March 19, 2026

Post Image

Explained: Bastion Server

Bastion Server Your database server should never be one misconfigured security group away from the public internet. Yet in many infrastructure setups — especially early-stage ones — that's exactly what happens. Private servers get assigned public IPs. SSH ports get opened to 0.0.0.0/0 . Engineers take shortcuts to move fast, and the exposure quietly accumulates. A Bastion Server is one of the simplest, most effective patterns to prevent this. The… Read More
by Phee Jay

March 19, 2026

Post Image

Explained: Bloom Filters

Bloom Filters Modern systems often need to answer one simple question extremely fast: “Have we seen this item before?” But storing millions (or billions) of items in memory is expensive. Bloom filters solve this problem using very little memory. They trade perfect accuracy for efficiency: ✅ No false negatives ⚠️ Possible false positives What Is a Bloom Filter? A Bloom filter is a probabilistic data structure used to test whether an element is i… Read More
by Phee Jay

May 22, 2025

Post Image

Explained: Gossip Protocol

In the landscape of distributed systems, the need for scalable, fault-tolerant communication is a constant. Whether you're managing a database cluster, orchestrating containers, or building a blockchain network, you'll eventually need a way for machines to share information without drowning in complexity. One solution that has quietly become foundational is the gossip protocol — a deceptively simple algorithm that spreads informati… Read More
by Phee Jay

February 21, 2025

Post Image

Explained - Understanding WSL (Windows Subsystem for Linux)

Windows Subsystem for Linux Windows Subsystem for Linux ( WSL ) is a compatibility layer designed by Microsoft to run Linux binaries natively within Windows. It provides an Ubuntu-like experience without requiring a virtual machine ( VM ) or a dual-boot system. Read More
by Phee Jay

February 07, 2025

Post Image

Introduction to OpenTelemetry

OpenTelemetry Imagine trying to debug a slow API endpoint. With traditional logging, you're sifting through files across multiple services. OpenTelemetry offers a powerful solution, letting you follow a request from start to finish, quickly identifying the bottleneck. Read More
by Phee Jay

February 01, 2025

Post Image

Hadoop - The Evolution of Hadoop: From Batch to Real-Time Processing

Hadoop has come a long way since its inception. Originally designed as a batch processing framework for handling large datasets, it has evolved into a versatile ecosystem that supports real-time data processing and analytics. This article explores the journey of Hadoop, from its early days to its modern capabilities. Read More
by Phee Jay

February 01, 2025

Post Image

Jupyter - How to install Jupyter on Windows?

Steps to install Jupyter on Windows Read More
by Phee Jay

January 20, 2025

Post Image

Hadoop - What is Hadoop? An Overview of the Ecosystem

In an era where data is considered the new oil, managing and processing large volumes of data efficiently is critical for businesses. Hadoop, an open-source framework, has revolutionized the way organizations store, process, and analyze massive datasets. In this article, we’ll explore what Hadoop is, its core components, and how it fits into the broader big data ecosystem. Read More
by Phee Jay

January 16, 2025

Post Image

JSON Serialization - How to Preserve the Type with Jackson

Learn how to preserve type information during JSON serialization and deserialization using Jackson. This guide explains best practices, including the use of @JsonTypeInfo and enabling default typing, to maintain object structure while working with polymorphic types in Java. Read More
by Phee Jay

January 03, 2025

Post Image

Explained - Key Data Concepts: Data Warehouse, Data Mart, Data Lake, and Data Lakehouse

Explore the differences between data warehouses, data marts, data lakes, and data lakehouses. Understand their features, use cases, and how to choose the right solution for effective data management. Read More
by Phee Jay

January 03, 2025

Post Image

Explained - Lambda Architecture

Lambda Architecture Learn about Lambda Architecture, a data-processing framework that combines batch and real-time processing to efficiently handle massive data streams, ensuring scalability, fault tolerance, and accuracy in data systems. Read More
by Phee Jay

January 03, 2025

Post Image

Java - How to create Immutable Classes in Java

Discover how to create immutable classes in Java with step-by-step guidance, key principles, and best practices for designing secure and robust objects. Read More
by Phee Jay

January 03, 2025

Post Image

Explained - Key differences between Kafka and AMQP

Understand the key differences between Kafka and AMQP, comparing their architectures and use cases to help you choose the right solution. Read More
by Phee Jay

November 22, 2024

Post Image

Explained - WebDrivers

Explore the fundamentals of WebDrivers, the key components for browser automation in Selenium. Learn how WebDrivers interact with browsers, their role in executing automated tests, and tips for choosing the right WebDriver for your project needs. Read More
by Phee Jay

November 14, 2024

Post Image

Explained - Webhooks

Discover the concept of webhooks, a lightweight way for apps to send real-time data updates. Learn how they work, common use cases, and best practices for implementing secure and efficient webhooks in your applications. Read More
by Phee Jay

November 10, 2024

Post Image

Explained - IPSec VPN Tunnels

IPSec VPN Tunnels A deep-dive for engineers who need to reason about IPSec at a design level; not just configure it. There's a reason IPSec has survived decades of evolving network architecture; it's not elegant, but it's thorough. Understanding it properly means getting past the surface-level "it encrypts your traffic" explanation and into how the protocol suite actually negotiates, wraps, and protects packets at every hop. W… Read More
by Phee Jay

October 28, 2024

Post Image

Explained - Data Mesh

Explore the concept of Data Mesh in this white paper, a decentralized approach to data architecture. Learn how it empowers domain teams, ensures scalability, and improves data ownership and quality, revolutionizing traditional data management practices. Read More
by Phee Jay

October 28, 2024

Post Image

Explained - Message Queuing Telemetry Transport (MQTT)

The blog post provides a detailed overview of the MQTT protocol, focusing on its architecture, benefits, and use cases in IoT environments. Read More
by Phee Jay

October 28, 2024

Post Image

Explained - Distributed Storage Systems

The blog post explores distributed storage systems, discussing their architecture, benefits, and key technologies like consistency models and replication. It covers use cases, scalability, fault tolerance, and the evolution of storage solutions for modern applications. Read More
by Phee Jay

December 09, 2022

Post Image

Okta - PKCE Verification Failed while requesting token

Understand and resolve the "PKCE verification failed" error when integrating with Okta. This guide explains common causes, such as mismatched code verifiers, and provides troubleshooting steps to ensure secure and successful OAuth 2.0 authentication flows. Read More
by Phee Jay
×