SOLID Principles: 5 Commandments to Avoid Bad Code
SRP, OCP, LSP, ISP, DIP. The foundation of maintainable software architecture. Examples in TypeScript.

Writing about development and technology.
SRP, OCP, LSP, ISP, DIP. The foundation of maintainable software architecture. Examples in TypeScript.

Quick & Dirty code feels fast now, but you pay interest later. Don't go bankrupt.

MVC's Controller got too fat. Split into Presenter/ViewModel, auto-update with Data Binding. Core pattern of modern frontend.

Writing test BEFORE code. Red -> Green -> Refactor. The Double-Entry Bookkeeping of Programming.

Analyzing the trade-offs between Compiled languages (C++) and Interpreted languages (Python). How JIT Compilers bridge the gap.

Visualizing work flow. Why limiting WIP (Work In Progress) makes you faster.

Sprinting every 2 weeks (Scrum) vs Continuous flow like sushi belt (Kanban). Which one fits your team?

Waterfall follows the plan rigorously. Agile adapts to change swiftly. Which suits your team? Agile isn't always the answer.

'It works on my machine' is no longer an excuse. Robots test (CI) and deploy (CD) when you push code. Deploy 100 times a day with automation pipelines.

Safety (Git Flow) vs Agility (Trunk Based). How often do you deploy?

From Netscape SSL to TLS 1.3. Symmetric vs Asymmetric encryption, Handshake deep dive (RTT reduction), Chain of Trust, and why 'Self-Signed' is dangerous.

If your app keeps crashing on AWS/Docker. The 12 Commandments written by Heroku founders.

Simple hashing gets cracked in 1 second. How Sprinkling Salt and Pepper blocks Rainbow Table attacks.

The only way to store passwords safely. One-way Encryption and Avalanche Effect.

No managing EC2. Pay per execution. Event-driven architecture using AWS Lambda, S3, and DynamoDB. Cold Start mitigation patterns.

How to share secrets safely with a server across the globe? The Magic of Public/Private Keys behind HTTPS.

Distribute the Lock (Public), keep the Key (Private).

Fast and efficient. But how do you share the key safely? The classic Key Distribution Problem.

Text to Binary (HTTP/2), TCP to UDP (HTTP/3). From single-file queueing to parallel processing. Google's QUIC protocol story.

Establishing TCP connection is expensive. Reuse it for multiple requests.
