Skip to content

Master Table of Contents

This site contains 57 articles organised into thirteen topic sections. Use this page as a navigation hub or quick reference.


API & Authentication

ArticleDescription
REST & HTTPHTTP methods, status codes, RESTful principles, Java HttpServer examples
OAuth 2.0Authorization flows, OpenID Connect, Spring Boot OAuth client, token management
AWS SSOEnterprise identity, SAML/OIDC integration, permission sets, AWS SDK

Software Design

ArticleDescription
Hexagonal ArchitecturePorts and adapters pattern, domain isolation, testability, framework independence
Clean ArchitectureConcentric dependency layers, Uncle Bob's rules, framework-independent enterprise design
Microservice SDKs: Pros & ConsClient SDK trade-offs, coupling risks, versioning strategies
Kingdom of NounsObject-oriented design anti-patterns, verb-noun distinction, procedural vs declarative code

GoF Design Patterns

Creational

ArticleIntent
Factory MethodDefine an interface for creating an object, letting subclasses decide which class to instantiate
BuilderSeparate the construction of a complex object from its representation
SingletonEnsure a class has only one instance and provide a global access point to it

Structural

ArticleIntent
AdapterConvert an interface into another interface clients expect
DecoratorAttach additional responsibilities to an object dynamically
FacadeProvide a simplified interface to a complex subsystem

Behavioral

ArticleIntent
ObserverDefine a one-to-many dependency so that when one object changes state, all dependents are notified
StrategyDefine a family of algorithms, encapsulate each one, and make them interchangeable
Template MethodDefine the skeleton of an algorithm in a superclass, deferring some steps to subclasses

SOLID Principles (read sequentially)

ArticlePrincipleKey Pattern
SRPSingle ResponsibilityRepository pattern, class separation
OCPOpen/ClosedStrategy pattern, payment processors
LSPLiskov SubstitutionSubstitutability, contract preservation
ISPInterface SegregationRole-based interfaces, client isolation
DIPDependency InversionAbstraction layers, Spring DI

Concurrency & Performance

ArticleDescription
Asynchronous ProgrammingCompletableFuture, virtual threads, callbacks, reactive basics
High-Performance StreamingMapReduce, AWS Kinesis, AWS EMR, Apache Spark, sharding

Distributed Systems

ArticleDescription
Eventual ConsistencyCAP theorem, ACID vs BASE, vector clocks, DynamoDB, S3
Saga PatternDistributed transaction management, compensating actions, choreography vs orchestration
Microservices InterdependenciesCircuit breakers, bulkheads, event-driven choreography, API gateways, service meshes

Data & Storage

ArticleDescription
Graph Databases & GenAIGraph data models, Neo4j, knowledge graphs, GenAI integration patterns
Apache CassandraWide-column storage, partition keys, replication, tunable consistency
DynamoDB Indexes & High AvailabilityGSIs, LSIs, single-table design, multi-region replication
Columnar Data StoresColumn-oriented storage, analytics query patterns, compression, vectorised execution
Caching Strategies with RedisCache-aside, write-through, TTL, eviction policies, Redis data structures
Caching Patterns & PitfallsCache stampede, thundering herd, stale reads, invalidation strategies

Infrastructure & Operations

ArticleDescription
Serverless & ContainersMonolith vs microservices vs serverless, Docker, Kubernetes, AWS Lambda
The Twelve-Factor AppTwelve-Factor methodology for scalable, maintainable cloud-native applications
Ansible OverviewInfrastructure as code, playbooks, idempotency, inventory management
Resilience PatternsFault tolerance, recovery strategies, availability design, graceful degradation

Security

ArticleDescription
RBAC and ABACRole-based and attribute-based access control, authorization models, policy engines
CryptographyAES, RSA, SHA hashing, digital signatures, AWS KMS, Secrets Manager
Transport Layer Security (TLS)TLS 1.2/1.3 handshake, cipher suites, certificate chains, mTLS, forward secrecy

Fundamentals

ArticleDescription
Big O NotationTime and space complexity, asymptotic analysis, common algorithm classes
Bloom FiltersProbabilistic data structure, false positives, hash functions, space efficiency
Network HandshakingTCP three-way handshake, TLS negotiation, connection establishment
Shadow DOMEncapsulation, style isolation, web components, DOM tree abstraction

Data Structures & Algorithms

ArticleDescription
Patience SortingLongest increasing subsequence, patience sorting algorithm, optimal subsequence computation
HeapsHeap data structures, min-heaps, max-heaps, priority queue implementations
Lower and Upper BoundsAsymptotic analysis limits, complexity bounding, tight bounds

AI & Development Practice

ArticleDescription
Agentic Software DevelopmentAI agents, LLM-driven workflows, tool use, autonomous software pipelines
Spec-Driven Development with AIAPI-first design, OpenAPI specs, AI-assisted contract-driven development

Learning Paths

Four curated sequences for different goals:

PathSequenceGoal
Scalable APIsREST → OAuth → Async → Serverless → CryptographyBuild production-grade APIs
Big Data & AnalyticsAsync → Streaming → Columnar → Serverless → CryptographyProcess high-volume data
Writing Quality CodeSRP → OCP → LSP → ISP → DIPApply SOLID principles
Enterprise SecurityREST → OAuth → AWS SSO → Cryptography → TLSImplement enterprise identity

Quick Reference

By AWS Service

AWS ServiceArticles
AWS KMSCryptography
AWS Secrets ManagerCryptography
AWS Certificate ManagerTLS
AWS LambdaServerless & Containers
Amazon KinesisHigh-Performance Streaming
AWS EMRHigh-Performance Streaming
Amazon DynamoDBDynamoDB Indexes & HA, Eventual Consistency
Amazon S3High-Performance Streaming, Eventual Consistency
AWS SSO / IAM Identity CenterAWS SSO
Amazon SQSServerless & Containers
Amazon ElastiCacheCaching Strategies with Redis

By Java Technology

Java TechnologyArticles
Spring BootREST, OAuth, Serverless & Containers
Spring SecurityOAuth
CompletableFutureAsync Programming
Virtual ThreadsAsync Programming
Apache SparkHigh-Performance Streaming
javax.net.ssl / SSLContextTLS
AWS SDK for JavaAWS SSO, High-Performance Streaming, Cryptography

By Concept Type

TypeArticles
ProtocolsREST, OAuth, TLS
Identity & SSOOAuth, AWS SSO
SecurityOAuth, RBAC and ABAC, Cryptography, TLS
ConcurrencyAsync Programming, High-Performance Streaming
Distributed PatternsEventual Consistency, Saga Pattern, Microservices Interdependencies
Data StorageCassandra, DynamoDB, Columnar, Graph Databases
CachingCaching Strategies with Redis, Caching Patterns & Pitfalls
DeploymentServerless & Containers, Twelve-Factor App, Ansible, Resilience Patterns
ArchitectureHexagonal Architecture, Clean Architecture, Microservice SDKs, Kingdom of Nouns
GoF PatternsFactory Method, Builder, Singleton, Adapter, Decorator, Facade, Observer, Strategy, Template Method
Code QualitySRP, OCP, LSP, ISP, DIP
AlgorithmsPatience Sorting, Heaps, Lower and Upper Bounds
AI / MethodologyAgentic Software Development, Spec-Driven Development with AI

  • Use the sidebar to browse all articles by section.
  • Use the search bar (top right) for full-text search across all articles.
  • Each article ends with a Related Concepts section linking to relevant topics.
  • Learning Paths provide next/previous navigation for sequential reading.
  • Click any Mermaid diagram to view it fullscreen.