Nasser offentlig
[search 0]
Flere
Download appen!
show episodes
 
Welcome to the Backend Engineering Show podcast with your host Hussein Nasser. If you like software engineering you’ve come to the right place. I discuss all sorts of software engineering technologies and news with specific focus on the backend. All opinions are my own. Most of my content in the podcast is an audio version of videos I post on my youtube channel here http://www.youtube.com/c/HusseinNasser-software-engineering Buy me a coffee https://www.buymeacoffee.com/hnasr 🧑‍🏫 Courses I Te ...
  continue reading
 
Artwork

1
MICHELLE NASSER SHOW

Michelle Nasser

Unsubscribe
Unsubscribe
Månedligt
 
Subscribe today! Welcome to Michelle Nasser Show on Leadership Insights. It will inform, entertain and inspire you as it showcases interesting people sharing their areas of expertise and valuable tips on success! Michelle Nasser is an International C-Suite Coach and Best-Selling Author. www.michellenasser.com
  continue reading
 
Artwork

1
Yaser Nasser Alulait

Yaser Nasser Alulait

Unsubscribe
Unsubscribe
Månedligt
 
I'm Yaser Nasser Alulait, a PMU finance graduate, an expert in accounting and financial issues, information science enthusiast. I was fortunate to be occupied with different endeavors, like retail, security and protection frameworks, progression, and technology. I have valid reasonable and hypothetical information to accomplish key targets.
  continue reading
 
Loading …
show series
 
This lecture covers the prelude to the Battle of Tabuk. Key topics include: - Birth of Ibrahim: Upon returning to Medina, the Prophet’s wife Mariya the Coptic gave birth to a son, named Ibrahim. The Angel Gabriel congratulated the Prophet on becoming a father. - Expedition of Tabuk: This was the last military campaign led by the Prophet. It aimed t…
  continue reading
 
Fundamentals of Operating Systems Course https://oscourse.winLooks like fedora is compiling cpython with the -o3 flag, which does aggressive function inlining among other optimizations.This seems to improve python benchmarks performance by at most 1.16x at a cost of an extra 3MB in binary size (text segment). Although it does seem to slow down some…
  continue reading
 
https://oscourse.win Allegro improved their Kafka produce tail latency by over 80% when they switched from ext4 to xfs. What I enjoyed most about this article is the detailed analysis and tweaking the team made to ext4 before considering switching to xfs. This is a classic case of how a good tech blog looks like in my opinion. 0:00 Intro 0:30 Summa…
  continue reading
 
Get my backend course https://backend.win Google submitted a patch to Linux Kernel 6.8 to improve TCP performance by 40%, this is done via rearranging the tcp structures for better cpu cache lines, I explore this here.0:00 Intro0:30 Google improves Linux Kernel TCP by 40%1:40 How CPU Cache Line Works6:45 Reviewing the Google Patchhttps://www.phoron…
  continue reading
 
Get my backend course https://backend.win Cloudflare has announced they are opening sources Pingora as a networking framework! Big news, let us discuss 0:00 Intro 0:30 Reasons why Cloudflare built Pingora? 3:00 It is a framework! 7:30 What in Pingora? 11:50 Security in Pingora 13:45 Multi-threading in Pingora 21:00 Customization vs Configuration 25…
  continue reading
 
After victory against Banu Thaqif at Hunayn, Prophet Muhammad marched his army to Ta'if, where Banu Thaqif had retreated to and barricated themselves inside with enough food and water to last them for a year. The Prophet declared any slaves who joined Islam and left the fortress would be granted freedom, and many took him up on the offer. As the si…
  continue reading
 
https://backend.win https://databases.win I’m a big believer that database systems share similar core fundamentals at their storage layer and understanding them allows one to compare different DBMS objectively. For example, How documents are stored in MongoDB is no different from how MySQL or PostgreSQL store rows. Everything goes to pages of fixed…
  continue reading
 
Banu Thaqif had been long standing rivals of the Quraysh. They saw the Quraysh's defeated as an opportunity to attack and seize control of Mecca for themselves. In response, Prophet Muhammad called all Muslims to battle and led an army of 12,000 against them. Banu Thaqif's side had over 20,000. Banu Thaqif setup an ambush in the Valley of Hunain, m…
  continue reading
 
Fragmentation is a very interesting topic to me, especially when it comes to memory. While virtually memory does solve external fragmentation (you can still allocate logically contiguous memory in non-contiguous physical memory) it does however introduce performance delays as we jump all over the physical memory to read what appears to us for examp…
  continue reading
 
After the conquest of Mecca, hundreds of thousands of Arabs came to the prophet to convert and pledge their allegiance. This lecture covers why they joined now and reflects the verses of Surah An-Nasr which predicted this. The Prophet also sent various small expiditions to the surrounding tribes to invite them to Islam. The last of the pagan tribes…
  continue reading
 
Prophet Muhammad destroys all the idols in the Kaaba with Imam Ali's help and washes the images that had been drawn inside. He then introduced Islam to the Meccans, discarding their ideas of nationalism and tribalism, and offered a general amnesty regardless of if they convert to Islam. Prophet Muhammad told Bilal to climb on top of the Kaaba to gi…
  continue reading
 
Prophet Muhammad had promised safety to any Meccan who either remined in their own home during the invasion or went to Abu Sufyan's home. After seeing the Muslim's strenght, Abu Sufyan saw the futility of struggle and urged the Meccans to surrender. Some Meccans remained defiant, notably his wife Hind and Ikrimah, the son of Abu Jahl. After taking …
  continue reading
 
Prophet Muhammad kept the attack on Mecca a closely guarded secret. However Hatib ibn Abi Balta'ah sent a letter to the Quraysh warning them of the attack. The Prophet was informed of this by revelation and he sent Ali and Zubayr to retrieve it. The Muslim army eventually marched to Mecca, where they were instructed to spread out and display their …
  continue reading
 
Fundamentals of Database Engineering udemy course (link redirects to udemy with coupon)https://database.husseinnasser.com Why create Index blocks writesIn this video I explore how create index, why does it block writes and how create index concurrently work and allow writes.0:00 Intro1:28 How Create Index works4:45 Create Index blocking Writes5:00 …
  continue reading
 
The Treaty of Hudaybiyya had included a vow of there being no fighting between the Quraysh and the Muslims. However, when the tribe of Banu Bakr asked the leaders of Quraysh for help in a raid against their long time foe Banu Khuza'ah, a tribe with many Muslims and who were longtime allies of Prophet Muhammad, the Quraysh joined in. The raiders kil…
  continue reading
 
The Campaign of Dhat Al-Salasil occurred soon after "defeat" at the Battle of Mu'tah, when various Ghassanid affiliated tribes sensed an opportunity to invade Medina. They thought the Muslims would be weak and demoralized. A bedouin learned about the gathering army and informed Prophed Muhammad, who designated an army and commander to go fight them…
  continue reading
 
The Encrypted Client Hello or ECH is a new RFC that encrypts the TLS client hello to hide sensitive information like the SNI. In this video I go through pros and cons of this new rfc.0:00 Intro2:00 SNI4:00 Client Hello8:40 Encrypted Client Hello11:30 Inner Client Hello Encryption18:00 Client-Facing Outer SNI21:20 Decrypting Inner Client Hello23:30 …
  continue reading
 
The Roman army, with 10,000 soliders, outnumbered the Muslims 3:1 at the Battle of Mutah. Some of the Muslims feared the large army and wanted to retreat, but the senior companions bolstered their courage. Prophet Muhammad had appointed a leader for the army, with two backup leaders in case the first one was martyred. This was a hard battle. Jaffer…
  continue reading
 
The Battle of Mu'tah was triggered when a messenger Prophet Muhammad sent to Ghassani Shurahbil was murdered. This was a declaration of war. While Prophte Muhammad himself didn't participate in this battle, thanks to the treaty of Hudaybiyya he was able to send 3000 Muslims to fight without compromising the securit of Medina. As the army departed, …
  continue reading
 
From the frontend through the kernel to the backend process When we send a request to a backend most of us focus on the processing aspect of the request which is really just the last step. There is so much more happening before a request is ready to be processed, most of this step happens in the Kernel. I break this into 6 steps, each step can theo…
  continue reading
 
Prophet Muhammad led the Muslims on a second attempt at Umra, thet qazaa for the last one which they couldn't complete. Rumor spread among the Mushrikeen that the Muslims were weakened, so the Prophet instructed his followers to show extra strength and bravado to dispel that notion. During the Umra: - Meccans removed their idols from the kaba for t…
  continue reading
 
In a wonderful blog, Kyle explores the pains he faced managing a Postgres instance for a startup he works for and how enabling partitioning sigintfically created wait events causing the backend and subsequently NGINX to through 500 errors.We discuss this in this video/podcasthttps://www.kylehailey.com/post/postgres-partition-pains-lockmanager-waits…
  continue reading
 
Prophet Muhammad had given the garden of Fadak to his daughter Fatima, but after his passing it snatched away from her by Abu Bakr and Umar. This lecture explains: - How Fadak became the Prophet's property - Why he gifted it to Lady Fatima - Fadak was a source of immense wealth, generating enough income to fund an army. - How Umar adviced Abu Bakr …
  continue reading
 
The victory at Khaybar changed the lives of the Muslim community and became a source of financial strength for them. The lecture includes: - The surrender treaty, where the Jews were allowed to remain on Khaybar in return for a share of the harvest - How the prophet distributed the khums from the war - The Muhajireen using their share of khums to r…
  continue reading
 
WebTransport is a cutting-edge protocol framework designed to support multiplexed and secure transport over HTTP/2 and HTTP/3. It brings together the best of web and transport technologies, providing an all-in-one solution for real-time, bidirectional communication on the web. Watch full episode (subscribers only) https://spotifyanchor-web.app.link…
  continue reading
 
fsync is a linux system call that flushes all pages and metadata for a given file to the disk. It is indeed an expensive operation but required for durability especially for database systems. Regular writes that make it to the disk controller are often placed in the SSD local cache to accumulate more writes before getting flushed to the NAND cells.…
  continue reading
 
The Muslims marched to the Fort of Khaybar, attack and defeat it's treacherous occupants. Along the way, various miracles occur: - An assassin attempts to kill Prophet Muhammad, but he miraciously is suddenly mentally handicapped. - Imam Ali's unable to fight due to an illness in his eyes. Prophet Muhammad heals him and Imam Ali leads the Muslims t…
  continue reading
 
Fundamentals of Database Engineering udemy course (link redirects to udemy with coupon)https://database.husseinnasser.com In version 5.3, MongoDB introduced a feature called clustered collection which stores documents in the _id index as oppose to the hidden wiredTiger hidden index. This eliminates an entire b+tree seek for reads using the _id inde…
  continue reading
 
Prime video engineering team has posted a blog detailing how they moved their live stream monitoring service from microservices to a monolith reducing their cost by 90%, let us discuss this0:00 Intro2:00 Overview10:35 Distributed System Overhead21:30 From Microservices to Monolith 29:00 Scaling the Monolith32:30 Takeawayshttps://www.primevideotech.…
  continue reading
 
Fundamentals of Database Engineering udemy course (link redirects to udemy with coupon)https://database.husseinnasser.comIn a row-store database engine, rows are stored in units called pages. Each page has a fixed header and contains multiple rows, with each row having a record header followed by its respective columns. When the database fetches a …
  continue reading
 
Khaybar was manned by Jewish tribes that had previously reacted treasonously against the Muslims and had been exiled from Medina in turn. They had already attacked the Muslims once, by participating in the Battle of Khandak, and Prophet Muhammad received intel that those Jewish tribes were again planning to ally with another pagan tribes to attack …
  continue reading
 
Prophet Muhammad continues his outreach to foreign leaders, sending messengrs to the Persian emperor Khosrow II and the Coptic ruler Muqawqis of Alexandria. The outreach teaches us: - Islam was always meant to be globalized, not just for the Arabs. We need to also think deeply about how to universalize the messaging - The way people respond to the …
  continue reading
 
Lambda now supports Response payload streaming, now you can flush changes to the network socket as soon as it is available and it will be written to the client socket. I think this is a game changing feature 0:00 Intro 1:00 Traditional Lambda 3:00 Server Sent Events & Chunk-Encoding 5:00 What happens to clients? 6:00 Supported Regions 7:00 My thoug…
  continue reading
 
Cloudflare released a blog detailing a vulnerability that has been in their system for nearly two years. it is related to mTLS or mutual TLS and specifically client certificate revocation. I explore this in details 0:00 Intro3:00 The Vulnerability7:00 What happened?8:50 Certificate Revocation12:30 Rejecting certain endpoints 17:00 Certificate Authe…
  continue reading
 
BGP (Border gateway protocol) withdrawals caused the Virgin media ISP customers to lose their Internet connection. I go into details on this video. 0:00 Intro2:00 What happened?4:11 How BGP works?11:50 Version media withdrawals15:00 Deep dive Fundamentals of Backend Engineering Design patterns udemy course (link redirects to udemy with coupon)https…
  continue reading
 
GitHub Accidentally Exposed their SSH RSA Private key, this is the message you will get . @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY!Someone could be eavesdropping on you…
  continue reading
 
Get my database engineering course https://database.husseinnasser.com In this video I do a deep dive in all locks obtained by postgres, I learned a lot while making this video and hope you enjoy it. 0:00 Intro 2:30 What are Locks? 5:30 Overview of Postgres Locks 9:10 Table-Level Locks 11:40 ACCESS EXCLUSIVE 17:40 ACCESS SHARE 19:00 ROW SHARE 20:15 …
  continue reading
 
Pinterest moves to HTTP/3 on all their clients and edge CDNs this year. They witnessed interesting gains but not without good lesson learned. The main one was the mismatch of alt-svc vs DNS ttls.I cover this on the next episode of the backend engineering course.0:00 Intro2:00 Moving h2 to h3 through alt-svc5:00 Why HTTP/36:00 HTTP/1 vs HTTP/29:00 T…
  continue reading
 
On March 7 2023, Loom users started seeing each others data as a result of cookies getting leaked from the CDN. This loom security breach is really critical. Let us discuss 0:00 Intro 1:00 Why Cookies 2:00 How this happens 5:50 What caused it? 7:30 How Loom solved it? 8:20 Reading the RCA 10:30 Remedies…
  continue reading
 
Discord engineering goes into details of how they migrated from Cassandra to ScyllaDB, improved the performance of their reads and writes and rearchitected their backend to support the new load. It is an interesting episode lets get into it 0:00 Intro 1:50 Relational vs Distributed 7:00 The Cassandra Troubles 11:00 SnowFlake vs UUID 14:30 B+Tree 19…
  continue reading
 
With the repreieve provided by the Treaty of Hudaybiyya, Prophet Muhammad can focus on spreading Islam by doing dawah to surrounding leaders. This lecture covers encounters with two prominent leaders: 1. The Abysinnian king Najashi, who converted to Islam 2. The Roman emperor Heraclius, who questioned Abu Sufyan and acertained Prophet Muhammad's le…
  continue reading
 
The many of the Muslims had seen the Treaty of Hudaybiyya as a humiliating loss, yet Prophet Muhammad knew the treaty paved the way for their ultimate success. This lecture discusses the various ways this treaty helped the Muslims, along with how Allah sent Surah Al-Fath right afterwards to bolden the Muslims and help them understand the victory wh…
  continue reading
 
Loading …

Hurtig referencevejledning