Skip to content

LOVE IT

  • Home
  • New Feed
  • Tech Article
  • My Course
  • About Me
  • Home
  • New Feed
  • Tech Article
  • My Course
  • About Me
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Enable Internet access in a Private Network (GCP)
Posted inArticle GCP Networking

Enable Internet access in a Private Network (GCP)

Posted by By Dragon January 16, 2025
Scenario - Bob tries configure the VM to his requirements and has to install &…
Read More
What happens when you type google .com into a browser
Posted inFeed Networking

What happens when you type google .com into a browser

Posted by By Dragon January 13, 2025
The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online…
Read More
Crash Course About Message Queues
Posted inFeed Networking System Design

Crash Course About Message Queues

Posted by By Dragon January 10, 2025
Asynchronous communication has become an important strategy for modern software systems, particularly in distributed and…
Read More
API Gateway
Posted inFeed Microservices System Design

API Gateway

Posted by By Dragon January 8, 2025
API Gateways are essential components in modern software architectures, particularly microservices-based systems. They act as…
Read More
What is a webhook?
Posted inFeed Networking

What is a webhook?

Posted by By Dragon January 6, 2025
Assume we run an eCommerce website. The clients send orders to the order service via…
Read More
Polling vs. Webhooks
Posted inFeed Networking

Polling vs. Webhooks

Posted by By Dragon January 6, 2025
1. Polling Polling involves repeatedly checking the external service or endpoint at fixed intervals to…
Read More
Pessimistic vs Optimistic Locking
Posted inFeed Database System Design

Pessimistic vs Optimistic Locking

Posted by By Dragon January 4, 2025
Locks are essential to maintain data consistency and integrity in multi-user environments. They prevent simultaneous…
Read More
Resilient Microservice Design Patterns –Circuit Breaker Pattern
Posted inArticle Microservices System Design

Resilient Microservice Design Patterns –Circuit Breaker Pattern

Posted by By Dragon January 4, 2025
Coming soon
Read More
The Common Deployment Strategies Explained and Compared
Posted inArticle Networking System Design

The Common Deployment Strategies Explained and Compared

Posted by By Dragon December 30, 2024
There are a variety of techniques to deploy new applications to production, so choosing the…
Read More
Resilient Microservice Design Patterns –Rate Limiter Pattern
Posted inArticle Microservices System Design

Resilient Microservice Design Patterns –Rate Limiter Pattern

Posted by By Dragon December 29, 2024
Coming soon
Read More

Posts pagination

Previous page 1 2 3 4 5 Next page

Recent Posts

  • Top 20 AI Concepts You Should Know
  • AI Vs Machine Learning Vs Deep Learning Vs Generative AI
  • How YouTube Supports Billions of Users with MySQL and Vitess
  • How to store passwords safely in the database and how to validate a password
  • Top 5 common ways to improve API performance

Recent Comments

  1. Aaliyah383 on API Gateway
  2. Trent1952 on From Monolith to Microservices: Key Transition Patterns
  3. Lachlan2973 on Top Strategies to Reduce Latency
  4. Katherine1169 on AWS-Disaster Recovery
  5. Dragon on Transaction Isolation Levels in DBMS

Archives

  • June 2025
  • May 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • November 2024

Categories

  • AI
  • Architecture
  • Article
  • AWS
  • Caching
  • Database
  • Dot Net
  • Feed
  • GCP
  • Gen AI
  • Java
  • Kafka
  • Load Balancing
  • Microservices
  • Migration
  • Networking
  • Networking
  • Spring Boot
  • System Design
  • Web
Post You Might Like
Posted inFeed AI
Top 20 AI Concepts You Should Know
Posted by By Dragon June 22, 2025
Posted inFeed AI Gen AI
AI Vs Machine Learning Vs Deep Learning Vs Generative AI
Posted by By Dragon June 22, 2025
Posted inArticle Database System Design
How YouTube Supports Billions of Users with MySQL and Vitess
Posted by By Dragon May 9, 2025
Posted inFeed Database System Design
How to store passwords safely in the database and how to validate a password
Posted by By Dragon May 8, 2025
Copyright 2025 — LOVE IT. All rights reserved.
Scroll to Top