servers via consistent hashing and the CAP Theorem becomes the constraint you design around. CAP Theorem Consistency

Search for a command to run...
A Key-Value store is just a hash table, until it isn't. At scale, keys shard across servers via consistent hashing and the CAP Theorem becomes the constraint you design around. CAP Theorem Consistency

I came across some practical money rules on the Mel Robbins podcast that are worth keeping front of mind. Know where your money goes. Track and budget. You can't manage what you don't measure. Split y

6 principals of effective communicators

for longevity and purpose

Andi Roberts had a nice article on how to influence people without being manipulative. There are 5 different types of influence methods: Rationalization (logic) Assertion (authority) Negotiating (mid

Without asking for approval

Adding more servers (horizontal scaling) is the key to managing load. Distributing data access across a set of servers allows for high throughput. In cloud systems it's a given that a server will go d

Clients are identified by user_id, Ip address or other modalities where server side rate limiters offer more control and not prone to manipulations over their client side variations. RateLimiters have

Lessons from the greatest sales woman in history.
