Redis Explained
Architecture Notes
@arcnotes
engineering notes about software architecture from your favourite corps by engineers for engineers.
Architecture Notes’s Tweets
How does technical debt accrue? Most people would say bad engineering. What is bad engineering? Inflexibility? Is one system engineered correctly to do one thing trying to do something else considered bad engineering? architecturenotes.co/technical-debt/
1
4
31
Prefer learning visually like us? Want to visualize your actual codebase so you can better understand and refactor your code? Look no further than CodeSee! codesee.io/code-visualiza
1
4
Prefer learning visually like us? Want to visualize your actual codebase so you can better understand and refactor your code? Look no further than CodeSee! codesee.io/code-visualiza
1
4
A small mistake does not a complex systems failure make
9
Your tech stack is not the product
5
27
programmers are people who agreed to do homework for the rest of their lives.
52
1,660
4,886
The yaml document from hell ruudvanasseldonk.com/2023/01/11/the
11
32
1
1
12
Show this thread
Prefer learning visually like us? Want to visualize your actual codebase so you can better understand and refactor your code? Look no further than CodeSee! codesee.io/code-visualiza
5
24
What Happens When A CPU Starts lateblt.tripod.com/bit68.txt
2
48
A Visual Guide to SSH Tunnels: Local and Remote Port Forwarding
5
134
541
Show this thread
Arc Notes Weekly #33: General Intelligence is out now! ✨
What you'll learn:
1. What happens when CPU start?
2. OpenAI API .
3. HTTP/3 Prioritization.
Today, 29,314 people will receive it in their inbox.
Don't miss it:
architecturenotes.co/signup/
10
36
Your app is getting better. It has more features, more active users, and every day it collects more data. Your database is now causing the rest of your application to slow down.
18
182
787
Show this thread
McDonald’s Event-Driven Architecture: The Data Journey And How It Works
4
73
317
I scanned every package on PyPi and found 57 live AWS keys
1
13
If want to learn more about encryption we have a more in depth post coming up soon at architecturenotes.co join us and don’t miss out.
2
6
16
Show this thread
Coupled with that you would ideally prefer a good distribution within that cardinality. Running this as an experiment with accurate data is easy enough to do with a few lines of code.
1
3
13
Show this thread
When selecting a shard key for this sharding type, it is essential to select one with high cardinality, so the number of possible values for that key is numerous. For example, a key with possible values of North, South, East, and West is of low cardinality since there are only 4.
1
2
8
Show this thread
The same node houses entries that have the same shard key. A group of data that shares the same shard key is referred to as a logical shard. Multiple logical shards are included in a database node, also known as a physical shard.
1
2
9
Show this thread
Shard Key is a piece of the primary key that tells how the data should be distributed. With a shard key, you can quickly find and change data by routing operations to the correct database.
1
7
Show this thread
Data is divided into chunks depending on the ranges of a certain value in range-based sharding. This requires a look up table to see where the data should be stored. Maintaining the consistency of such a table and obviously picking the ranges here are critical.
1
8
Show this thread
Now that we have discussed the potential server architectures, let us talk about data layout. You can see two types of strategies at play below.
1
10
Show this thread
Often when you start to look into scaling your data system either need to scale for reads or writes. Replication is one way when you need extra read capacity.
1
9
Show this thread

