Home

Justice - 03 - Libertarianism

Justice - 03 - Libertarianism

Translations: RU
These “Justice” lectures are covering my favorite topic - Libertarianism. If I need to define my political views in one word, it would be Libertarianism. HOWEVER, when I am talking with my Libertarian acquaintances, I can call myself a “Pro-states man.” ;-) For me, it is very clear why Libertarianism is not so popular: most of the people who promote it are fanatics they try to see the world in “black and white” and close their eyes to fundamental problems.
Justice - 02 - Utilitarianism

Justice - 02 - Utilitarianism

Translations: RU
I continue overviewing lectures about Justice and sharing my mind-maps. This time I’m sharing my mind-map from the lectures on Utilitarianism. Download full mind map (PDF) Summary of the lectures: Lecture 3: Utilitarianism - Jeremy Bentham In this lecture, the speaker discusses Jeremy Bentham’s version of utilitarianism, which aims to maximize general welfare by balancing pleasure and pain, and the application of utilitarianism in cost-benefit analysis used by companies and governments.
Justice - 01 - Moral side of Murder

Justice - 01 - Moral side of Murder

Translations: RU
I have started a repeat of Harvard’s course Justice by Professor Michael J. Sandel. This course is about philosophy and discusses what is good and what is bad, and how these ideas have evolved over time. The course is especially important in today’s world as AI will soon be making decisions about WHO SHOULD LIVE AND WHO SHOULD DIE (being an IT specialist, I am interested in the patterns of falling into the first category, as you may guess ;-)
Software Engineering at Google - Chapter 1 - What is Software Engineering

Software Engineering at Google - Chapter 1 - What is Software Engineering

Translations: RU
Our IT books club has started reading new book - about Software Engineering at Google - processes, culture, and tools that help Google create and maintain high-quality software. First chapter is about Software Engineering in general: What is Software Engineering vs Software Development/Programming? Three principles Google consider: Time and Change Scale and Growth Trade-offs and Costs How these three principles are applied to Software Engineering and how it is different from Software Development/Programming Interesting opening chapter of the book:
System Design Interview - Chapter 8 - Design a URL Shortener

System Design Interview - Chapter 8 - Design a URL Shortener

Translations: RU
The previous chapters have described the underlying technologies such as consistent hashing, ID generator, and now using these techniques we can develop a URL shortener that can generate 100 million URLs per day. Design consists of the following elements: API endpoints URL redirecting URL shortening Data model Hash functions: Hash + collision resolution vs Base-62 conversion Additional topics to consider: Rate limiter Web server scaling Database scaling Analytics Availability, consistency, and reliability These items are disclosed in a very interesting Chapter 8 of the book:
System Design Interview - Chapter 7 - Design a Unique ID Generator in Distributed Systems

System Design Interview - Chapter 7 - Design a Unique ID Generator in Distributed Systems

Translations: RU
Generating unique ID seems to be a simple task, but it is not in a high-load distributed systems! This topic consists of: Understanding the requirements and why it is a complicated task Possible solutions: Multi-master replication Universally unique identifier (UUID) Ticket server Twitter SNOWFLAKE approach (seems to be the best one!) Details: Timestamp Sequence number Other issues Clock synchronization Section length tuning High availability These items are disclosed in a very interesting Chapter 7 of the book:
System Design Interview - Chapter 6 - Design a Key-Value store

System Design Interview - Chapter 6 - Design a Key-Value store

Translations: RU
Key-Value stores are the most basic but widely used data storages. Design of key-value store consists of understanding the following topics: What do we want from key-value store? Single server key-value store DISTRIBUTED key-value store: CAP theorem Real-world trade-offs for distributed systems System components: Data partition Data replication Consistency Inconsistency resolution: Versioning Handling all types of failures: Failure detection, Handling TEMPORARY failures, Handling PERMANENT failures, Handling data center outage System architecture diagram Write path Read path These items are disclosed in a very interesting Chapter 6 of the book:
System Design Interview - Chapter 5 - Design Consistent Hashing

System Design Interview - Chapter 5 - Design Consistent Hashing

Translations: RU
Consistent Hashing is a cornerstone technology for distributed systems. Many of software developers don’t realize it, but Consistent Hashing is needed in many places: load balancers, caches, CDNs, id generators, databases, chats / social networks, and many other systems. This topic consists of: Problem with rehashing and why we need hashing to be CONSISTENT Hash space and hash ring BASIC approach (introduced by Karger et al. at MIT) Advanced approach with VIRTUAL NODES These items are disclosed in a very interesting Chapter 5 of the book:
System Design Interview - Chapter 4 - Design a Rate Limiter

System Design Interview - Chapter 4 - Design a Rate Limiter

Translations: RU
Every popular software should have a Rate Limiter. It prevents DDOS attack, reduces cost and prevents servers from being overloaded. There are some tricky questions to be considered during implementation of Rate Limiter: Where to put Rate Limiter: client-side, server-side, gateway? Algorithms for rate limiting. There are many algorithms with pros and cons: Token bucket, Leaking bucket, Fixed window counter, Sliding window log, Sliding window counter. Your business needs will define the right algorithm.
System Design Interview - Chapter 3 - A Framework for System Design Interviews

System Design Interview - Chapter 3 - A Framework for System Design Interviews

Translations: RU
Four standard steps for system design interview. However, I would think about them wider: as about four initial steps to design the software. Step 1. Understand the problem and establish design scope Step 2. Propose high-level design and get buy-in Step 3. Design deep dive Step 4. Wrap up The chapter 3 of the book discovers details about each step, good questions to ask (to think about), DO’s and DONT’s.