Sharan KUnderstanding the ACID Properties of Database TransactionsBefore we get into ACID properties of database transactions, let's look into transactions first.10 min read·Apr 4, 2023----
Sharan KTypes of databasesA database is a collection of organized data that is stored and accessed electronically. It is designed to efficiently manage, store…3 min read·Apr 3, 2023----
Sharan KEvent-driven architectureEvent-driven architecture (EDA) is a software architecture pattern that emphasizes the production, detection, and consumption of events in…5 min read·Mar 29, 2023----
Sharan KSSL/TLS, the version history.SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are cryptographic protocols used to secure communications over the internet…2 min read·Mar 29, 2023----
Sharan KMicroservice architecture — #1Microservices are a software architecture pattern that involves breaking down a complex application into more minor, independent services…3 min read·Mar 28, 2023--1--1
Sharan KSoftware architectural patternsSoftware architectural patterns are general, reusable solutions to common software design problems. They are high-level, abstract concepts…4 min read·Mar 27, 2023--1--1
Sharan KWhat is TCP and How does it work?TCP, or Transmission Control Protocol, is a reliable transport protocol used to transmit data over networks. It provides reliable, ordered…2 min read·Mar 22, 2023--1--1
Sharan KTCP/IP modelThe TCP/IP model is a layered networking architecture that is used to standardize communication protocols used on the internet. The model…2 min read·Mar 21, 2023----
Sharan KJust 10 things you should know to become a fabulous software engineer.Learn the fundamentals of programming: Make sure you have a solid foundation in programming concepts such as data structures, algorithms…2 min read·Mar 20, 2023--1--1
Sharan KFew world’s most used protocolsThere are several widely used protocols that enable communication between devices and networks in the world. Here are explanations of some…2 min read·Mar 19, 2023--1--1