This week’s system design refresher: Vertical Vs Horizontal Scaling: Key Differences You Should Know (Youtube video) REST API Authentication Methods Symmetric encryption vs asymmetric encryption How does Redis persist data? Vertical Vs Horizontal Scaling: Key Differences You Should Know
Thanks for sharing your favourite engineering blogs! Shameless plug: I'm building a Substack newsletter called "Big Tech Digest" where I aggregate links to the latest articles from over 300 Big Tech and startup engineering blogs like Meta, Google, Uber, Airbnb, Doordash, and more. I'm sending them out every two weeks for free with a short summary.
I really enjoy your newsletter. Even though I do not work in the nuts and bolts of system design, it is so important to understand the intricacies especially when consulting around enterprise solutions. Thank you for all your valuable insight.
For the API auth the part saying" sends the credentials in plaintext" is misleading. It suggests the others are inherently not plain text but all of these solutions require a secure transport (i e. TLS via Https) or they inadequate. For example, run a request with a bearer token over http and packets sniffed along the way permit others to use the token as well. Whether it's an access token, API key, or base64 encoded basic auth token doesn't matter without TLS
I love your diagrams? Do you use specific tool or?
Thanks for sharing your favourite engineering blogs! Shameless plug: I'm building a Substack newsletter called "Big Tech Digest" where I aggregate links to the latest articles from over 300 Big Tech and startup engineering blogs like Meta, Google, Uber, Airbnb, Doordash, and more. I'm sending them out every two weeks for free with a short summary.
I really enjoy your newsletter. Even though I do not work in the nuts and bolts of system design, it is so important to understand the intricacies especially when consulting around enterprise solutions. Thank you for all your valuable insight.
For the API auth the part saying" sends the credentials in plaintext" is misleading. It suggests the others are inherently not plain text but all of these solutions require a secure transport (i e. TLS via Https) or they inadequate. For example, run a request with a bearer token over http and packets sniffed along the way permit others to use the token as well. Whether it's an access token, API key, or base64 encoded basic auth token doesn't matter without TLS
Any plans to switch platforms now that Substack openly supports nazis? https://www.techdirt.com/2023/12/26/substack-turns-on-its-nazis-welcome-sign/
Thank you
Very helpful API breakdown & explainer! Thank you
Loving it.