Author: root

  • Using Kafka: Software Architecture Overview

    Kafka Overview There are conflicting opinions about microservices, where some people straight refuse to use microservices, as they are considered tech debt. However, most of the companies I worked with try to contain certain logic or domains within a separate service. An ideal microservice is fully isolated from other microservices and does nothing effectively. However,…

    Kafka Software Architecture
  • Using MongoDB: Software Architecture Overview

    MongoDB Overview Love it or hate it, MongoDB has secured the sweet spot of the “go-to NoSQL database” in the startup segment. Some of its features aren’t well-thought, added in haste according to the market demand, which on the other hand highlights the enterprise orientation of the multi-billion company behind it. Unlike SQL, MongoDB comes…

    MongoDB software architecture
  • Using Redis: Software Architecture Overview

    Redis Overview Redis is primarily known as a go-to cache solution. It is blazingly fast, as it has a very limited set of IO operations and the primary source of data is RAM. Despite the reputation of “the cache”, Redis is widely used as a quick state. For example, if an organization has multiple services…

    Redis
  • Using PostgreSQL: Software Architecture Overview

    PostgreSQL Overview No matter what you do, the chance is you need to store the data you serve to consumers, as well as to keep the data you receive from them. There’s hardly a system design that doesn’t involve a storage solution. Despite that almost every storage boils down to a file, the way you…

    PostgreSQL Software Architecture
  • Intro: What Software Architecture is and what is not

    Since becoming a software architect, I have wondered what my core responsibilities are. If you are reading this, you are possibly asking the same question or simply confused by the software architecture definition in general. I personally haven’t found any definitive answer yet, but I hope you can help me find out. The Problematic State…

    Software Architecture
  • How to Install SonarQube Using Docker

    Introduction SonarQube is an open-source platform for continuous inspection of code quality. It provides detailed reports on bugs, code smells, and security vulnerabilities in your codebase. In this guide, we’ll show you how to install SonarQube, Docker-powered. Prerequisites Step-by-Step Installation This command will download the latest SonarQube Docker image and run it as a daemon.…

  • Network structure, layers and devices explained

    The Open System Interconnection Reference Model OSI reference model is a unified model or standard that helps to stick devices manufactured by different companies work together. OSI reference model consists of 7 layers, that define functionality & limitations. Network devices can operate on a single or multiple layers based on a device capability or network…

  • OWASP Top 10 attack vectors, risks, and tools explained

    What’s OWASP briefly OWASP stands for Open Web Application Security Project, a non-profit organization that’s focused on web application security standards, tools, and methodologies. OWASP top 10 in its turn stands for Top-10 major and wide-spread security risks of web applications (doesn’t matter backend or frontend ones). OWASP is a registered trademark of the OWASP foundation…

  • Top-5 handy lerna flags for your monorepo

    –scope <package_name | name_pattern> This filter limits the command execution scope only to packages that meet the condition. For example: Wait, what is this lerna? Lerna is a monorepo tool, that makes you having all packages at hand. It significantly simplifies your git and versioning routine. Read more about lerna. –ignore <package_name | name_pattern> This one…

  • 5 stages of penetration testing explained

    Active and passive reconnaissance Passive reconnaissance Passive reconnaissance doesn’t include using actual pentesting utils but rather is an analysis of what the organization looks like from within. A good start is to google as much information as you can about the target. You can search for job openings, financial reports, and office photos. Especially useful…