Jump to content

Tech learning roadmaps…


dasari4kntr

Recommended Posts

6 hours ago, dasari4kntr said:

i am tagging @nag @trent also...since we discussed the similar topic..with them...

 

first of all...having some knowledge on cloud and one programming language is always advantage...its one step upgrade with what your are doing...first primitive step...towards changing the career..

though only cloud doesn't help much...because now a days everyone have cloud skills...if you learnt cloud skills...bit of terraform is also advisable..(being a dba...cloud db setups, no-sql setups, replica setups, failover setups..etc and be able to provision these cloud db setups through terrafrom..etc)

next..having some programming skill is always advisable..python is not difficult to learn..now a days high school kids also learning...having python knowledge brings you wide variety of career options...like data engineer and data scientist..etc with your strong SQL skills + python...

1*kg0eNJcKFkqpvu4gdTbddQ.png

there is detailed discussion about these DATA (engineer/analyst/scientist)...in this thread..

 

and another thing is...clearly know the various SQL vs No-Sql databases, CAP theorem...

there are wide variety of No-Sql (document, key value pari, graph, hybrid..etc)...all these No-Sql are getting popularity...because of modern tech upgrades...

Type Notable examples of this type
Key–value cache Apache Ignite, Couchbase, Coherence, eXtreme Scale, Hazelcast, Infinispan, Memcached, Redis, Velocity
Key–value store Azure Cosmos DB, ArangoDB, Amazon DynamoDB, Aerospike, Couchbase, ScyllaDB
Key–value store (eventually consistent) Azure Cosmos DB, Oracle NoSQL Database, Riak, Voldemort
Key–value store (ordered) FoundationDB, InfinityDB, LMDB, MemcacheDB
Tuple store Apache River, GigaSpaces, Tarantool, TIBCO ActiveSpaces, OpenLink Virtuoso
Triplestore AllegroGraph, MarkLogic, Ontotext-OWLIM, Oracle NoSQL database, Profium Sense, Virtuoso Universal Server
Object database Objectivity/DB, Perst, ZopeDB, db4o, GemStone/S, InterSystems Caché, JADE, ObjectDatabase++, ObjectDB, ObjectStore, ODABA, Realm, OpenLink Virtuoso, Versant Object Database, ZODB
Document store Azure Cosmos DB, ArangoDB, BaseX, Clusterpoint, Couchbase, CouchDB, DocumentDB, eXist-db, IBM Domino, MarkLogic, MongoDB, RavenDB, Qizx, RethinkDB, Elasticsearch, OrientDB
Wide Column Store Azure Cosmos DB, Amazon DynamoDB, Bigtable, Cassandra, Google Cloud Datastore, HBase, Hypertable, ScyllaDB
Native multi-model database ArangoDB, Azure Cosmos DB, OrientDB, MarkLogic, Apache Ignite,[22][23] Couchbase, FoundationDB, Oracle Database
Graph database Azure Cosmos DB, AllegroGraph, ArangoDB, InfiniteGraph, Apache Giraph, MarkLogic, Neo4J, OrientDB, Virtuoso
Multivalue database D3 Pick database, Extensible Storage Engine (ESE/NT), InfinityDB, InterSystems Caché, jBASE Pick database, mvBase Rocket Software, mvEnterprise Rocket Software, Northgate Information Solutions Reality (the original Pick/MV Database), OpenQM, Revelation Software's OpenInsight (Windows) and Advanced Revelation (DOS), UniData Rocket U2, UniVerse Rocket U2

 

in case if you are not interested in these data roles..there are other options like below..

Data ware housing/ BI..etc

 

devops..

 

and there are always...so many options...which side you wanna grow like... data security, data related devops...

 

 

***sorry...i started somewhere...ended somewhere...hope you guys..get my point...

Thanks for the detailed info bro. I am even ready to learn programing but i am from life science background so not that confident if i can pull of that.

 

currently thinking of AWS / OIC / data science and python programming but not able to fix on the specific route. 

 

@trent my situation is same as yours from life sciences background and not much progress in professional career so thinking of changing profession.

Link to comment
Share on other sites

2 hours ago, Tadaka said:

Thanks for the detailed info bro. I am even ready to learn programing but i am from life science background so not that confident if i can pull of that.

 

currently thinking of AWS / OIC / data science and python programming but not able to fix on the specific route. 

 

@trent my situation is same as yours from life sciences background and not much progress in professional career so thinking of changing profession.

Em farak padadu. People not fortunate to study anything beyond HS are becoming kickass programmers from long time. If interested in java i can suggest a book that helps you learn via biology use case.

Link to comment
Share on other sites

2 hours ago, AnotherTeluguBidda said:

Em farak padadu. People not fortunate to study anything beyond HS are becoming kickass programmers from long time. If interested in java i can suggest a book that helps you learn via biology use case.

I am trying to learn some programming so i can switch my career.

Link to comment
Share on other sites

Top 10 System Design Concepts Every Programmer should learn

Soma
24–30 minutes

 

Essential System Design Concepts for Programmers: 10 Key Principles for Building Scalable, Reliable, and High-Performing Software Systems

 

 

0*yU5vbPodhtRWy34i.jpg

Hello folks, as a programmer, understanding system design concepts is crucial for developing software systems that are scalable, reliable, and high-performing. System design involves designing the architecture and components of a software system to meet specific requirements and achieve desired performance characteristics.

With the rapid advancement of technology and increasing complexity of software applications, mastering system design concepts has become essential for programmers to build efficient and effective systems.

In the past, we have learned about Microservice design principles and Patterns and In this article, we will explore 10 key system design concepts that every programmer should learn.

These concepts provide a solid foundation for designing software systems that can handle large-scale data processing, accommodate concurrent users, and deliver optimal performance.

Whether you are a beginner or an experienced programmer, understanding these system design concepts will empower you to create robust and scalable software systems that meet the demands of modern applications. So, let’s dive in and explore these essential system design principles!

But, if you are not a Medium member then I highly recommend you to join Medium and read great stories from great authors from real field. You can join Medium here

10 System Design and Software Architecture Concepts Every Developer Should Know

Here are 10 important system design concepts that every programmer should consider learning:

  1. Scalability
  2. Availability
  3. Reliability
  4. Fault Tolerance
  5. Caching Strategies
  6. Load Balancing
  7. Security
  8. Scalable Data Management
  9. Design Patterns
  10. Performance Optimization

Understanding and applying these system design concepts can help programmers and developers build robust, scalable, and high-performing software systems that meet the needs of modern applications and users.

Now, let’s deep dive into each of them and understand what they are how to achieve them in your application.

1. Scalability

Scalability refers to the ability of a system or application to handle increasing amounts of workload or users without a significant degradation in performance or functionality.

It is an important concept in system design as it allows a system to grow and adapt to changing requirements, such as increased data volume, user traffic, or processing demands, without experiencing performance bottlenecks or limitations.

Scalability is critical in modern computing environments where systems need to handle large and growing amounts of data and users. For example, popular websites, mobile apps, and cloud-based services need to be able to handle millions or even billions of requests concurrently, while distributed databases and big data platforms need to scale to handle petabytes or exabytes of data.

Scalability is also important in systems that need to accommodate peak loads, such as online shopping during holiday seasons or sudden spikes in user activity due to viral events.

There are two main types of scalability: vertical scalability and horizontal scalability. Vertical scalability involves adding more resources, such as CPU, memory, or storage, to a single server or node to handle increased workload. Horizontal scalability, on the other hand, involves adding more servers or nodes to a system to distribute the workload and handle increased demand. Horizontal scalability is often achieved through techniques such as load balancing, sharding, partitioning, and distributed processing.

Achieving scalability requires careful system design, architecture, and implementation. It involves designing systems that can efficiently handle increasing workloads, efficiently utilize resources, minimize dependencies, and distribute processing across multiple nodes or servers.

Techniques such as caching, asynchronous processing, parallel processing, and distributed databases are often used to improve scalability. Testing and performance monitoring are also crucial to ensure that the system continues to perform well as it scales.

Scalability is an essential consideration in building robust, high-performance systems that can handle growth and adapt to changing requirements over time. It allows systems to accommodate increasing demand, provide a seamless user experience, and support business growth without encountering performance limitations or downtime.

Here is a nice diagram which shows the difference between Vertical Scaling and Horizontal Scaling

 

0*FMhHfg-ucCppI7Wq.png

2. Availability

Availability refers to the ability of a software system to remain operational and accessible to users even in the face of failures or disruptions.

High availability is a critical requirement for many systems, especially those that are mission-critical or time-sensitive, such as online services, e-commerce websites, financial systems, and communication networks. Downtime in such systems can result in significant financial losses, reputational damage, and customer dissatisfaction. Therefore, ensuring high availability is a key consideration in system design.

Availability is typically quantified using metrics such as uptime, which measures the percentage of time a system is operational, and downtime, which measures the time a system is unavailable.

Achieving high availability involves designing systems with redundancy, fault tolerance, and failover mechanisms to minimize the risk of downtime due to hardware failures, software failures, or other unexpected events.

In system design, various techniques and strategies are employed to improve availability, such as load balancing, clustering, replication, backup and recovery, monitoring, and proactive maintenance.

These measures are implemented to minimize single points of failure, detect and recover from failures, and ensure that the system remains operational even in the face of failures or disruptions.

By designing systems with high availability, engineers can ensure that the systems are accessible and operational for extended periods of time, leading to improved customer satisfaction, reduced downtime, and increased business continuity.

 

0*SnLVBPu0JGx4N9F7.gif

3. Reliability

Reliability refers to the consistency and dependability of a software system in delivering expected results. Building systems with reliable components, error handling mechanisms, and backup/recovery strategies is crucial for ensuring that the system functions as intended and produces accurate results.

Reliability is a critical factor in system design, as it directly impacts the overall performance and quality of a system. Reliable systems are expected to consistently operate as expected, without experiencing unexpected failures, errors, or disruptions.

High reliability is often desired in mission-critical applications, where system failures can have severe consequences, such as in aviation, healthcare, finance, and other safety-critical domains.

Reliability is typically quantified using various metrics, such as Mean Time Between Failures (MTBF), which measures the average time duration between failures, and Failure Rate (FR), which measures the rate at which failures occur over time.

Reliability can be achieved through various techniques and strategies, such as redundancy, error detection and correction, fault tolerance, and robust design.

In system design, achieving high reliability involves careful consideration of various factors, including component quality, system architecture, error handling, fault tolerance mechanisms, monitoring, and maintenance strategies.

By designing systems with high reliability, engineers can ensure that the systems perform consistently and as expected, leading to improved customer satisfaction, reduced downtime, and increased system performance and availability.

4. Fault Tolerance

Fault tolerance refers to the ability of a system or component to continue functioning correctly in the presence of faults or failures, such as hardware failures, software bugs, or other unforeseen issues. A fault-tolerant system is designed to detect, isolate, and recover from faults without experiencing complete failure or downtime.

Fault tolerance is an important concept in system design, particularly in distributed systems or systems that need to operate reliably in challenging environments.

It involves implementing redundancy, error detection, error correction, and error recovery mechanisms to ensure that the system continues to operate even when certain components or subsystems fail.

There are various techniques and strategies for achieving fault tolerance, such as replication, where multiple copies of the same data or service are maintained in different locations, so that if one fails, others can take over; checkpointing, where system states are periodically saved, so that in case of failure, the system can be restored to a previously known good state; and graceful degradation, where the system can continue to operate with reduced functionality in the presence of failures.

Fault tolerance is crucial for ensuring high availability, reliability, and resilience of systems, particularly in mission-critical applications where system failures can have severe consequences.

By incorporating fault tolerance mechanisms in system design, engineers can create robust and dependable systems that can continue to operate and deliver expected results even in the face of unexpected failures.

 

0*AKUPawvM6q1K8utM.jpg

5. Caching Strategies

Caching strategies are techniques used to optimize the performance of systems by storing frequently accessed data or results in a temporary storage location, called a cache, so that it can be quickly retrieved without needing to be recalculated or fetched from the original source. There are several common caching strategies used in system design:

  1. Full Caching
    In this strategy, the entire data set or results are cached in the cache, providing fast access to all the data or results. This strategy is useful when the data or results are relatively small in size and can be easily stored in memory or a local cache.
  2. Partial Caching
    In this strategy, only a subset of the data or results are cached, typically based on usage patterns or frequently accessed data. This strategy is useful when the data or results are large in size or when not all the data or results are frequently accessed, and it is not feasible to cache the entire data set.
  3. Time-based Expiration
    In this strategy, the data or results are cached for a specific duration of time, after which the cache is considered stale, and the data or results are fetched from the original source and updated in the cache. This strategy is useful when the data or results are relatively stable and do not change frequently.
  4. LRU (Least Recently Used) or LFU (Least Frequently Used) Replacement Policy
    In these strategies, the data or results that are least recently used or least frequently used are evicted from the cache to make room for new data or results. These strategies are useful when the cache has limited storage capacity and needs to evict less frequently accessed data to accommodate new data.
  5. Write-through or Write-behind Caching
    In these strategies, the data or results are written to both the cache and the original source (write-through) or only to the cache (write-behind) when updated or inserted. These strategies are useful when the system needs to maintain consistency between the cache and the original source or when the original source cannot be directly updated.
  6. Distributed Caching
    In this strategy, the cache is distributed across multiple nodes or servers, typically using a distributed caching framework or technology. This strategy is useful when the system is distributed or scaled across multiple nodes or servers and needs to maintain consistency and performance across the distributed cache.
  7. Custom Caching
    Custom caching strategies can be implemented based on the specific requirements and characteristics of the system or application. These strategies may involve combinations of the above-mentioned strategies or other custom approaches to suit the unique needs of the system.

The selection of the appropriate caching strategy depends on various factors such as the size of data or results, frequency of access, volatility of data or results, storage capacity, consistency requirements, and performance goals of the system. Careful consideration and implementation of caching strategies can significantly improve system performance, reduce resource utilization, improve scalability, and enhance user experience.

 

0*vm4O76NLJuhVu68G

6. Load Balancing

Load balancing is a technique used in distributed systems or networks to distribute incoming network traffic or workload evenly across multiple servers or resources, ensuring that no single server or resource is overwhelmed with excessive traffic or workload.

The purpose of load balancing is to optimize resource utilization, maximize system availability, and improve overall system performance and reliability. In Microservice architecture, Load balancing and API Gateway are often refer same but they are not, API Gateway can do a lot more as explained in this article.

Load balancing can be achieved through various algorithms or methods, such as:

  1. Round Robin: Incoming requests are distributed sequentially to each server or resource in a rotating manner, ensuring an equal distribution of traffic across all servers or resources
  2. Least Connection: Incoming requests are distributed to the server or resource with the least number of active connections, ensuring that the server or resource with the least load receives new requests.
  3. Source IP Affinity: Incoming requests from the same client IP address are directed to the same server or resource, ensuring that requests from a specific client are consistently handled by the same server or resource.
  4. Weighted Round Robin: Incoming requests are distributed based on predefined weights assigned to each server or resource, allowing for different traffic distribution ratios based on server or resource capacity or capability.
  5. Adaptive Load Balancing: Load balancing algorithms dynamically adjust the distribution of traffic based on real-time monitoring of server or resource health, performance, or other metrics, ensuring optimal resource utilization and system performance.

Load balancing can be implemented using hardware-based load balancers, software-based load balancers, or cloud-based load balancing services. It plays a critical role in distributed systems or networks with high traffic loads or resource-intensive workloads, enabling efficient utilization of resources, enhancing system availability and reliability, and providing seamless user experience.

 

0*JqllWVemve3IBh8R.png

7. Security

Security in system design refers to the consideration and implementation of measures to protect a system from potential security threats, vulnerabilities, or attacks. It involves designing and implementing systems with built-in security features and practices to safeguard against unauthorized access, data breaches, data leaks, malware attacks, and other security risks.

Security in system design typically involves the following principles:

  1. Authentication: Ensuring that users or entities are verified and granted appropriate access privileges based on their identity and credentials.
  2. Authorization: Enforcing access controls and permissions to restrict users or entities from accessing unauthorized resources or performing unauthorized actions.
  3. Encryption: Protecting sensitive data by using encryption techniques to prevent unauthorized access or data breaches.
  4. Auditing and Logging: Implementing mechanisms to track and log system activities and events for monitoring, auditing, and forensic purposes.
  5. Input Validation: Validating and sanitizing all input data to prevent common security vulnerabilities such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF) attacks.
  6. Patching and Updates: Keeping the system up-to-date with the latest security patches and updates to address known security vulnerabilities.
  7. Defense in Depth: Implementing multiple layers of security controls, such as firewalls, intrusion detection systems, and antivirus software, to provide a multi-tiered defense against security threats.
  8. Principle of Least Privilege: Limiting users or entities’ access privileges to the minimum necessary to perform their tasks, reducing the potential impact of a security breach or attack.
  9. Secure Communication: Using secure communication protocols, such as HTTPS or SSL/TLS, to protect data in transit from interception or eavesdropping.

Security in system design is critical to protect the integrity, confidentiality, and availability of data and resources, and to ensure the overall security posture of a system. It should be considered and incorporated into the design, development, and deployment phases of a system to mitigate potential security risks and safeguard against security threats.

8. Scalable Data Management

Scalable data management refers to the ability of a system or application to effectively handle growing amounts of data without experiencing performance degradation or loss of functionality. It involves designing and implementing data management practices and technologies that can handle increasing data volumes, user loads, and processing requirements, while maintaining acceptable levels of performance and reliability.

Scalable data management typically involves the following principles:

  1. Data Partitioning: Splitting large datasets into smaller, manageable chunks or partitions to distribute the data across multiple storage or processing resources. This helps in reducing the load on individual resources and allows for parallel processing and improved performance.
  2. Distributed Database Systems: Using distributed databases or data storage solutions that can distribute data across multiple nodes or servers, enabling horizontal scaling and improved performance.
  3. Data Replication: Replicating data across multiple nodes or servers to ensure data availability and fault tolerance. This can involve techniques such as data mirroring, data sharding, or data caching to improve performance and reliability.
  4. Caching and In-Memory Data Storage: Caching frequently accessed data or storing data in memory for faster retrieval and processing, reducing the need for expensive disk I/O operations and improving performance.
  5. Indexing and Query Optimization: Using efficient indexing and query optimization techniques to speed up data retrieval and processing operations, especially in large datasets.
  6. Data Compression: Implementing data compression techniques to reduce the storage footprint and improve data transfer efficiency, especially for large datasets.
  7. Data Archiving and Purging: Implementing data archiving and purging practices to remove or archive old or infrequently accessed data, reducing the storage and processing overhead and improving performance.
  8. Scalable Data Processing Frameworks: Using scalable data processing frameworks such as Apache Hadoop, Apache Spark, or Apache Flink, that can handle large-scale data processing and analytics tasks in a distributed and parallelized manner.
  9. Cloud-based Data Management: Leveraging cloud-based data management services, such as Amazon S3, Amazon RDS, or Google Bigtable, that provide scalable and managed data storage and processing capabilities.
  10. Monitoring and Scalability Testing: Regularly monitoring system performance and conducting scalability testing to identify and address performance bottlenecks, resource limitations, or other scalability challenges, and ensuring that the data management practices can effectively handle increasing data volumes and loads.

In short, Scalable data management is crucial for modern applications and systems that need to handle large amounts of data, user loads, and processing requirements. It enables systems to grow and adapt to changing needs without sacrificing performance or reliability, ensuring that the data management practices can effectively handle increasing data volumes and loads.

9. Design Patterns

Design patterns in system design refer to reusable solutions or best practices that are used to address common design challenges or problems encountered during the development of a software system. Design patterns are widely accepted and proven approaches to design and architect software systems, and they provide a set of well-defined guidelines for designing efficient, maintainable, and scalable systems.

Design patterns in system design can be categorized into various types, including:

  1. Creational Patterns: These patterns focus on object creation mechanisms and provide ways to create objects in a flexible and reusable manner. Examples of creational patterns include Singleton, Factory Method, Abstract Factory, Builder, and Prototype patterns.
  2. Structural Patterns: These patterns focus on the organization of classes and objects to form a larger structure or system. Examples of structural patterns include Adapter, Bridge, Composite, Decorator, and Facade patterns.
  3. Behavioral Patterns: These patterns focus on the interaction and communication between objects or components within a system. Examples of behavioral patterns include Observer, Strategy, Command, Iterator, and Template Method patterns.
  4. Architectural Patterns: These patterns provide high-level guidelines and strategies for designing the overall architecture of a system. Examples of architectural patterns include Model-View-Controller (MVC), Model-View-ViewModel (MVVM), Layered architecture, Microservices, and Event-Driven architecture patterns.

Design patterns are important in system design as they provide proven and standardized ways to address common design challenges, improve code quality, and ensure maintainability and scalability of software systems.

They promote code reusability, separation of concerns, and encapsulation of functionality, making it easier to manage complex systems and adapt them to changing requirements.

By using design patterns, developers can leverage existing knowledge and best practices to design robust and efficient systems that meet the needs of the users and stakeholders.

In the last few articles I have also talked about common Microservice design patterns like Event Sourcing, CQRS, SAGA, Database Per Microservices, API Gateway, Circuit-Breaker and also shared best practices to design Microservices , you can also check these article to learn more about Microservice communication, including synchronous and asynchronous communication.

10. Performance

While we already know what performance means, remember slow laptop? In System Design, Performance refers to the speed, responsiveness, and efficiency of a software system in processing data and delivering results.

Optimizing system performance through efficient algorithms, caching, indexing, and other techniques is essential for creating systems that can handle large-scale data processing and deliver optimal response times.

Performance in system design refers to the ability of a software system or application to efficiently and effectively carry out its intended functions or tasks, while meeting performance requirements and expectations. It encompasses various aspects such as response time, throughput, resource utilization, scalability, and efficiency of the system.

Performance is a critical factor in system design as it directly affects the user experience, system reliability, and overall system efficiency. A poorly performing system can lead to slow response times, low throughput, high resource utilization, and inefficient use of system resources, resulting in degraded system performance and user dissatisfaction.

System designers need to consider various performance-related factors during the design process, such as choosing appropriate algorithms and data structures, optimizing code, minimizing unnecessary overheads, managing system resources efficiently, and ensuring proper system configuration and tuning. Performance testing and profiling techniques can also be used to identify and address performance bottlenecks and optimize system performance.

Optimizing performance in system design requires a careful balance between functionality, complexity, and resource utilization. It involves making informed design decisions, using best practices, and continuously monitoring and optimizing system performance to ensure that the system meets its performance requirements and delivers a smooth and efficient user experience.

Conclusion

In conclusion, understanding and mastering these key system design concepts is crucial for programmers to build robust, scalable, and efficient software systems. These concepts, including fault tolerance, reliability, availability, caching strategies, load balancing, security, scalable data management, design patterns, and performance, play a critical role in ensuring that software systems meet their intended objectives, perform optimally, and deliver a superior user experience.

By having a solid understanding of these system design concepts, you can make informed design decisions, choose appropriate technologies and techniques, and optimize system performance. It also allows you to design systems that are resilient, scalable, secure, and efficient, capable of handling the challenges of modern-day software development and meeting the expectations of end-users.

And, if you are not a Medium member then I highly recommend you to join Medium so that you can not only read these articles but also from many others like Google Engineers and Tech experts from FAANG companies. You can join Medium here

Other System Design and Microservices articles you may like

  • Upvote 1
Link to comment
Share on other sites

@dasari4kntr bro , please don't copy paste Medium articles , instead give medium link with small description so interested people read it directly on medium ..... content writers earn on medium based on these clicks and users time spent on their pages. Encourage medium writers noooo 

  • Upvote 2
Link to comment
Share on other sites

Just now, ramudu said:

@dasari4kntr bro , please don't copy paste Medium articles , instead give medium link with small description so interested people read it directly on medium ..... content writers earn on medium based on these clicks and users time spent on their pages. Encourage medium writers noooo 

sure...

Link to comment
Share on other sites

3 minutes ago, ramudu said:

@dasari4kntr bro , please don't copy paste Medium articles , instead give medium link with small description so interested people read it directly on medium ..... content writers earn on medium based on these clicks and users time spent on their pages. Encourage medium writers noooo 

agree...i will post medium links....going forward..

 

but..medium itself is not idle platform..i know hackernoon was famous tech blog...they came out from medium....and i listened few podcasts about that medium vs hackernoon conflict...

1*ZTh6irqvujxVCiAIgAUGYA.png
 

1*wr25aB3U9Vm-9IeRl1b8yg.png

 

1*7RX93H-7HzwPyq_mkzNDaA.png

 

1*_Omq217iS8j8UvMutMyQ0Q.png

 

1*O3yt_lvXAZlJGNvTqicTjg.png

 

1*JjTug7Ogg1xGcwF2GAiZXg.png

 

1*sA9H5rZYP94YHJEgMMpJYQ.png

 

1*zFQofDY_l55TFsZMlTucCg.png

 

1*FG1bHOLU9cV52_xnFoEYTg.png

 

1*29WRWGYWVVs55IO9OUI10A.png

 

1*UThiixqpcGLGYhaBeWgDPg.png

 

1*yWouzzREWBDQOboozKm1nQ.png

Here is the video (you can also listen to this story on iTunes or Google), and below is the transcript:

Link to comment
Share on other sites

1 minute ago, dasari4kntr said:

agree...i will post medium links....going forward..

 

but..medium itself is not idle platform..i know hackernoon was famous tech blog...they came out from medium....and i listened few podcasts about that medium vs hackernoon conflict...

 

 

 

agree , medium is not idle but except substack not much options for now

Link to comment
Share on other sites

9 minutes ago, ramudu said:

agree , medium is not idle but except substack not much options for now

yup…

people are becoming lazy (i am good example for that)…to setup own infra and monetize options…medium is giving those options…

but in this chatGPT era how this blog business will sustain is interesting question….

but to study a blog articles why would anyone pay (readers )…(news  subscriptions like wsj..etc are different story…)

Link to comment
Share on other sites

On 4/14/2023 at 6:43 PM, AnotherTeluguBidda said:

Em farak padadu. People not fortunate to study anything beyond HS are becoming kickass programmers from long time. If interested in java i can suggest a book that helps you learn via biology use case.

Can you please dm me the book.

Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

×
×
  • Create New...