Rahul bhandariMicroservice Security: Basic Authentication & Public-Private Key Password Encryption (Part 1)Hello everyone,Mar 132Mar 132
Rahul bhandariMoving from a single server setup to a scalable server architecture-part3In the linked story below, we have effectively resolved the single point of failure from the database side and provided a scalable solution…Aug 18, 2023Aug 18, 2023
Rahul bhandariMoving from a single server setup to a scalable server architecture:part2Greetings everyone, in the linked previous story, we effectively resolved the application’s slowness problem and mitigated single points of…Aug 10, 2023Aug 10, 2023
Rahul bhandariMoving from a single server setup to a scalable server architecture:part1Crafting a system to accommodate millions of users is undoubtedly challenging. Our initial approach involves setting up a single server…Aug 10, 2023Aug 10, 2023
Rahul bhandariSecurity Challenges in MicroservicesIn today’s world everyone is moving towards Microservice architecture.As we know microservice provides flexibiltity and Benefit .Lets…Mar 1, 2022Mar 1, 2022
Rahul bhandariCQRS with Event SourcingData management can be very complex even in non microservice architecture,because of this complexity many critics of microservice…Dec 17, 2021Dec 17, 2021
Rahul bhandariApi Rate Limiting using Token bucketIn this section i will be explaining the api rate limiting using token bucket algorthm.I have implemented the token bucket using bucket4j…Dec 8, 2021Dec 8, 2021
Rahul bhandariLeetcode 1313. Decompress Run-Length Encoded ListIn the problem We are given a list of integers representing a list compressed with run-length encoding.We need to return the Return the…Aug 16, 2020Aug 16, 2020