Get the Linkedin stats of Alex Xu and many LinkedIn Influencers by Taplio.
open on linkedin
Follow me for system design & book-writing tips. Alex Xu is a software engineer and author. His book System Design Interview - An Insider’s Guide is one of Amazon's best-selling books in the “Distributed Systems & Computing” category. As of December 2020, his book is being translated into 7 different languages (Traditional Chinese, Russian, Japanese, Spanish, Polish, Simplified Chinese, and Korean). -------------- Newsletter: https://blog.bytebytego.com Twitter: https://twitter.com/alexxubyte YouTube: https://www.youtube.com/c/ByteByteGo
Check out Alex Xu's verified LinkedIn stats (last 30 days)
Use Taplio to search all-time best posts
The Open Source AI Stack You don’t need to spend a fortune to build an AI application. The best AI developer tools are open-source, and an excellent ecosystem is evolving that can make AI accessible to everyone. The key components of this open-source AI stack are as follows: 1 - Frontend To build beautiful AI UIs, frameworks like NextJS and Streamlit are extremely useful. Also, Vercel can help with deployment. 2 - Embeddings and RAG libraries Embedding models and RAG libraries like Nomic, JinaAI, Cognito, and LLMAware help developers build accurate search and RAG features. 3 - Backend and Model Access For backend development, developers can rely on frameworks like FastAPI, Langchain, and Netflix Metaflow. Options like Ollama and Huggingface are available for model access. 4 - Data and Retrieval For data storage and retrieval, several options like Postgres, Milvus, Weaviate, PGVector, and FAISS are available. 5 - Large-Language Models Based on performance benchmarks, open-source models like Llama, Mistral, Qwen, Phi, and Gemma are great alternatives to proprietary LLMs like GPT and Claude. Over to you: Which other tool will you add to the Open Source AI Stack? – Subscribe to our newsletter to download the 𝐡𝐢𝐠𝐡-𝐫𝐞𝐬𝐨𝐥𝐮𝐭𝐢𝐨𝐧 𝐜𝐡𝐞𝐚𝐭 𝐬𝐡𝐞𝐞𝐭. After signing up, find the download link on the success page: https://bit.ly/3tiMC1B #systemdesign #coding #interviewtips .
12 MCP Servers You Can Use in 2025 MCP (Model Context Protocol) is an open standard that simplifies how AI models, particularly LLMs, interact with external data sources, tools, and services. An MCP server acts as a bridge between these AI models and external tools. Here are the top MCP servers: 1 - File System MCP Server Allows the LLM to directly access the local file system to read, write, and create directories. 2 - GitHub MCP Server Connects Claude to GitHub repos and allows file updates, code searching. 3 - Slack MCP Server MCP Server for Slack API, enabling Claude to interact with Slack workspaces. 4 - Google Maps MCP Server MCP Server for Google Maps API. 5 - Docker MCP Server Integrate with Docker to manage containers, images, volumes, and networks. 6 - Brave MCP Server Web and local search using Brave’s Search API. 7 - PostgreSQL MCP Server An MCP server that enables LLM to inspect database schemas and execute read-only queries. 8 - Google Drive MCP Server An MCP server that integrates with Google Drive to allow reading and searching over files. 9 - Redis MCP Server MCP Server that provides access to Redis databases. 10 - Notion MCP Server This project implements an MCP server for the Notion API. 11 - Stripe MCP Server MCP Server to interact with the Stripe API. 12 - Perplexity MCP Server An MCP Server that connects to Perplexity’s Sonar API for real-time search. Over to you: Which other MCP Server will you add to the list? – Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
Oauth 2.0 Explained With Simple Terms. . . OAuth 2.0 is a powerful and secure framework that allows different applications to securely interact with each other on behalf of users without sharing sensitive credentials. The entities involved in OAuth are the User, the Server, and the Identity Provider (IDP). What Can an OAuth Token Do? When you use OAuth, you get an OAuth token that represents your identity and permissions. This token can do a few important things: Single Sign-On (SSO): With an OAuth token, you can log into multiple services or apps using just one login, making life easier and safer. Authorization Across Systems: The OAuth token allows you to share your authorization or access rights across various systems, so you don't have to log in separately everywhere. Accessing User Profile: Apps with an OAuth token can access certain parts of your user profile that you allow, but they won't see everything. Remember, OAuth 2.0 is all about keeping you and your data safe while making your online experiences seamless and hassle-free across different applications and services. Over to you: Imagine you have a magical power to grant one wish to OAuth 2.0. What would that be? Maybe your suggestions actually lead to OAuth 3. -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
Design Patterns Cheat Sheet - Part 1 and Part 2 The cheat sheet briefly explains each pattern and how to use it. What's included? - Factory - Builder - Prototype - Singleton - Chain of Responsibility - And many more! – Subscribe to our newsletter to receive both part 1 and part 2 of the cheat sheet link: https://lnkd.in/eTZkM7ph #systemdesign #coding #interviewtips .
The Fundamental Pillars of Object-Oriented Programming Abstraction, Encapsulation, Inheritance, and Polymorphism are the four pillars of object-oriented programming. What do they mean? 1 - Abstraction This is the process of hiding implementation details and showing only the essential features of an object. For example, a Vehicle class with an abstract stop method. 2 - Encapsulation It involves wrapping data (fields) and methods in a single unit (class) and restricting direct access using access modifiers. For example, private fields with public getters and setters. 3 - Inheritance The process of creating a new class (child) that inherits attributes and methods from an existing class (parent), thereby promoting code reuse. For example, a Car class inherits from a Vehicle class. 4 - Polymorphism It allows methods to perform differently based on the object they are invoked on. When two types share an inheritance chain, they can be used interchangeably with no errors. Over to you: Do you use object-oriented programming? -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
9 Clean Code Principles To Keep In Mind 1 - Meaningful Names: Name variables and functions to reveal their purpose, not just their value. 2 - One Function, One Responsibility: Functions should do one thing. 3 - Avoid Magic Numbers: Replace hard-code values with named constants to give them meaning. 4 - Use Descriptive Booleans: Boolean names should state a condition, not just its value. 5 - Keep Code DRY: Duplicate code means duplicate bugs. Try and reuse logic where it makes sense. 6 - Avoid Deep Nesting: Flatten your code flow to improve clarity and reduce cognitive load. 7 - Comment Why, Not What: Explain the intention behind your code, not the obvious mechanics. 8 - Limit Function Arguments: Too many parameters confuse. Group related data into objects. 9 - Code Should Be Self-Explanatory: Well-written code needs fewer comments because it reads like a story. Over to you: Which other clean code principle will you add to the list? -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
The Large-Language Model Glossary This glossary can be divided into high-level categories 1 - Models: Includes the types of models such as Foundation, Instruction-Tuned, Multi-modal, Reasoning, and Small Language Model. 2 - Training LLM: Training begins with pretraining RLHF, DPO, and Synthetic Data. Fine-Tuning adds control with datasets, checkpoints, LoRA/QLoRA, guardrails, and parameter tunings. 3 - Prompts: Prompts drive how models respond using User/System Prompts, Chain of Thought, of Few/Zero-Shot learning. Prompt Tuning and large Context Windows help shape more precise, multi-turn conversations. 4 - Inference: This is how models generate responses. Key factors include Temperature, Max Tokens, Seed, and Latency. Hallucination is a common issue here, where the model makes things up that sound real. 5 - Retrieval-Augmented Generation: RAG improves accuracy by fetching real-world data. It uses Retrieval, Semantic Search, Chunks, Embeddings, and VectorDBs. Reranking and Indexing ensure the best answers are surfaced, not just the most likely ones. Over to you: What else will you add to the LLM glossary? -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
The System Design Topic Map Effective system design is a game of trade-offs and requires a broad knowledge base to make the best decisions. This topic map categorizes the essential system design topics based on categories. 1 - Application Layer: It consists of the core concepts such as availability, scalability, reliability, and other NFRs. Also covers design and architectural topics such as OOP, DDD, Microservices, Clean Architecture, Modular Monoliths, and so on. 2 - Network & Communication: It covers communication protocols, service integration, messaging, real-time communication, and event-driven architecture. 3 - Data Layer: It covers the basics of database systems (schema design, indexing, SQL vs NoSQL, transactions, etc), the various types of databases, and the nuances of distributed databases (replication, sharding, leader election, etc.) 4 - Scalability & Reliability: This covers scalability strategies (horizontal, stateless, caching, partitioning, etc) and reliability strategies like load balancing, rate limiting, and so on. 5 - Security & Observability: It covers authentication and authorization techniques (OAuth 2, JWT, PASETO, Sessions, Cookies, RBAC, etc.) and security threats. The observability area deals with topics like monitoring, tracing, and logging. 6 - Infrastructure & Deployments: Deals with CI/CD pipelines, containerization and orchestration, serverless architecture, IaC, and disaster recovery techniques. Over to you: What else will you add to the list? -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
A handy cheat sheet for the most popular cloud services. Link to the high resolution at the end. What’s included? - AWS, Azure, Google Cloud, Oracle Cloud - Cloud servers - Databases - Message queues and streaming platforms - Load balancing, DNS routing software - Security - Monitoring Over to you - which company is the best at naming things? – Subscribe to our newsletter to download the high-resolution cheat sheet. After signing up, find the download link on the success page: https://bit.ly/3tiMC1B #systemdesign #coding #interviewtips .
What is SSO (Single Sign-On)? . . Basically, Single Sign-On (SSO) is an authentication scheme. It allows a user to log in to different systems using a single ID. The diagram below illustrates how SSO works. Step 1: A user visits Gmail, or any email service. Gmail finds the user is not logged in and so redirects them to the SSO authentication server, which also finds the user is not logged in. As a result, the user is redirected to the SSO login page, where they enter their login credentials. Steps 2-3: The SSO authentication server validates the credentials, creates the global session for the user, and creates a token. Steps 4-7: Gmail validates the token in the SSO authentication server. The authentication server registers the Gmail system, and returns “valid.” Gmail returns the protected resource to the user. Step 8: From Gmail, the user navigates to another Google-owned website, for example, YouTube. Steps 9-10: YouTube finds the user is not logged in, and then requests authentication. The SSO authentication server finds the user is already logged in and returns the token. Step 11-14: YouTube validates the token in the SSO authentication server. The authentication server registers the YouTube system, and returns “valid.” YouTube returns the protected resource to the user. The process is complete and the user gets back access to their account. Over to you: Question 1: have you implemented SSO in your projects? What is the most difficult part? Question 2: what’s your favorite sign-in method and why? -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
Top 30 AWS Services That Are Commonly Used. We group them by category and understand what they do. Compute Services 1 - Amazon EC2: Virtual servers in the cloud 2 - AWS Lambda: Serverless functions for event-driven workloads 3 - Amazon ECS: Managed container orchestration 4 - Amazon EKS: Kubernetes cluster management service 5 - AWS Fargate: Serverless compute for containers Storage Services 6 - Amazon S3: Scalable secure object storage 7 - Amazon EBS: Block storage for EC2 instances 8 - Amazon FSx: Fully managed file storage 9 - AWS Backup: Centralized backup automation 10 - Amazon Glacier: Archival cold storage for backups Database Services 11 - Amazon RDS: Managed relational database service 12 - Amazon DynamoDB: NoSQL database with low latency 13 - Amazon Aurora: High-performance cloud-native database 14 - Amazon Redshift: Scalable data warehousing solution 15 - Amazon Elasticache: In-memory caching with Redis/Memcached 16 - Amazon DocumentDB: NoSQL document database (MongoDB-compatible) 17 - Amazon Keyspaces: Managed Cassandra database service Networking & Security 18 - Amazon VPC: Secure cloud networking 19 - AWS CloudFront: Content Delivery Network 20 - AWS Route53: Scalable domain name system (DNS) 21 - AWS WAF: Protects web applications from attacks 22 - AWS Shield: DDoS protection for AWS workloads AI & Machine Learning 23 - Amazon SageMaker: Build, train, and deploy ML models 24 - AWS Rekognition: Image and video analysis with AI 25 - AWS Textract: Extracts text from scanned documents 26 - Amazon Comprehend: AI-driven natural language processing Monitoring & DevOps 27 - Amazon CloudWatch: AWS performance monitoring and alerts 28 - AWS X-Ray: Distributed tracing for applications 29 - AWS CodePipeline: CI/CD automation for deployments 30 - AWS CloudFormation - Infrastructure as Code (IaC) Over to you: Which other AWS service will you add to the list? -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
Top 6 Tools to Turn Code into Beautiful Diagrams - Diagrams - Go Diagrams - Mermaid - PlantUML - ASCII diagrams - Markmap Over to you: Did we miss anything? What's your favorite? -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
JWT Simply Explained JWT or JSON Web Tokens is an open standard for securely transmitting information between two parties. They are widely used for authentication and authorization. A JWT consists of three main components: 1 - Header Every JWT carries a header specifying the algorithms for signing the JWT. It’s written in JSON format. 2 - Payload The payload consists of the claims and the user data. There are different types of claims such as registered, public, and private claims. 3 - Signature The signature is what makes the JWT secure. It is created by taking the encoded header, encoded payload, secret key, and the algorithm and signing it. JWTs can be signed in two different ways: 1 - Symmetric Signatures It uses a single secret key for both signing the token and verifying it. The same key must be shared between the server that signs the JWT and the system that verifies it. 2 - Asymmetric Signatures In this case, a private key is used to sign the token, and a public key to verify it. The private key is kept secure on the server, while the public key can be distributed to anyone who needs to verify the token. Over to you: Do you use JWTs for authentication? -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
Linux Boot Process Illustrated The diagram below shows the steps. Step 1 - When we turn on the power, BIOS (Basic Input/Output System) or UEFI (Unified Extensible Firmware Interface) firmware is loaded from non-volatile memory, and executes POST (Power On Self Test). Step 2 - BIOS/UEFI detects the devices connected to the system, including CPU, RAM, and storage. Step 3 - Choose a booting device to boot the OS from. This can be the hard drive, the network server, or CD ROM. Step 4 - BIOS/UEFI runs the boot loader (GRUB), which provides a menu to choose the OS or the kernel functions. Step 5 - After the kernel is ready, we now switch to the user space. The kernel starts up systemd as the first user-space process, which manages the processes and services, probes all remaining hardware, mounts filesystems, and runs a desktop environment. Step 6 - systemd activates the default. target unit by default when the system boots. Other analysis units are executed as well. Step 7 - The system runs a set of startup scripts and configure the environment. Step 8 - The users are presented with a login window. The system is now ready. -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
How to Learn Cloud Computing? Cloud computing is a vast field with an ever-growing footprint. It can often get tricky for a new developer to understand where to start. Here’s a learning map: 1 - Cloud Computing Basics This includes topics such as “what is cloud computing,” its benefits, cloud models (public, private, hybrid, and multi), and a comparison of cloud vs. on-premise. 2 - Cloud Service Models Learn about cloud service models such as IaaS, PaaS, and SaaS. 3 - Cloud Providers Explore the various popular cloud platforms such as AWS, Azure, GCP, Oracle Cloud, IBM Cloud, etc. Also, learn how to choose a cloud provider. 4 - Key Cloud Services Learn the key cloud services related to Compute (EC2, Azure VM, Docker, Kubernetes, Lambda, etc), Storage (EBS, Azure Disk, S3, Azure Blob, EFS, etc.), and Networking (VPC, ELB, Azure LB, Cloudfront, and Azure CDN). 5 - Security & Compliance Learn about the critical security and compliance points related to identity, access management, encryption, data security, DDoS protection, and WAF. 6 - Cloud DevOps & Automation Learn Cloud DevOps and automation in specific areas such as CI/CD, IaC, and Monitoring. Over to you: What else will you add to the list for learning cloud computing? -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
A Cheatsheet on REST API Design Best Practices. Well-designed APIs behave consistently, fair predictably, and grow without friction. Some best practices to keep in mind are as follows: 1 - Resource-oriented paths and proper use of HTTP verbs help APIs align with standard tools. 2 - Use a proper API versioning approach. 3 - Use standard error codes while generating API responses. 4 - APIs should be idempotent. They ensure safe retries by making repeated requests to produce the same result, especially for POST operations. 5 - Idempotency keys allow clients to safely deduplicate operations with side effects. 6 - APIs should support pagination to prevent performance bottlenecks and payload bloat. Some common pagination strategies are offset-based, cursor-based, and keyset-based. 7 - API security is mandatory for well-designed APIs. Use proper authentication and authorization with APIs using API Keys, JWTs, OAuth2, and other mechanisms. HTTPS is also a must-have for APIs running in production. Over to you: Which other best practices do you follow while designing APIs? -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
The 4 Types of SQL Joins Edit: The right join output should be 4. Updated diagram in the comment SQL joins combine rows from two or more tables based on a related column. Here are the different types of joins you can use: 1 - Inner Join Returns only the matching rows between both tables. It keeps common data only. 2 - Left Join Returns all rows from the left table and matching rows from the right table. If a row in the left table doesn’t have a match in the right table, the right table’s columns will contain NULL values in that row. 3 - Right Join Returns all rows from the right table and matching rows from the left table. If no matching record exists in the left table for a record in the right table, the columns from the left table in the result will contain NULL values. 4 - FULL OUTER JOIN Returns all rows from both tables, filling in NULL for missing matches. Over to you: Which SQL Join have you used the most? -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
Visualizing a SQL query SQL statements are executed by the database system in several steps, including: - Parsing the SQL statement and checking its validity - Transforming the SQL into an internal representation, such as relational algebra - Optimizing the internal representation and creating an execution plan that utilizes index information - Executing the plan and returning the results -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
Explaining JSON Web Token (JWT) with simple terms. Imagine you have a special box called a JWT. Inside this box, there are three parts: a header, a payload, and a signature. The header is like the label on the outside of the box. It tells us what type of box it is and how it's secured. It's usually written in a format called JSON, which is just a way to organize information using curly braces { } and colons : . The payload is like the actual message or information you want to send. It could be your name, age, or any other data you want to share. It's also written in JSON format, so it's easy to understand and work with. Now, the signature is what makes the JWT secure. It's like a special seal that only the sender knows how to create. The signature is created using a secret code, kind of like a password. This signature ensures that nobody can tamper with the contents of the JWT without the sender knowing about it. When you want to send the JWT to a server, you put the header, payload, and signature inside the box. Then you send it over to the server. The server can easily read the header and payload to understand who you are and what you want to do. Over to you: When should we use JWT for authentication? What are some other authentication methods? -- Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
Big O Notation 101: The Secret to Writing Efficient Algorithms From simple array operations to complex sorting algorithms, understanding the Big O Notation is critical for building high-performance software solutions. 1 - O(1) This is the constant time notation. The runtime remains steady regardless of input size. For example, accessing an element in an array by index and inserting/deleting an element in a hash table. 2 - O(n) Linear time notation. The runtime grows in direct proportion to the input size. For example, finding the max or min element in an unsorted array. 3 - O(log n) Logarithmic time notation. The runtime increases slowly as the input grows. For example, a binary search on a sorted array and operations on balanced binary search trees. 4 - O(n^2) Quadratic time notation. The runtime grows exponentially with input size. For example, simple sorting algorithms like bubble sort, insertion sort, and selection sort. 5 - O(n^3) Cubic time notation. The runtime escalates rapidly as the input size increases. For example, multiplying two dense matrices using the naive algorithm. 6 - O(n logn) Linearithmic time notation. This is a blend of linear and logarithmic growth. For example, efficient sorting algorithms like merge sort, quick sort, and heap sort 7 - O(2^n) Exponential time notation. The runtime doubles with each new input element. For example, recursive algorithms solve problems by dividing them into multiple subproblems. 8 - O(n!) Factorial time notation. Runtime skyrockets with input size. For example, permutation-generation problems. 9 - O(sqrt(n)) Square root time notation. Runtime increases relative to the input’s square root. For example, searching within a range such as the Sieve of Eratosthenes for finding all primes up to n. Over to you: What else will you add to better understand the Big O Notation? – Subscribe to our weekly newsletter to get a Free System Design PDF (158 pages): https://bit.ly/bbg-social #systemdesign #coding #interviewtips .
Content Inspiration, AI, scheduling, automation, analytics, CRM.
Get all of that and more in Taplio.
Try Taplio for free
Sabeeka Ashraf
@sabeekaashraf
20k
Followers
Ash Rathod
@ashrathod
73k
Followers
Richard Moore
@richardjamesmoore
105k
Followers
Daniel Murray
@daniel-murray-marketing
150k
Followers
Sam G. Winsbury
@sam-g-winsbury
49k
Followers
Shlomo Genchin
@shlomogenchin
49k
Followers
Matt Gray
@mattgray1
1m
Followers
Wes Kao
@weskao
107k
Followers
Izzy Prior
@izzyprior
82k
Followers
Vaibhav Sisinty ↗️
@vaibhavsisinty
451k
Followers
Justin Welsh
@justinwelsh
1m
Followers
Tibo Louis-Lucas
@thibaultll
6k
Followers
Sahil Bloom
@sahilbloom
1m
Followers
Amelia Sordell 🔥
@ameliasordell
228k
Followers
Luke Matthews
@lukematthws
188k
Followers
Andy Mewborn
@amewborn
213k
Followers