Courses from 1000+ universities
$7.2 billion in combined revenue since 2020. $8 billion in lost market value. This merger marks the end of an era in online education.
600 Free Google Certifications
Computer Science
Psychology
Microsoft Excel
Lean Production
Viruses & How to Beat Them: Cells, Immunity, Vaccines
Learn Like a Pro: Science-Based Tools to Become Better at Anything
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Comprehensive guide to Traefik as a reverse proxy and load balancer, covering architecture, configuration, HTTP/TCP proxying, load balancing, security features, and HTTPS implementation.
Detailed exploration of PostgreSQL's process architecture, covering key components like MVCC, backend processes, shared buffers, and auxiliary processes for efficient database management.
Exploring HTTP/3 and HTTP/2 for MySQL communication, comparing performance with the MySQL Binary protocol. Analyzes connection costs, parallel selects, and protocol efficiency for backend-database interactions.
Explore ChatGPT's backend architecture, including protocols, authentication, AI models, and server-sent events. Learn about conversation management, message moderation, and database optimizations.
Explore MongoDB's clustered collections feature, its benefits for read/write performance, and associated limitations. Learn how it compares to original collections and impacts database efficiency.
Explore the journey of a request to the backend, from acceptance to processing. Gain insights into the crucial steps occurring in the kernel before request processing begins.
Explore the performance implications of SELECT * queries, covering database page layout, query execution, deserialization costs, and network impacts for efficient data retrieval.
Detailed analysis of Cloudflare's mTLS vulnerability, exploring client certificate revocation, session resumption, and the impact on security. Includes technical insights and Cloudflare's mitigation strategies.
Comprehensive exploration of PostgreSQL locks, covering table-level, row-level, and page-level locks, conflict matrices, deadlocks, and advisory locks, with practical examples and in-depth explanations.
Explore the implications of GitHub's leaked SSH key, understand SSH vs TLS authentication, and learn how to protect yourself from potential security risks.
Explore DNS cache poisoning prevention through 0x20 encoding, a technique that randomizes letter casing in DNS queries to enhance security and resist attacks.
Explore TLS certificate compression techniques to enhance performance by reducing certificate size, improving handshake efficiency, and optimizing network traffic in secure communications.
Explore Postgres system columns ctid, xmin, and xmax, understanding their roles in transaction management and data versioning across different isolation levels.
Comprehensive guide to Docker networking, covering container creation, custom networks, and inter-network connections. Ideal for developers seeking practical Docker skills.
Explore the evolution of multi-threading apps, threading models, and backend connection management in this comprehensive overview of threads and connections in backend engineering.
Get personalized course recommendations, track subjects and courses with reminders, and more.