Home Programming
Showing list of programming blogs
- Final year computer engineering project ideas
- How anti virus software works
- Various types of tokens explained
- How we manage sessions in mobile and desktop apps without cookies
- How mobile and desktop apps managed sessions without tokens in early days
- All Build management tools explained
- All Package management tools explained
- Authentication Protocols explained
- Network Protocols explained
- The CAP Theorem
- Difference between Message queues and publish-subscribe (Pub/Sub) systems
- what is code linting?
- Various repo strategies in software projects
- Do we still need SOAP based services when we can build Restful services?
- Difference between Services-Oriented Architecture (SOA) and Microservices Architecture
- Design patterns with examples
- What is Solid design principles?
- What is ORM (Object-Relational Mapping) technologies
- Roles and Responsibilities of A Full Stack Developer
- Distributed system - explained with examples
- Difference between Monolithic and microservice architectures
- Example of Personally Identifiable Information (PII) data
- How to manage Personally Identifiable Information (PII) data in a software project
- Difference between rider and vscode IDE
- Top Application Performance Monitoring Platforms
- Various authentication and authorization protocols used in modern applications and systems
- Oauth 1 vs OAuth 2.0
- What is OWASP?
- why we need production like data for testing
- Difference between Staging and preprod environment
- BDD vs TDD
- Scalable architectural patterns and design principles - DDD, CQRS, Event Sourcing, MVC, messaging, microservices
- Fluent API and Generics with example
- firefox extension manifest file
- why we have rc word in config file names
- Embedded Software Engineer role and responsibilities
- use of Checksum (SHA512) when downloading software
- Difference between Web 2.0 and Web 3.0
- why and when Kotlin language was developed
- why and when Elixir language was developed
- why and when Julia language was developed
- top new programming languages
- How to develop proxy server using nodejs
- How HTTPS certificates help secure the http connection
- How ciphers are used for encryption and decryptions of data
- how the https certificate is validated using chain of trust
- How the tls connection is made - step by step
- commands to generate private key and self signed SSL certificate using openSSL
- why data streaming is important
- OpenSSL components