Alex Xu LinkedIn Posts
Learn how to post on LinkedIn like Alex Xu. Learn from their content, engagement tactics, and network growth techniques
@alexxubyte
The diagram below shows some possible network attacks in 7 OSI model layers.
๐น Application Layer
- Pushing
- Malware injection
-
@alexxubyte
Explaining 9 types of API testing. Next week's topic will be listed at the end.
๐น Smoke Testing
This is done after API development is
@alexxubyte
API Vs SDK!
API (Application Programming Interface) and SDK (Software Development Kit) are essential tools in the software development world, but they
@alexxubyte
Netflix's Tech Stack.
.
.
This post is based on research from many Netflix engineering blogs and open-source projects. If you come across any inaccuracies, please
@alexxubyte
Data Pipelines Overview.
Data pipelines are a fundamental component of managing and processing data efficiently within modern systems. These pipelines typically encompass 5 predominant
@alexxubyte
Netflix's Tech Stack.
.
.
This post is based on research from many Netflix engineering blogs and open-source projects. If you come across any inaccuracies, please
@alexxubyte
Explaining 8 Popular Network Protocols in 1 Diagram. The method to download the high-resolution PDF is available at the end.
.
--
Subscribe to our
@alexxubyte
HTTPS, SSL Handshake, and Data Encryption Explained to Kids.
HTTPS: Safeguards your data from eavesdroppers and breaches. Understand how encryption and digital
@alexxubyte
Data is cached everywhere, from the front end to the back end!
This diagram illustrates where we cache data in a typical architecture.
There are
@alexxubyte
Stack Overflow's Architecture: A Very Interesting Case Study
Stack Overflow is a multi-tenant monolithic application serving 2 billion monthly page views across
@alexxubyte
Top 6 Firewall Use Cases!
๐น Port-Based Rules
Firewall rules can be set to allow or block traffic based on specific ports.
@alexxubyte
The 10 Algorithms That Dominate Our World.
.
The diagram below shows the most commonly used algorithms in our daily lives. They are
@alexxubyte
How does Docker work?
.
.
The diagram below shows the architecture of Docker and how it works when we run โdocker buildโ,
@alexxubyte
Git Merge vs. Rebase vs. Squash Commit!
.
.
What are the differences?
When we ๐ฆ๐๐ซ๐ ๐ ๐๐ก๐๐ง๐ ๐๐ฌ from one Git branch to
@alexxubyte
Git Merge vs. Rebase vs. Squash Commit!
.
.
What are the differences?
When we ๐ฆ๐๐ซ๐ ๐ ๐๐ก๐๐ง๐ ๐๐ฌ
@alexxubyte
Top 4 Forms of Authentication Mechanisms
.
.
1. SSH Keys:
Cryptographic keys are used to access remote systems and servers securely
@alexxubyte
Explaining Sessions, Tokens, JWT, SSO, and OAuth in One Diagram. The method to download the high-resolution PDF is available at the end.
@alexxubyte
Get ready for an exciting week ahead:
- What is the best way to learn SQL
- Oauth2
- Types of storage
@alexxubyte
Why is PostgreSQL voted the ๐ฆ๐จ๐ฌ๐ญ ๐ฅ๐จ๐ฏ๐๐ ๐๐๐ญ๐๐๐๐ฌ๐ by Stackoverflow 2022 Developer Survey?
The diagram shows the many use cases by PostgreSQL - one
@alexxubyte
What is a database? What are some common types of databases? The method to download the high-resolution PDF is available at the end.