Kumar ShivamQuantum-Safe CryptographyQuantum-safe cryptography, also known as quantum-proof or quantum-resistant cryptography, addresses the threat posed by quantum computers…2d ago2d ago
Kumar ShivamSCALE FROM ZERO TO MILLIONS OF USERS [Part 1]Designing an application to cater larger audience is an evolutionary journey. Let’s start this voyage together. We’ll begin with a Single…Nov 3, 2022Nov 3, 2022
Kumar ShivamCAP TheoremWhile designing Distributed Systems, we always consider the below approaches according to the business use case.Oct 3, 20211Oct 3, 20211
Kumar ShivamCaching Architectural pattern in microserviceCaching is the mechanism to enhance the performance of a system by avoiding round trip calls(either to the DB or to the external…Dec 20, 2020Dec 20, 2020
Kumar ShivamClean Code“Poorly crafted Code frays at the edge much faster than we might expect. “Aug 20, 2020Aug 20, 2020
Kumar ShivamChaos engineering: An introduction“Chaos Engineering is the discipline of experimenting on a system in order to build confidence in the system’s capability to withstand…Jun 14, 2020Jun 14, 2020
Kumar ShivamImplementation of Spring-Boot Data Redis for caching in my applicationRedis, which stands for Remote Dictionary Server, is a fast, open-source (BSD licensed), NoSQL, in-memory key-value data store use as a…Apr 25, 2020Apr 25, 2020
Kumar ShivamCloud forensicsCloud computing is the future. This paradigm offers significant economic benefit to the business entities. Due to this advancement, it has…Apr 11, 2020Apr 11, 2020