Skip to content
Home » Archives for faheem.sohail@gmail.com » Page 4

faheem.sohail@gmail.com

Replace Method with Method Object

The Replace Method with Method Object refactoring technique is used to transform a method into a separate class, converting the method parameters into its fields, and allowing the method to be broken down into multiple methods within that new class.

SQL Injection: Describe what it is with examples

A SQL Injection is a code injection technique that attackers use to exploit vulnerabilities in a web application’s database layer. This vulnerability is often present in a web application when user input is incorrectly filtered for string literals that are used in SQL statements, or when user input is not strongly typed and can unexpectedly execute SQL commands.

The technique allows an attacker to manipulate SQL queries that an application makes to its database, enabling the attacker to view, alter, or delete data that they are not normally authorized to access.

Database Sharding and its Challenges

Database sharding is a powerful technique employed to manage large databases more effectively. It involves partitioning a large database into smaller, more manageable parts, known as shards. The term “shard” signifies a small fragment of a whole, aptly describing this method of breaking down a large database into smaller, more manageable pieces.

Understanding etcd: The Distributed Key-Value Store

etcd is a distributed, reliable key-value store developed by CoreOS that’s designed for shared configuration and service discovery. It is a central component in distributed systems and enables you to store and retrieve data across a cluster of machines.

Exploring Distributed Locks Across Various Platforms

Distributed locks are a critical concept in the world of distributed systems, necessary for maintaining data consistency, coordination, and synchronization across various nodes of a system. They serve as a concurrency control mechanism to restrict multiple processes from accessing or modifying shared resources simultaneously. In this post, we take a look at a few ways to implement a distributed locks using redis, zookeeper and etcd.

Introduce Parameter Object

Refactoring is a process of altering the structure of the existing code without changing its external behavior. Among the several refactoring techniques, one of the most effective and useful is the Introduce Parameter Object refactoring technique. This technique comes handy… Read More »Introduce Parameter Object

Replace Temp with Query

Refactoring code involves altering the structure of code to make it more understandable and maintainable without changing its observable behavior. One such strategy of refactoring is known as “Replace Temp with Query”. What is Replace Temp with Query? Replace Temp… Read More »Replace Temp with Query

Inline Temp

When dealing with software development, we often encounter code that can be optimized or made more readable. One strategy for achieving this is through a process known as refactoring. A particular type of refactoring, “Inline Temp Refactoring,” can be an… Read More »Inline Temp