Low Level Design: Data Warehouse Design
5 min read A data warehouse is an analytical database optimized for read-heavy, aggregation-heavy workloads over large historical datasets. Unlike OLTP databases designed […] Read article
5 min read A data warehouse is an analytical database optimized for read-heavy, aggregation-heavy workloads over large historical datasets. Unlike OLTP databases designed […] Read article
9 min read Cache invalidation — ensuring cached data reflects the current state of the source of truth — is famously difficult. Phil Read article
4 min read Database replication maintains copies of a database on multiple servers for high availability, read scaling, and disaster recovery. Understanding replication Read article
4 min read Service discovery allows microservices to find each other’s network addresses without hardcoded configuration. In a dynamic environment where services scale Read article
4 min read Microservices architecture decomposes a monolith into independently deployable services, each owning a bounded domain. This enables independent scaling, technology heterogeneity, Read article
8 min read An image processing pipeline handles user-uploaded images: validating, resizing, compressing, and formatting them for web and mobile delivery. Instagram, Pinterest, Read article
4 min read A data pipeline moves data from operational systems (databases, event streams, APIs) to analytical systems (data warehouses, data lakes) where Read article
4 min read A video calling system enables real-time audio and video communication between users in a browser or mobile app. WebRTC (Web Read article
8 min read An object storage system stores arbitrary binary data (files, images, videos, backups) addressable by a globally unique key, with near-infinite Read article
4 min read A transactional email delivery system sends emails triggered by application events — welcome emails on registration, password reset links, order Read article
4 min read A graph database stores data as nodes (entities) and edges (relationships), enabling efficient traversal of complex, highly connected data. Social Read article
8 min read Two-factor authentication (2FA) requires users to present two forms of evidence: something they know (password) and something they have (phone, Read article
4 min read A real-time analytics pipeline processes streams of events and makes the results available for querying within seconds — enabling live Read article
6 min read A Content Delivery Network (CDN) caches content at edge servers distributed globally — close to users — to reduce latency Read article
7 min read OAuth2 is an authorization framework that lets users grant third-party applications limited access to their data without sharing passwords. OpenID Read article