-
Notifications
You must be signed in to change notification settings - Fork 0
Description
https://blog.bytebytego.com/p/free-system-design-pdf-158-pages
https://blog.bytebytego.com/api/v1/file/d0601f5c-3308-430c-90d9-7f1c723b6ddd.pdf
Big Endian vs Little Endian 7
How do we incorporate Event Sourcing into the systems? 9
How can Cache Systems go wrong 11
Linux file system explained 13
My recommended materials for cracking your next technical interview 14
How Git Commands work 16
Top 4 Most Popular Use Cases for UDP 17
How Does a Typical Push Notification System Work? 18
How can Cache Systems go wrong? 20
REST API Cheatsheet 22
Top 8 Programming Paradigms - Part 1 23
Data Pipelines Overview 25
API Vs SDK 27
A handy cheat sheet for the most popular cloud services 29
A nice cheat sheet of different monitoring infrastructure in cloud services 30
REST API Vs. GraphQL 32
Key Use Cases for Load Balancers 34
Top 6 Firewall Use Cases 36
Types of memory. Which ones do you know? 38
How Do C++, Java, Python Work? 40
Top 6 Load Balancing Algorithms 41
How does Git work? 43
HTTP Cookies Explained With a Simple Diagram 44
How does a ChatGPT-like system work? 45
A cheat sheet for system designs 47
Cloud Disaster Recovery Strategies 49
Visualizing a SQL query 51
How does REST API work? 52
Explaining 9 types of API testing 53
Git Merge vs. Rebase vs.Squash Commit! 55
What is a cookie? 57
How does a VPN work? 59
Top Software Architectural Styles 61
Understanding Database Types 63
Cloud Security Cheat Sheet 64
GitOps Workflow - Simplified Visual Guide 66
How does “scan to pay” work? 68
How do Search Engines Work? 70
The Payments Ecosystem 72
Object-oriented Programming: A Primer 74
Where do we cache data? 75
Flowchart of how slack decides to send a notification 77
What is the best way to learn SQL? 78
What is gRPC? 79
How do live streaming platforms like YouTube Live, TikTok Live, or Twitch work? 80
Linux Boot Process Illustrated 83
How does Visa make money? 85
Session, Cookie, JWT, Token, SSO, and OAuth 2.0 Explained in One Diagram 87
How do we manage configurations in a system? 89
What is CSS (Cascading Style Sheets)? 91
What is GraphQL? Is it a replacement for the REST API? 93
System Design Blueprint: The Ultimate Guide 95
Polling Vs Webhooks 97
How are notifications pushed to our phones or PCs? 99
9 best practices for developing microservices 101
Oauth 2.0 Explained With Simple Terms 102
How do companies ship code to production? 104
How do we manage sensitive data in a system? 106
Cloud Load Balancer Cheat Sheet 108
What does ACID mean? 110
CAP, BASE, SOLID, KISS, What do these acronyms mean? 112
System Design cheat sheet 114
How will you design the Stack Overflow website? 116
A nice cheat sheet of different cloud services 118
The one-line change that reduced clone times by a whopping 99%, says Pinterest 120
Best ways to test system functionality 122
Encoding vs Encryption vs Tokenization
Encoding, encryption, and tokenization are three distinct processes that handle data in different
ways for various purposes, including data transmission, security, and compliance. 124
Kubernetes Tools Stack Wheel 126
How does Docker work? 128
Top 6 Database Models 130
How do we detect node failures in distributed systems? 132
10 Good Coding Principles to improve code quality 134
15 Open-Source Projects That Changed the World 136
Reverse proxy vs. API gateway vs. load balancer 138
Linux Performance Observability Tools 140
Top 9 website performance metrics you cannot ignore 141
How do we manage data? 143
Postman vs. Insomnia vs. ReadyAPI vs. Thunder Client vs. Hoppscotch 145
How does gRPC work?
RPC (Remote Procedure Call) is called “𝐫𝐞𝐦𝐨𝐭𝐞” because it enables communications between
remote services when services are deployed to different servers under microservice
architecture. From the user’s point of view, it acts like a local function call.
147
Have you heard of the 12-Factor App?
How does Redis architecture evolve?
Cloud Cost Reduction Techniques
Linux file permission illustrated
My Top 9 Favorite Engineering Blogs
9 Best Practices for Building Microservices
Roadmap for Learning Cyber Security
How does Javascript Work?
Can Kafka Lose Messages?
You're Decent at Linux if You Know What Those Directories Mean :)
Netflix's Tech Stack
Top 5 Kafka use cases
Top 6 Cloud Messaging Patterns.
How Netflix Really Uses Java?
Top 9 Architectural Patterns for Data and Communication Flow
What Are the Most Important AWS Services To Learn?
8 Key Data Structures That Power Modern Databases
How do we design effective and safe APIs?
Who are the Fantastic Four of System Design?
How do we design a secure system?
Things Every Developer Should Know: Concurrency is NOT parallelism.
HTTPS, SSL Handshake, and Data Encryption Explained to Kids.
Top 5 Software Architectural Patterns
Top 6 Tools to Turn Code into Beautiful Diagrams
Everything is a trade-off.
What is DevSecOps?
Top 8 Cache Eviction Strategies.
Linux Boot Process Explained
Unusual Evolution of the Netflix API Architecture
GET, POST, PUT... Common HTTP “verbs” in one figure
Top 8 C++ Use Cases
Top 4 data sharding algorithms explained.
10 years ago, Amazon found that every 100ms of latency cost them 1% in sales.
Load Balancer Realistic Use Cases You May Not Know
25 Papers That Completely Transformed the Computer World.
IPv4 vs. IPv6, what are the differences?
My Favorite 10 Books for Software Developers
151
153
155
157
158
160
162
163
165
167
169
171
172
175
177
179
181
182
183
185
187
189
191
193
194
196
198
200
202
204
206
208
210
212
214
216
218
Change Data Capture: Key to Leverage Real-Time Data 220
Netflix's Overall Architecture 222
Top 5 common ways to improve API performance. 224
How to diagnose a mysterious process that’s taking too much CPU, memory, IO, etc? 226
What is a deadlock? 227
What’s the difference between Session-based authentication and JWTs? 229
Top 9 Cases Behind 100% CPU Usage. 231
Top 6 ElasticSearch Use Cases. 233
AWS Services Cheat Sheet 235
How do computer programs run? 236
A cheat sheet for API designs. 238
Azure Services Cheat Sheet 240
Why is Kafka fast? 241
How do we retry on failures? 243
7 must-know strategies to scale your database. 245
Reddit’s Core Architecture that helps it serve over 1 billion users every month. 247
Everything You Need to Know About Cross-Site Scripting (XSS). 249
15 Open-Source Projects That Changed the World 251
Types of Memory and Storage 253
How to load your websites at lightning speed? 254
25 Papers That Completely Transformed the Computer World. 256
10 Essential Components of a Production Web Application. 258
Top 8 Standards Every Developer Should Know. 259
Explaining JSON Web Token (JWT) with simple terms. 261
11 steps to go from Junior to Senior Developer. 262
Top 8 must-know Docker concepts 264
Top 10 Most Popular Open-Source Databases 266
What does a typical microservice architecture look like? 267
What is SSO (Single Sign-On)? 269
What makes HTTP2 faster than HTTP1? 271
Log Parsing Cheat Sheet 273
4 Ways Netflix Uses Caching to Hold User Attention 275
Top 6 Cases to Apply Idempotency. 277
MVC, MVP, MVVM, MVVM-C, and VIPER architecture patterns 279
What are the differences among database locks? 280
How do we Perform Pagination in API Design? 282
What happens when you type a URL into your browser? 284
How do you pay from your digital wallet by scanning the QR code? 286
What do Amazon, Netflix, and Uber have in common? 288
100X Postgres Scaling at Figma. 290
How to store passwords safely in the database and how to validate a password? 292
Cybersecurity 101 in one picture. 294
What do version numbers mean? 295
What is k8s (Kubernetes)? 297
HTTP Status Code You Should Know 299
18 Most-used Linux Commands You Should Know 300
Iterative, Agile, Waterfall, Spiral Model, RAD Model... What are the differences? 302
Design Patterns Cheat Sheet - Part 1 and Part 2 304
9 Essential Components of a Production Microservice Application 305
Which latency numbers you should know? 307
API Gateway 101 309
A Roadmap for Full-Stack Development. 310
OAuth 2.0 Flows 312
10 Key Data Structures We Use Every Day 313
Top 10 k8s Design Patterns 315
What is a Load Balancer? 317
8 Common System Design Problems and Solutions 319
How does SSH work? 321
How to load your websites at lightning speed? 322
Why is Nginx so popular? 324
How Discord Stores Trillions of Messages 325
How does Garbage Collection work? 327
A Cheat Sheet for Designing Fault-Tolerant Systems. 329
If you don’t know trade-offs, you DON'T KNOW system design. 331
8 Tips for Efficient API Design. 333
The Ultimate Kafka 101 You Cannot Miss 335
A Cheatsheet for UML Class Diagrams 336
20 Popular Open Source Projects Started or Supported By Big Companies 339
A Crash Course on Database Sharding 341
Is PostgreSQL eating the database world? 343
The Ultimate Software Architect Knowledge Map 344
A Crash Course on Scaling the Data Layer 347
How can Cache Systems go wrong? 348
4 Popular GraphQL Adoption Patterns 350
Top 8 Popular Network Protocols 352
11 Things I learned about API Development from POST/CON 2024 by Postman. 353
How do Search Engines really Work? 355
The Ultimate Walkthrough of the Generative AI Landscape 357
Cheatsheet on Relational Database Design 358
My Favorite 10 Soft Skill Books that Can Help You Become a Better Developer 360
REST API Authentication Methods 362
The Evolving Landscape of API Protocols 366
