<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
    <channel>
        <title>Arkadiusz Plich - tech blog</title>
        <link>http://plich.me/</link>
        <description>Arkadiusz Plich - tech blog</description>
        <generator>Hugo -- gohugo.io</generator><language>en-us</language><managingEditor>Arkadiusz@Plich.me (Arkadiusz Plich)</managingEditor>
            <webMaster>Arkadiusz@Plich.me (Arkadiusz Plich)</webMaster><lastBuildDate>Sat, 20 Jul 2024 20:00:00 &#43;0200</lastBuildDate>
            <atom:link href="http://plich.me/index.xml" rel="self" type="application/rss+xml" />
        <item>
    <title>Bloom filter</title>
    <link>http://plich.me/posts/10/bloom_filter/</link>
    <pubDate>Sat, 20 Jul 2024 20:00:00 &#43;0200</pubDate><author>
        <name>Arkadiusz Plich</name>
    </author><guid>http://plich.me/posts/10/bloom_filter/</guid>
    <description><![CDATA[<p>Have you ever wondered how it happens that when you try to register on a very popular portal, entering a made-up username, you get a response in a split second that this username is already taken and you should try another one?
I&rsquo;ll be honest, I didn&rsquo;t either, but coincidentally, while reading Data Intensive Applications by Martin Kleppmann, I probably learned this secret. It is the Bloom filter. Or maybe not. Actually, I don’t know if there are companies using Bloom filter to verify usernames of their users, but I think this example is easy to understand, so I will stick with it).</p>]]></description>
</item><item>
    <title>Parallel pattern</title>
    <link>http://plich.me/posts/5/parallel_run_pattern/</link>
    <pubDate>Sun, 29 Oct 2023 13:10:00 &#43;0200</pubDate><author>
        <name>Arkadiusz Plich</name>
    </author><guid>http://plich.me/posts/5/parallel_run_pattern/</guid>
    <description><![CDATA[<p>Sam Newman, in his book <a href="https://www.amazon.com/Monolith-Microservices-Evolutionary-Patterns-Transform/dp/1492047848" target="_blank" rel="noopener noreferrer">Monolith to microservices: Evolutionary Patterns to Transform your Monolith</a> walking through patterns designed to separating functionality from the monolith into microservices, described the pattern which even though might be hard to use and implement but could be very helpful if you are trying to migrate very risky piece of code to new service. This pattern is called the Parallel Run pattern, and today&rsquo;s post will be about it.</p>]]></description>
</item><item>
    <title>Branch of abstraction pattern</title>
    <link>http://plich.me/posts/4/branch_of_abstraction_pattern/</link>
    <pubDate>Sat, 21 Oct 2023 21:30:00 &#43;0200</pubDate><author>
        <name>Arkadiusz Plich</name>
    </author><guid>http://plich.me/posts/4/branch_of_abstraction_pattern/</guid>
    <description><![CDATA[<p>A few days ago, <a href="https://plich.me/posts/3/strangler_fig_pattern/" target="_blank" rel="noopener noreferrer">I wrote a post about the Strangler Fig pattern</a> designed to securely exclude some functionalities from one system to another. I mentioned that when you have a use case where you are changing calls within one system, you must alter all calls and redirect them to your new code.</p>]]></description>
</item><item>
    <title>Strangler fig pattern</title>
    <link>http://plich.me/posts/3/strangler_fig_pattern/</link>
    <pubDate>Thu, 19 Oct 2023 19:00:00 &#43;0200</pubDate><author>
        <name>Arkadiusz Plich</name>
    </author><guid>http://plich.me/posts/3/strangler_fig_pattern/</guid>
    <description><![CDATA[<p>While reading <a href="https://www.amazon.com/Building-Microservices-Designing-Fine-Grained-Systems/dp/B0BX5LC8HB" target="_blank" rel="noopener noreferrer">Building Microservices: Designing Fine-Grained Systems</a> a few weeks ago and <a href="https://www.amazon.com/Monolith-Microservices-Evolutionary-Patterns-Transform-ebook/dp/B081TKSSNN" target="_blank" rel="noopener noreferrer">Monolith to Microservices: Evolutionary Patterns To Transform Your Monolith</a> by Sam Newman I came across an interesting pattern called Strangler fig that is designed to help exclude some system functionalities, e.g. to the new module or new app. A few simple steps can save time and stress, so I think it is worth exploring.</p>]]></description>
</item><item>
    <title>Transaction isolation levels in relational databases</title>
    <link>http://plich.me/posts/2/transaction_isolation_level/</link>
    <pubDate>Thu, 12 Oct 2023 20:00:00 &#43;0200</pubDate><author>
        <name>Arkadiusz Plich</name>
    </author><guid>http://plich.me/posts/2/transaction_isolation_level/</guid>
    <description><![CDATA[<p>During one of my recruitment interviews, I was asked how database transactions interact and what influence we have on this.
Although I have read about transaction isolation levels in relational databases in the past, I hadn&rsquo;t had the opportunity to think about this problem in production, so I didn&rsquo;t initially associate this with what my interviewer was getting at.
It seems to me to be a good topic to start, so let&rsquo;s move on.</p>]]></description>
</item><item>
    <title>Hello world</title>
    <link>http://plich.me/posts/1/</link>
    <pubDate>Thu, 07 Sep 2023 22:48:00 &#43;0200</pubDate><author>
        <name>Arkadiusz Plich</name>
    </author><guid>http://plich.me/posts/1/</guid>
    <description><![CDATA[<div class="featured-image">
                <img src="/posts/1/featured-image3.png" referrerpolicy="no-referrer">
            </div>Initial postThe first blog post and the first &ldquo;Hello World&rdquo; program in programming have symbolic meaning. Both are starting points that let you know you are on the right path. They also prove that every journey, even the longest, begins with a single step or word.]]></description>
</item></channel>
</rss>
