Best of ByteByteGo2023

  1. 1
    Article
    Avatar of bytebytegoByteByteGo·3y

    Sessions, Tokens, JWT, SSO, and OAuth in One Diagram

    The article explains the concepts of sessions, tokens, JWT, SSO, and OAuth in one diagram and discusses the impact of web session management on web applications. It also provides information on the most used Linux commands and outlines the aspects of cloud-native adoption. Additionally, it compares the event sourcing system design with the normal CRUD system design.

  2. 2
    Article
    Avatar of bytebytegoByteByteGo·3y

    EP69: Explaining JSON Web Token (JWT) To a 10 Year Old Kid

    This week’s system design refresher: DevOps vs. SRE vs. Platform Engineering. Explaining JSON Web Token (JWT) to a 10-year-old Kid is a special box called a JWT. The header is like the label on the outside of the box. It tells us what type of box it is and how it's secured.

  3. 3
    Article
    Avatar of bytebytegoByteByteGo·3y

    Understanding Database Types

    A complex application usually uses several different databases, each catering to a specific aspect of the application’s needs. In this comprehensive three-part series, we’ll explore the art of database selection. To make the best decision for our projects, it is essential to understand the various types of databases available in the market.

  4. 4
    Article
    Avatar of bytebytegoByteByteGo·3y

    Password, Session, Cookie, Token, JWT, SSO, OAuth - Authentication Explained - Part 1

    Password, Session, Cookie, Token, JWT, SSO, OAuth - Authentication Explained - Part 1. We discuss the problems each method solves and how to choose the right authentication method for our needs. The diagram below shows where these methods apply in a typical website architecture and their meanings.

  5. 5
    Article
    Avatar of bytebytegoByteByteGo·2y

    79 Engineering Blogs To Level Up Your System Design Skills

    A list of 79 engineering blogs to improve system design skills is provided, along with information on the Postman GraphQL client and the ByteByteGo Newsletter.

  6. 6
    Article
    Avatar of bytebytegoByteByteGo·3y

    EP81: How Companies Ship Code to Production

    This article covers the process of shipping code to production, translating a URL into an IP address, and the use cases of an API gateway.

  7. 7
    Article
    Avatar of bytebytegoByteByteGo·3y

    EP68: Top architectural styles

    New Relic APM 360 goes beyond incident response and unlocks daily performance, security, and development insights for all engineers in one unified view. Firewall explained to Kids… and Adults A firewall is a network security system that controls and filters network traffic, acting as a watchman between a private network and the public Internet.

  8. 8
    Article
    Avatar of bytebytegoByteByteGo·2y

    EP83: Explaining 9 Types of API Testing

    The article explains 9 types of API testing, the difference between API and SDK, and the top 6 use cases of object stores.

  9. 9
    Article
    Avatar of bytebytegoByteByteGo·3y

    EP80: Explaining 8 Popular Network Protocols in 1 Diagram

    The article explains 8 popular network protocols, including HTTP, HTTP/3, HTTPS, WebSocket, TCP, UDP, SMTP, and FTP. It also discusses the architecture of Docker and the evolution of message queue architectures from IBM MQ to RabbitMQ, Kafka, and Pulsar. Additionally, it provides an overview of different types of databases, including relational DB, OLAP DB, and NoSQL DBs.

  10. 10
    Article
    Avatar of bytebytegoByteByteGo·3y

    A Crash Course in DNS

    DNS is a crucial service that translates domain names into IP addresses, allowing users to access websites and resources using memorable domain names. It provides services such as host-to-IP address mapping, host aliasing, email routing, and load balancing. DNS operates as a distributed hierarchical system, with root DNS servers at the top, followed by top-level domain servers and authoritative DNS servers. There are two main methods of query resolution in DNS: iterative query resolution and recursive query resolution.

  11. 11
    Article
    Avatar of bytebytegoByteByteGo·2y

    EP90: How do SQL Joins Work?

    This article discusses how SQL joins work, the differences between cookies and sessions, and how DevOps and NoOps change the software development lifecycle.

  12. 12
    Article
    Avatar of bytebytegoByteByteGo·3y

    EP76: Netflix's Tech Stack

    In this CEO-approved slide deck, you’ll find simple ways to communicate how your team is increasing engineering efficiency. For too many engineering leaders, the most stressful part of their job isn’t a bug or a system crash. The CTO Board Deck is your secret weapon for owning any boardroom you enter.

  13. 13
    Article
    Avatar of bytebytegoByteByteGo·2y

    EP91: REST API Authentication Methods

    This post discusses REST API authentication methods, including basic authentication, token authentication, OAuth authentication, and API key authentication. It also explains the differences between symmetric encryption and asymmetric encryption. Redis data persistence options (AOF and RDB) are also explored.

  14. 14
    Article
    Avatar of bytebytegoByteByteGo·3y

    EP56: System Design Blueprint: The Ultimate Guide

    Amazon has created a unique build system, known as Brazil, to enhance productivity and empower Amazon’s micro-repo driven collaboration. McDonald's standardizes events using the following components: an event registry to define a standardized schema. An event gateway that performs identity authentication and authorization.

  15. 15
    Article
    Avatar of bytebytegoByteByteGo·2y

    EP84: Top 12 Tips for API Security

    The article provides top 12 tips for API security, explains the mobile app release process, and discusses the difference between Git and Github.

  16. 16
    Article
    Avatar of bytebytegoByteByteGo·3y

    How to Choose a Message Queue?

    The diagram below shows how it works: When the cashier takes an order, a new order is created in the database-backed queue. For Starbucks’ use case, a simple database queue meets the requirements without needing Kafka. RabbitMQ works like a messaging middleware - it pushes messages to consumers then deletes them upon acknowledgment.

  17. 17
    Article
    Avatar of bytebytegoByteByteGo·2y

    Kubernetes: When and How to Apply It

    Kubernetes is a container orchestration platform that offers infrastructure efficiency, enhanced developer productivity, easy scalability, application portability, consistent environments, resilience, a large ecosystem, and vendor neutrality. However, it also comes with drawbacks such as complexity, resource overheads, security concerns, resource underutilization, upgrade headaches, and limited support for stateful apps. Kubernetes excels for large-scale, distributed applications but may not be necessary for every workload.

  18. 18
    Article
    Avatar of bytebytegoByteByteGo·3y

    EP71: CI/CD Pipeline Explained in Simple Terms

    This week’s system design refresher: Why Google and Meta Put Billion Lines of Code In 1 Repository? What does API gateway do?