Skip to main content

Blog - Page 21

To be trusted, you must first be trustworthy; you need to be competent. Not only must you be competent, but you also need to establish a connection with the other party, which requires you to appear approachable. Psychologists have found that trust equals competence plus approachability, but being overly competent can create a sense of distance and threat. You also need to expose minor weaknesses to bridge the gap with others.

Read more →

Architecture can directly impact costs per feature. Let's compare Tight-coupling MVC, Cocoa MVC, MVP, MVVM, and VIPER in three dimensions: balanced distribution of responsibility among feature actors, testability and ease of use and maintainability.

Read more →

The key-value cache is used to reduce the latency of data access. What are read-through, write-through, write-behind, write-back, write-behind, and cache-aside patterns?

Read more →

Traditional NFS based design has metadata bottleneck: large metadata size limits the metadata hit ratio. Facebook photo storage eliminates the metadata by aggregating hundreds of thousands of images in a single haystack store file.

Read more →

A system design walkthrough of Uber's ride-hailing backend, covering real-time dispatch at massive scale.

Read more →

Names are a very important weapon. Researchers at Syracuse University found that when people use derogatory terms to refer to a certain social group, the suicide rate among that group tends to be higher. Names can also unite people; experimental results show that the name of a game influences people's ability to cooperate. When people cheer for themselves during a competition, they often achieve their best performance.

Read more →

A blockchain is an incorruptible distributed ledger that is hosted by multiple parties, secured by crypto algorithms and immutable and verifiable in data storage. The blockchain technology is applied in a wide range of industries.

Read more →

The cycle system enables people to follow through. It suggests every day should start with your to-do list, hours needed and plans. The secrets also lie in writing down goals and scheduling things with the calendar, instead of your brain.

Read more →

Different auth systems solve the problem with different needs. For a new start-up who does not want to build their own auth systems, the most suitable solution is auth0. Meanwhile, the best solution for a company that needs integrations of enterprise services is OneLogin.

Read more →

People cannot dominate an industry solely with superior technical skills, as the replicability and update rate of technology are extremely high. Maintaining a curious mind and deliberately exploring the world is another necessary condition for enhancing one's competitiveness. Allen Gannett interviewed numerous creative individuals and concluded that we must spend 20% of our waking time each day absorbing knowledge in our respective fields.

Read more →

The persuasive techniques used by the Greeks let you appear clever when speaking. Other schemes include figures of speech, twisting clichés, Yoda speaking, dialysis, antithesis, saying both yes and no and inventing new words.

Read more →

Sustainable user engagement should be built through three levels: user growth, focusing on the growth of users completing core actions; user retention, where the longer the product is used, the greater its value, and the greater the loss when users leave; self-sustaining, where users create a positive feedback loop through their participation in the product.

Read more →