"Hello, World!"
Security Information and Event Management (SIEM): The Big Picture

Security Information and Event Management (SIEM): The Big Picture

đź’ˇBusinesses and Organizations across various sectors face constant threats from cybercriminals. In
Read More
A Guide to Understanding Representational State Transfer (REST) Constraints

A Guide to Understanding Representational State Transfer (REST) Constraints

REST is an architectural style, a term coined by Roy Fielding in
Read More
OAuth Client Credentials Flow vs. Authorization Code Flow with PKCE: Which One to Use and When

OAuth Client Credentials Flow vs. Authorization Code Flow with PKCE: Which One to Use and When

Building your own authentication and authorization system is extremely time-consuming and complex.
Read More
Generating and Validating JSON Web Tokens in .NET

Generating and Validating JSON Web Tokens in .NET

JSON Web Tokens (JWT) are used for secure information exchange between systems,
Read More
Load Balancing using YARP Reverse Proxy

Load Balancing using YARP Reverse Proxy

In this blog post, we will be using YARP (Yet Another Reverse
Read More
Scaling Reads with Single Leader Replication in MySQL

Scaling Reads with Single Leader Replication in MySQL

One of the reasons for replication is to increase read throughput. This
Read More
Readers don’t block writers, and writers don’t block readers

Readers don’t block writers, and writers don’t block readers

đź’ˇThis blog post will explain how Multi-Version Concurrency Control (MVCC) works in
Read More
Ensuring Data Integrity with Write-Ahead Logging

Ensuring Data Integrity with Write-Ahead Logging

Write-ahead logging (WAL) is a technique used to maintain data integrity and
Read More
How PostgreSQL Stores Data onto Disk

How PostgreSQL Stores Data onto Disk

Have you ever wondered how a database actually stores data onto disk?
Read More
Time Complexity Analysis with Big O Notation

Time Complexity Analysis with Big O Notation

đź’ˇIn this blog post, we will focus on understanding the math behind
Read More
Cost Function in Linear Regression

Cost Function in Linear Regression

A cost function is nothing but a measurement of how good or
Read More
Stemming and Lemmatization in Natural Language Processing

Stemming and Lemmatization in Natural Language Processing

Stemming and lemmatization are common text preprocessing techniques used in Natural Language
Read More
"Hello, World!" © 2025
Powered by Ghost