Skip to content

Crack SDE

Most of the content are generated by AI, with human being reviewed, edited, and revised

Menu
  • Home
  • Daily English Story
  • Tech Interviews
  • Cloud Native
  • DevOps
  • Artificial Intelligence
Menu

Category: DevOps

Other great resources

Make Each Payment Unique

Posted on 11/16/202311/19/2023 by user

Making online payments unique and idempotent is crucial to ensure that each transaction is processed only once and to prevent duplicate charges. Here are some strategies to achieve this: By combining these…

Race Condition

Posted on 11/15/202311/25/2023 by user

A race condition is a type of computing problem that occurs in software when two or more processes access shared data at the same time and at least one of them modifies…

System Design – Designing a “Like” Button

Posted on 11/14/202312/28/2023 by user

Designing a “Like” button system capable of handling a high volume of likes (increment operations) from individual users, while ensuring thread safety and real-time updates, requires a robust and scalable architecture. Let’s…

Compare Kafka with RabbitMQ

Posted on 11/13/202311/25/2023 by user

Apache Kafka and RabbitMQ are both popular message brokers, but they have different architectures and are designed for different use cases. Here are some key differences: 1. **Architecture**:    – **Kafka**: Designed as…

Understand Transaction in Database

Posted on 11/11/202311/18/2023 by user

In computing, a transaction typically refers to a group of operations that are executed as a single unit. The concept is widely used in database management systems and other applications where data…

Notification Service Components

Posted on 11/08/202311/22/2023 by user

A notification service, commonly used in various applications and platforms, typically consists of several key components: These components work together to ensure that the right message reaches the right user at the…

TLS and mTLS

Posted on 11/07/202311/25/2023 by user

Transport Layer Security (TLS) and Mutual TLS (mTLS) are both protocols for securing network communications, but they differ in how the authentication process is handled: TLS (Transport Layer Security) mTLS (Mutual TLS)…

CI/CD/Pipeline interview questions

Posted on 11/05/202311/25/2023 by user

CA TLS mTLS Interview Questions

Posted on 11/04/202311/25/2023 by user

Basic Understanding Intermediate Knowledge Advanced Understanding Scenario-Based Questions

SSL Termination

Posted on 11/03/202311/25/2023 by user

SSL termination refers to the process of decrypting SSL/TLS encrypted traffic at a certain point within the network infrastructure, rather than at the final destination server. This concept is commonly used in…

Posts pagination

Previous 1 … 4 5 6 Next

Recent Posts

  • LC#622 Design Circular Queue
  • Started with OpenTelemetry in Go
  • How Prometheus scrap works, and how to find the target node and get the metrics files
  • How to collect metrics of container, pods, node and cluster in k8s?
  • LC#200 island problem

Recent Comments

  1. another user on A Journey of Resilience

Archives

  • May 2025
  • April 2025
  • February 2025
  • July 2024
  • April 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • June 2023
  • May 2023

Categories

  • Artificial Intelligence
  • Cloud Computing
  • Cloud Native
  • Daily English Story
  • Database
  • DevOps
  • Golang
  • Java
  • Leetcode
  • Startups
  • Tech Interviews
©2025 Crack SDE | Design: Newspaperly WordPress Theme
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}