Mandatory Algorithms for Coding Interview
Basic algorithms that you must know if you want to crack your coding interview. In case you are starting to prepare for coding practice then make sure you...
Are you willing to become cloud solution architect? I am going to add a few important technical questions that you must know for your next cloud solution architect interview. My answers would not be perfect so feel free to search for better answers. Important part from this article is what kind of technical questions you should know to become a good cloud solution architect. So focus on the questions that I am asking here and learn from anywhere about their answers.
Most of the time you will be asked various open-ended technical questions. The best strategy to answer them is think of below 4 things:
You must know what a software Architect does?
They have to speak the languages of CEO, CIO, CFO and Engineers.
It is virtualization of computers on cloud. Amazon EC2 is a virtualized machine where we can install applications and OS. It is an Infrastructure as a Service offering. We virtualize storage, network, CPU etc. using hypervisors.
Caching is to offload servers by storing high frequently added information in the cache. If the user tries to take information from DB. It goes to cache and it will return. If the cache has no data it will go to the server return and cache it. Next person asks if it will return from the cache. It can improve performance, it can reduce latency. If you set up time to live of data in cache to timeout to keep it refreshing.
Domain name System used to map IP addresses to a user friendly name. Phonebook of the internet. You can route traffic Based on geography, latency , weight etc. Key Record Types are as following:
“A Man-In-The-Middle attack is the type of attack where attackers intrude into an existing connection to intercept the exchanged data and inject false information. It involves eavesdropping on a connection and intercepting messages.” -Toolbox for IT.

Hackers can use Packet sniffing software (WIRESHARK) to intrude the connection. Get the sender and receiver server information. He can get access to the website as Alice or Bob.
At rest encrypt the disk and hence you get data encryption at rest out of the box. At transit use VPN or SSL/TLS (HTTPS = 443) to secure your data by hashing it during transit.
Asymmetric: Sender data is encrypted with key1 and the receiver side uses key2 to decrypt the data.
Symmetric: both sender and receiver use the same key to encrypt and decrypt data.
Used to scan a network, segment or host to find out the open ports. So that you can attack on those ports. Interviewer may ask if there is a linux machine and it has an application that is not working. What will you do. I will answer by saying I will first scan the network by using Nmap or wireshark to find out which ports are closed or opened etc.
Users are defined in IAM and they get assigned with roles and they have access based on the role to the protected resources. Also it does logging of each activity done by the user. Authentication & Authorization also done by IAM. Who is the user and what he is allowed to do.
Social Engineer is someone who is a master of asking seemingly non-invasive
or unimportant questions to gather information over time
Social Engineer use deception to get sensitive info from someone also s/he can combine number of techniques to gather sensitive information.
Follow Multi layer approach:
Follow Defence in Depth and secure physical to data layer.
Steps are as below:

Distributed denial of service (DDOS) is when a server is exhausted by serving large numbers malicious requests and could not serve genuine requests is called DDoS. It loses CIA principle ( Confidentiality , Integrity and Availability ). Now it is not available for genuine users. Azure DDoS protection , cloud flare , AWS shield can save you.
IDS (IIntrusion Detection System)
IPS ( Intrusion Prevention System)
Dynamic host configuration protocol (DHCP) This is a server that assigns automatically/dynamically IP to connected hosts or servers. Suppose you have 300K systems then you use DHCP. How does it work? Whenever a new system comes up. It sends a broadcast (“Hey I am new in the network I need an address” ) called DHCP discover. All the DHCP servers will respond ( called as DHCP offer ). If there are 10 DHCP servers the client will receive 10 IPs then the client has to send a DHCP request to his favorite or desired DHCP server. Then the server sends back a DHCP acknowledgement to the client.
VLAN (virtual local area network) You have 100 computers in one switch and within one subnet. Limit the finance to access the things only they need. Finance, HR, Sales, ITOps team might need access to everything. You can virtualize your switch to chop into multiple virtual logical switches. This way you can enhance security for those logical groups of computers. Cloud Architect Technical Interview (Master The Cloud Architect Interview Questions!)
4 VLAN in single switch and another 4 in other switch u run a single cable between them to establish connection. That is called VLAN Trunking? How do you do it in a private and secure manner? The trunk has a tag for a VLAN. Each VLAN will get its own IEEE 802.1Q tag.

In a cloud computing environment. On-premise to Azure cloud when you do direct connection or express route. You send data over VLAN over a Trunk. Azure takes your information and your VLAN Tag and keeps it separate from other customers’ traffic.
Hybrid Cloud architecturally speaking you have your datacenter that has servers, compute, storage, networking and security and you also have the cloud. And you have both connected to get the benefits of your current infrastructure and connect the cloud to get the agility, scaling, and resilience.
Performance: You get lower latency from your datacenter compared to the cloud. Also you get control in case the cloud is down and you have your datacenter still running.

Native Cloud has No maintenance switch, routing, cooling, heating, physical security etc. If you are a new company and you don’t have money for capex then you should use cloud. So you save money and only spend on OPEX. You get more speed and scaling, reliance.
Hackers control multiple computers and they send requests to your network and overwhelm your systems. If your system can handle 10K web requests and DDoS is giving 30K requests per system. Each of the systems had autoscaling enabled. Then automatically when the system will be over utilized (75% or more) cloud will add a new system and load balance them. So now you spawn up 10 diff systems and now you can handle 50K requests. So the DDoS attack was controlled by auto scaling.
Classful IP addressing host counts:
Classful IP addressing IP ranges:
The problem would commonly occur when an organization required more than 254 host machines and therefore would no longer fall into class C but rather class B. This means that the organization would use a class B license even though they had far less than 65,535 hosts. Therefore if an organization only required 2,500 hosts, they would be wasting about 63,000 hosts by holding a class B license which would greatly decrease the availability of IPv4 addresses unnecessarily
From <https://www.keycdn.com/support/what-is-cidr>

Classless Inter-Domain Routing (CIDR) divides the IP address in network ID and host Id. CIDR is also known as supernetting. It is a method of allocating IP address and IP routing. It replaces the old school of classful IP addressing. CIDR is based on variable-length subnet masking (VLSM). This allows it to define prefixes of arbitrary lengths making it much more efficient than the old system. CIDR IP addresses are composed of two sets of numbers. The network address is written as a prefix, like you would see a normal IP address (e.g. 192.255.255.255). The second part is the suffix which indicates how many bits are in the entire address (e.g. /12). Putting it together, a CIDR IP address would look like the following: 192.255.255.255/12. The network prefix is also specified as part of the IP address. This varies depending upon the number of bits required. Therefore, taking the example above, we can say that the first 12 bits are the network part of the address while the last 20 bits are for host addresses.
Simple Queueing System. Decouple A and B so you can scale both of them independently. It is used to decouple 2 independent components or microservices by giving reliable communication mechanisms.
Buy the biggest server to meet your busiest day. On Christmas they get 10M requests. They can buy VMs and put them in an auto scaling group to scale automatically.
However in the cloud you get an autoscaling group for EC2 instances in AWS and you have Virtual Machine Scale Set in Microsoft Azure cloud.
There you just need to define:
It is a server or a hardware that will determine which server to send traffic. To share the traffic. What if a single server failed because of load. You don’t have redundancy. For designing High Performance, High Available web applications, you need a load balancer. Load balancers increase the availability and performance of your system.
We can divide the load balancer in 2 parts: network and application load balancer.
Network Load Balancers are really fast because they work at layer -4. They are looking at TCP headers and they are pushing at your servers. So if you want high performance you need a network load balancer. Cross-Region or global load balancing.
Application Load Balancers work at layer-7 so it is a web-traffic load balancer so they enable us to manage traffic to your web application. SSL termination, cookie-based session, round robin for load-balancing traffic. If you want application intelligence and routing then use this.
If you want to route between microservices then use it.
https://dashbird.io/blog/can-api-gateway-act-load-balancer/
API Gateway offers below which ALB does not:
A firewall protects the perimeter of the edge of your network. It is a security appliance that’s basically standing guard saying you are not allowed in, you are allowed. It looks at traffic based on policy. By default it will block all the traffic from coming in. It will allow your internal traffic out on the internet and it will allow all your return traffic back through the firewall. Because Firewalls are Stateful therefore. Within perimeter if Mike wants to open google.com. Firewall is Stateful it will say okay Mike started the session, let his return traffic come back because, I know it’s destined for mike and I know it’s related to the same session where Mike requested google.com.


Saves capital cost. Costs like Workstation, firewall, load balancer, cooling, networking, power etc.
Operation cost also like : Electric bill, Network, staff
Move to the cloud, nothing to buy. You can do lift and shift and save capex. You only pay for what you use. Your Capex goes down and Opex goes up. Agility benefit, u can spawn up vms fastly.
In networking we have Cisco NetFlow. It will examine the traffic, they would cross cisco routers and you could say, hm the traffic all going from here to end point B and check for security violation. You can find areas of congestion in your network. Check any issue on network traffic and troubleshoot.
Vpc flow log gives info about traffic flow. They are excellent for any network troubleshooting especially in security.
It will tell you below things:
Something accepted by ACL but rejected by security group. If this traffic was supposed to be a web app hosted in a VM and you want to know why it got rejected by SG. Check the VPC flow logs.
Define the configuration of the server like How many cores, RAM and Storage.
Latency routing is for speed and performance, geo-location routing will also optimize the speed and performance however it will also send traffic to appropriate websites based on their locations.
Latency based routing determines the lowest latency and sends you to the web server with the lowest latency so you get the best experience
Latency based routing done by Traffic Manager/Front door
Geolocation routing looks at the source IP address and determines what is closest to you and sends them to a different destination. Example you can check IP and decide province and route to that website. For Finch province route to the French website. Route the English province to the English website. If you are dealing with a company having Multi Language websites there, use this.
AWS has the concept of a Region, which is a physical location around the world where we cluster data centers. We call each group of logical data centers an Availability Zone. Each AWS Region consists of multiple, isolated, and physically separate AZs within a geographic area.
From <https://aws.amazon.com/about-aws/global-infrastructure/regions_az/> An Availability Zone (AZ) is one or more discrete data centers with redundant power, networking, and connectivity in an AWS Region.
From <https://aws.amazon.com/about-aws/global-infrastructure/regions_az/> AWS Local Zones place compute, storage, database, and other select AWS services closer to end-users. This is for critical latency systems like Games.
From <https://aws.amazon.com/about-aws/global-infrastructure/regions_az/> Edge location is Reliable, low latency and high throughput network connectivity. Amazon CloudFront peers with thousands of Tier 1/2/3 telecom carriers globally, is well connected with all major access networks for optimal performance, and has hundreds of terabits of deployed capacity. CloudFront Edge locations are connected to the AWS Regions through the AWS network backbone - fully redundant, multiple 100GbE parallel fiber that circles the globe and links with tens of thousands of networks for improved origin fetches and dynamic content acceleration.
To deliver content to end users with lower latency, Amazon CloudFront uses a global network of 225+ Points of Presence (215+ Edge locations and 13 regional mid-tier caches) in 90 cities across 47 countries. Amazon CloudFront Edge locations are located in: North America, Europe, Asia etc.
AAA (authentication, authorization and accounting)
Who is allowed in the system, What they can do and Track what they do.
VLAN is a subnet in the cloud. Take a physical switch and virtualize them here are examples:
Take a single physical connection coming from on-premise to cloud vlan network using 802.1Q tag. With 802.1q tag aws separate your traffic from other customers for direct connection.
Amazon CloudFront is a fast content delivery network (CDN) service that securely delivers data, videos, applications, and APIs to customers globally with low latency, high transfer speeds, all within a developer-friendly environment.
From <https://aws.amazon.com/cloudfront/>
Instead of going to Amazon.com go to dns and data center. It goes to CDN and you are calling from Miami and serving the site from that location. If cdn has not site cached then it can go fastly to the datacenter and fetch the content since cdn is on aws edge location which is connected to the aws backbone network. Reducing load on web server and Transfer cost on AWS or any cloud network for other cloud service providers.
You will take an external public IP from amazon pool and assign it to EC2 instance. From EC2 now you want the default router to be the internet router. Therefore, you need an internet gateway.
Answer is /30 So I got 4 IP 2 reserved and got 2 free.
0.0.0.0 reserved for internet and 255.255.255.255 is for broadcast
IOPS (input output per seconds) determines how frequently you can read and write to the disc and how fast. IOPS is related to latency the higher the IOPS, meaning the more read/write operations per second, the lower the latency.
NVME (Non-Volatile Memory Express) is faster than SSD. Both NVME and SSD drives tend to have relatively low latency because the read/write operations are very fast or the IOPS are very fast. Magnetic drives have much higher latency and much lower IOPS. But if you put a bunch of Magnetic drives together in a RAID environment you can still get great THROUGHOUT. IOPS inversely proposal to Latency
The higher IOPS the lower latency and the latency on the network and vice versa. THROUGHPUT is the amount of stuff and data that can be moved at any one period of time.
Example: cars run 55 mph then its throughput would be whatever it could stuff in the trunk, or the boot, But if you had a Freight Train with 55 mph then you could carry a lot more stuff. And the stuff is the THROUGHPUT.
IOPS = LATENCY
THROUGHPUT = The amount of STUFF
Use case of IOPS and Throughput:
Video editors need a drive that needs high throughput because they are working with large video files but they can tolerate the latency.
A database needs extreme speed in terms of read and write operation but it is not moving large amounts of data then it needs higher IOPS.
Access Control Lists (ACL) is a Networking concept. It keeps traffic out of the subnet and Network Security Group (NSG) keeps traffic out of the Host. ACL protects the subnet and NSG protects the server. ACLs are stateless meaning it is not tracking the state of the connection. The traffic that is allowed in is not being monitored, so therefore, you don’t know a lot of return traffic. So rules in ACL have to be applied in both directions.
NSG is just like a firewall, it is stateful so you have to only enable the inbound direction. So if traffic is coming to the host then the return traffic is allowed from the same host back to the source.
ACL works at layer -3, NSG is stateful They are stateful, meaning that they allow return traffic to flow. In general allow everything in and out and block the specific one.
Stateful services keep track of sessions or transactions and react differently to the same inputs based on that history. Stateless services rely on clients to maintain sessions and center around operations that manipulate resources, rather than the state.
Redundant Array of Independent Disks (RAID) is a virtual disk technology that combines multiple physical drives into one unit.
Stripping means distributing bits in different disk and hence faster write because per disk you write very less bit and parallely you write so your write and read both are faster. Here you get speed however you don’t get Fault Tolerance one disk fails then entire data is lost.
Mirroring means duplicating means while writing you write all bits simultaneously in 2 different disks to keep redundant disk and protect from data loss. Mirroring does not slow down read write since its writing parallely in 2 disks together. However, since you are writing all bits in one disk at a time, it is slower than the Stripping technique. Here you do not get stripping technology disk speed however you get fault tolerance so if one disk failed then you still can recover your data since you had other disk available as redundant. You have to pay more for mirroring since you want to store 1 TB then you need 2TB for redundancy.
We take care of the cloud. You take care in the cloud.
AWS can manage below:

https://aws.amazon.com/compliance/shared-responsibility-model/
Follow Defense in Depth model and secure from physical to data layer.
1- MAC are open for multiple unwanted ports then block them
Server less -> enable the threat detection -> SEIM , enable data encryption at rest and over network .
| # | Plan | Cost | Speed |
|---|---|---|---|
| 1 | Manual Backup and Restore, Point in time backups into the DR region. | Cheap($) | RPO = Hours, RTO = Days. Long time to come back to service. |
| 2 | Pilot Light (RPO 1min RTO 1hr). VMs are created on the DR site and turned off. However the database in the DR site is in active mode and you write your data in DR site live. WEB and Business VMs will have applications and configuration will be copied to DR sites however they are turned off. | $$ | RPO=Minutes, RTO=Hours. |
| 3 | WARM standby(RPO 1sec, RTO 1Min). Replicate your environment but use very small instances in the DR site but place them in an auto scaling group. When DR workloads are scaled up fully then it is called HOT standby. The more scale up the RTO you get in the DR site. | $$$ | RPO = Seconds, RTO = Minutes |
| 4 | Multi Region (Multi Site) Active-Active (RPO and RTO are zero) Your workload is deployed to, and actively serving traffic from, multiple AWS Regions. This strategy requires you to synchronize data across Regions. Use DNS to route the traffic | Most Costly | RPO=0, RTO=0 |
If you need guaranty consistent latency and guaranty bandwidth use Direct connection since it is connected with direct wire. Costly option. Use the VPN because it is cheaper, works with the internet, and is flexible since everyone has the internet. You can create connections on demand. It was easy to connect to multiple remote sites. The side is you depend on internet bandwidth.
| # | Technique | Description | Speed | Maintenance |
|---|---|---|---|---|
| 1 | Full Mesh | Number of edges will be n x (n-1)/2 | FAST | High |
| 2 | VPN | Connect on-premise with site2site VPN and connect each on-premise. | Normal | Medium |
| 3 | Hub & Spoke (Cloud Hub) | Hub and spoke topology on cloud | Normal | Low |
| 4 | Transit Gateway | Managed service from cloud provider to provide transit connection among virtual networks in cloud. | FAST | High |
IPSec provides the ability to authenticate each remote end to prevent man-in-the-middle attacks. And it ensures the integrity of the data because it uses a hashing algorithm to encrypt the payload. IPSec provides Non-Repudiation means Assurance that the sender of information is provided with proof of delivery and the recipient is provided with proof of the sender’s identity, so neither can later deny having processed the information. Also it provides the tunnel for private IP addresses and private traffic and private routing information over public networks.
From <https://csrc.nist.gov/glossary/term/non_repudiation> It is a replacement of internet protocol. IPsec is a suite of protocols. IP protocol and security protocol. It encrypts the payload and keeps the header un-encrypted. It is used in VPN to create a tunnel of encryption from on-premise to cloud.
Ask the question what type of traffic is being used by your database?
If you have read traffic more then create read replicas and offload the read work to read replicas. Which will free up resources on the master database. You can further reduce the load on read replicas by adding some caching. In order to reduce write load, so you don’t have peaks and valleys you can use queuing system.
Relational DB is ACID by nature:
NoSQL are BASE by nature:
Take a bare metal server, add a hypervisor and create a virtual machine on the hypervisor.

If you need storage on a VM that does not go away with reboot, you are going to use something like block storage. If you have a static website or you want to distribute software, you are going to use something like object storage. If you are going to create data-lake , use object storage. If you need high performance storage you will use block storage. Object storage is cheap and can store large volumes of data.
Object in the object storage is consist of :

Objects can’t be modified—you have to write the object completely at once. Object storage also doesn’t work well with traditional databases, because writing objects is a slow process and writing an app to use an object storage API isn’t as simple as using file storage.
From <https://www.redhat.com/en/topics/data-storage/file-block-object-storage>
Block storage chops data into blocks—get it?—and stores them as separate pieces. Each block of data is given a unique identifier, which allows a storage system to place the smaller pieces of data wherever is most convenient. That means that some data can be stored in a Linux® environment and some can be stored in a Windows unit. It is usually deployed in storage-area network (SAN) environments and must be tied to a functioning server. Block storage can be expensive. It has limited capability to handle metadata, which means it needs to be dealt with at the application or database level—adding another thing for a developer or systems administrator to worry about. From <https://www.redhat.com/en/topics/data-storage/file-block-object-storage>

Network address translation and its really about translating one IP address to another address.
Now they could be used to connect private addresses to the internet by translating it into a public address.
Stateful means watching the state of the connection, they keep the context of the route and remember which request is initiated from which host. If you dis-allowed outbound to port 80 then automatically inbound flights are prohibited.
When you initiate a connection it goes through the firewall on the way out to the internet. The firewall looks at your connection and it tracks what you have done. Because when a response comes it will allow you to back in because it knows you initiated the connections.
Direct connection is a wired connection from your on-premise route to Cloud provider router. You can use either use your ISP or direct Microsoft to connect direct connections. If you want guaranty bandwidth, performance and latency use direct connect.
VPN is You connect to the internet on both side and then you create a tunnel and you encrypt your data over the internet. So the internet Is not private and that’s why you have to encrypt your data. When you use a VPN it is cheaper because you are not buying a direct connection. You are connecting to the internet. VPN are really simple to setup because you can basically you can create any connection to any place that has internet connectivity, which is wonderful.


In reality, no physical tunnel exists, of course; the data has to travel through the same wires as any other data passing through the public network. Rather, VPN tunneling employs the concepts known as data encapsulation and encryption to safely carry data traffic through the non-secure environment. Encapsulation insulates the packet of data from other data traveling over the same network, while encryption makes the data “invisible” (unreadable) even to surveillance agents and criminals who recognize it as encrypted information. So it’s like the data is traveling inside a tunnel. Figure 1.0 below might help you visualize the process.
You can think of VPN tunneling as similar to the process of moving physical cash from one bank location to another using an armored transport van along public highways. The cash in this instance is your data, the public highway is the non-secure public network, and the armored van is analogous to a VPN tunnel (data encapsulation and encryption).
From <https://www.vpnmentor.com/blog/ultimate-guide-to-vpn-tunneling/>
Border Gateway Protocol (BGP) is layer 4 protocol. It is an exterior gateway protocol and it works with a path vector routing protocol that operates on TCP port 179. When you connect an entity to an external entity, that’s when you use an exterior gateway. That’s why organization use BGP to connect to AWS or GCP as opposed to something like OSPF (Open Shortest Path First, small routing within campus networks) or EIGRP (enhanced interior gateway routing protocol, used in networks of large commercial companies ) https://networkjourney.com/difference-between-eigrp-ospf-vs-bgp-routing-protocols/
BGP is highly Tunable and highly scalable. For example if an internet routing table has basically 3 quarters of a million routes and BGP can easily handle that, whereas an interior gateway routing protocol could not. That’s why organizations use BGP to connect to external entities like AWS.
BGP Routing preferences sequence:
In order to select the next hop BGP checks who has the maximum weight that route it will take, next it will prefer maximum local preference, next shortest number of system hops, next lowest metric. This way it optimizes the route selection and data transfer over the internet.
It must be UDP. TCP is used for reliable transport. UDP is used for Realtime transport. Why? If I send this “Rupesh like design” via UDP and I receive “Rupesh Design” I lost like If I send this “Rupesh like design” via TCP and I receive “Rupesh Design Like” I lost, then TCP will retransmit the Like and you get the data in different order. For video streaming you do not want this behavior. All streaming things must be UDP! Because it is better, faster for these applications. There are no sliding windows. Performance is going to be what it’s going to be and there is no re-transmission on lost data.
CXO means a C-Level executive:
CXO means a C-level executive. They are extremely busy people. Because they are so busy they have an attention span of a few seconds at max. So you got to get your concept to the executive out to the point.
And you must talk about things that they care about.
The CEO is tasked with the organization’s strategy and increasing shareholder value meaning revenue growth or profitability growth.
The CFO cares about the organization’s finances. They are the gatekeeper for the organization’s money. When you are presenting to the CFO, you better be really good at basically doing some ROI (return on investment) modeling and showing that the value provided by your solution, provides greater value and savings or profitability to the company than it’s cost. You have to do that.
The CIO wants to know your technology solution is going to meet the CEO’s goals and needs. So you have to present this and it’s going to work. Now when you are dealing with the Engineers, they might need a lot of technical depth.
Presenting to the executive should be “SHORT to the POINT and the Solution”
Presenting to the engineer should be to dive deep and present how it works technically.
In most companies, the board of directors and the founders are at the top of the corporate hierarchy followed by the C-level executives namely the CEO, COO, CFO, etc. … Usually Vice Presidents (VPs) and Senior Vice Presidents (SVPs) report to C-level executives. https://resources.workable.com/hr-terms/c-level-executive
An organizational strategy is a plan that specifies how your business will allocate resources (e.g., money, labor, and inventory) to support infrastructure, production, marketing, inventory, and other business activities.
https://getsling.com/blog/organizational-strategy
A shareholder is a party that legally owns shares of a company’s stock. Shareholders who own less than 50% of a company’s stock are known as ‘minority shareholders’, whereas shareholders who own 50% or more of a company’s stock are called ‘majority shareholders’. Shareholders are owners of the company, but they are not liable for the company’s debts.
From <https://www.investopedia.com/ask/answers/08/difference-between-a-shareholder-and-a-stakeholder.asp>
From <https://sumup.co.uk/invoices/dictionary/shareholders/>
Stakeholders can be:
From <https://www.investopedia.com/ask/answers/08/difference-between-a-shareholder-and-a-stakeholder.asp> A shareholder can sell their stock and buy different stock; they do not have a long-term need for the company. Stakeholders, however, are bound to the company for a longer term and for reasons of greater need. For example, if a company is performing poorly financially, the vendors in that company’s supply chain might suffer if the company no longer uses their services. Similarly, employees of the company, who are stakeholders and rely on it for income, might lose their jobs.
Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster.
From <https://aws.amazon.com/what-is-aws/?nc1=f_cc>
Cloud computing is the on-demand delivery of IT resources over the Internet with pay-as-you-go pricing. Instead of buying, owning, and maintaining physical data centers and servers, you can access technology services, such as computing power, storage, and databases, on an as-needed basis from a cloud provider like Amazon Web Services (AWS).
From <https://aws.amazon.com/what-is-cloud-computing/>
From <https://docs.aws.amazon.com/whitepapers/latest/aws-overview/types-of-cloud-computing.html>
IaaS contains the basic building blocks for cloud IT. It typically provides access to networking features, computers (virtual or on dedicated hardware), and data storage space.
From <https://aws.amazon.com/what-is-cloud-computing/>
PaaS removes the need for you to manage underlying infrastructure (usually hardware and operating systems), and allows you to focus on the deployment and management of your applications
From <https://aws.amazon.com/what-is-cloud-computing/>
SaaS provides you with a complete product that is run and managed by the service provider.
From <https://aws.amazon.com/what-is-cloud-computing/>
From <https://docs.aws.amazon.com/whitepapers/latest/aws-overview/six-advantages-of-cloud-computing.html>
An AWS Region is a physical location in the world where we have multiple Availability Zones. Each Amazon Region is designed to be completely isolated from the other AWS Regions. This achieves the greatest possible fault tolerance and stability. AWS has 25 AWS regions with 240 countries.
Availability Zones consist of one or more discrete data centers, each with redundant power, networking, and connectivity, housed in separate facilities. These Availability Zones offer you the ability to operate production applications and databases that are more highly available, fault tolerant, and scalable than would be possible from a single data center. Each Availability Zone is designed as an independent failure zone. This means that Availability Zones are physically separated within a typical metropolitan region and are located in lower risk flood plains (specific flood zone categorization varies by AWS Region).
Network attached storage. Centralize storage device for storing data on a network. I will have multiple hard drives in a RAID configuration. Used in home and small side business. It has a NIC so that you can connect this with a switch or router to be in the network and then you can access it from laptop, desktop mobile etc. It can be accessed as a shared drive. It has a single point of failure, if power supply fail in the NAS then other devices will not able to access it.



Storage area network is special. SANs are a highly scalable, highly redundant and high speed network that stores and provides access to large amounts of data. SAN is fault tolerant since data is shared among several disk arrays. If a switch, disk array or server goes down data can still be accessed. Server accesses this data as if it was a local attached hard drive. In NAS it is recognized as a network drive. All other devices in SAN are connected to each other using fiber channel (fiber optics ) 2 -128 gbps speed. Fiber channel is very costly. The other option is iSCSI (Internet Small Computer System Interface) which is a cheaper alternative to using Fiber channel but they are not very fast. SANs are not affected by network traffic happening in LAN because SANs are not part of LAN. SANs are partitioned off, it’s basically a network all by itself. SANs are very expensive therefore, only large company, enterprises can afford this.
Some important slides from NAS vs SAN - Network Attached Storage vs Storage Area Network






Scalability is the ability of a system to increase workload by adding resources. Scale up, down, out or in. Scalability vs Elasticity in 99 seconds


Elasticity is the ability to automatically match the resources sufficient for a given workload size.Scalability vs Elasticity in 99 seconds

Application load balancer:
Network load balancer:
I will publish one more article where I will explain what are the soft skills you need to be successful in your next cloud architect interview so stay tuned.
Thanks for reading my article till end. I hope you learned something special today. If you enjoyed this article then please share to your friends and if you have suggestions or thoughts to share with me then please write in the comment box.

Basic algorithms that you must know if you want to crack your coding interview. In case you are starting to prepare for coding practice then make sure you...
Application and Service Principal Objects in Azure
Did you get a phone call from your customer saying they want to improve their application reliability while you move their workload to the cloud? If yes t...
Creating cost optimized highly scalable cloud architecture is challenging but it is possible! Using Spot Amazon Elastic Compute Cloud (Amazon EC2) instanc...
In a traditional data center you create one perimeter, secure them by installing firewall, WAF, SIEMS etc. and have 100% confidence that the data center i...
How to make sure our workload in the cloud is secure, reliable. How to monitor the cost of your cloud resources consumption? Is there any automation you can ...
EBITDA and EBIT is a very fundamental financial term that is nowadays mostly considered during the cloud adoption phase for IT companies. If your company ...
Are you attempting coding interview challenges in Javascript? Then make sure you learn below mandatory JavaScriipt apis and utilities.
Point of presence is a fundamental block of the telecommunication domain. You must be aware of this concept. If you want to system design for video conten...
Are you planning to design your next advanced distributed architecture? Make sure you are aware of the concepts such as high availability, consistency and...
Now a days distributed architecture is common. We deploy our services into many different servers to scale them up and meet our demand. However, managing ...
Do you have situations where a process is trying to use your virtual machine in the cloud and you want to protect and control the access? Do you want to u...
Azure Active Directory (AD) verifies the credentials that are username and password. It belongs to the Azure Identity Platform.
Learn more about how to use tags to organize your Azure resources and management hierarchy. Also learn the cmdlet used to fetch tags from Azure resources.
If you have any project that you want to integrate with Azure Active Directory and secure your app. Then you must try using Microsoft Authentication Libra...
Learn the failover and failback stages in Site Recovery on Azure. Learn Business Continuity and Disaster Recovery (BCDR) strategy in Azure.
Site Recovery is very critical now a days. In your own Data-center or Server disasters can happen and you must secure your site to recover from them. Use ...
Securing your workload and datacenter over the cloud is very challenging. You want your resources to be protected by both machines and users. Azure Active...
Data is very essential and now a days data is everything. So you have application in cloud and want to explore which type of data where to store in Azure....
Are you planning to migrate your on-premise data to the cloud using Azure data transfer solutions?
Learn what service from Azure you should use while creating your application in Azure. This article has quick short answer for when to use what in Azure s...
Virtualization is the single concept that now-a-days cloud service providers are using at massive scale and delivering IT technologies such as storage, co...
According to Statista.com As of 2021, around 50 percent of all corporate data is stored in the cloud. This share reached 30 percent in 2015 and has contin...
Azure Network Watcher is a monitoring service with lots of other important services for network. Most network diagnostics issues can be detected and analy...
Why do you care about encryption strategies? Well if you are planning to become system administrator or solution architect then you must know how you woul...
Do you have a lot of JavaScript projects using GitHub repositories? How are you managing dependencies among those projects? Developers might be struggling...
Are you willing to become cloud solution architect? I am going to add a few important technical questions that you must know for your next cloud solution ...
Did you know By default azure storage accounts are accessible by the public internet. How can u restrict all public traffic in to your azure storage accou...
If you want to become Cloud Security Architect you must have basics of Networking. This article will discuss all fundamental concepts of networking. Learn...
What are Azure Monitor and Application Insights? How exactly Azure Monitor work? How can you visualize Application Map with Application Insights? Learn th...
When you want to move your business to cloud the major thing to consider is storage. What kind of data you can store? What is the pricing? How can you opt...
Learn about malware, attacks to the network, social engineering attacks from scratch.
Learn how many types of monitoring services available in Azure to monitor your applications.
Azure Monitor is the central service that can help you to improve performance of your application and dependencies. In this article I will go through the ...
When I started learning Cloud being a webdev and software architect background. I came across many IT lingo, jargons, abbreviations that I did know about ...
When I started learning Azure being a webdev and software architect background. I came across many IT lingo, jargons, abbrebiations that I did know about ...
Blob Storage is helpful to upload images, videos, documents, pdfs etc. over the Azure cloud. In order to create new Azure Blob Storage. You must need to c...
Azure architects must aware of fundamentals of routing and peering. In this article we will see fundamentals as well as we will see some examples of routi...
Azure Storage account is a resource in Azure. Storage Account will give your group of services like Blob Service, File Service, Table Service, Queue Servi...
What are the two reasons that you may see the message: “There are no offers available in your region or country at this time”?
Azure VNet is the fundamental unit of networking in Azure Cloud. You must know the basics of VNet. In this article we will explore Azure VNet.
What is NAT, SNAT, DNAT etc. Why do we need them? What is the role of firewall in a Network and how firewall works with NAT, DNAT? Are you also seeking an...
What is NAT, SNAT, DNAT etc. Why do we need them? What is the role of firewall in a Network and how firewall works with NAT, DNAT? Are you also seeking an...
LRS (locally redundant storage) ZRS (zone redundant storage) GRS (geographically redundant storage) RA GRS (read-access geographically redundant storage) GZR...
A virtual private network (VPN) is a type of private interconnected network. VPNs use an encrypted tunnel within another network. I will explain what is V...
Azure Storage has no upfront cost, no termination fees and pay only for what you use. In this article you will learn about Azure storage access tiers and ...
Are you wondering how can you separately track the billing of your resources allocated in same subscription? Did you think you could save money by turning...
Azure Core Storage Services
How to manage DEV, QA and PROD environments in Azure Cloud? You end-up creating many resources and now how would you organize them for QA, DEV, UAT enviro...
Did you know you can containerize your asp.net MVC with docker application and upload to Azure Container Registry and host them using Azure Kubernetes Clu...
Understanding Core Azure Services
TCP: is a transport-layer protocol, and HTTP is an application-layer protocol that runs over TCP.
Azure portal is great while visualizing Azure log and metrics. You can see the pie chart, graph for resources like VMs etc. You can also create your custo...
In this article you will learn how you can upload a file to the server using node.js and HTML5.
Did you know you can enable web application tracing, performance check, request response time trace and exception tracing all free using Azure Application...
Are you wondering how to use ng-show in Angular 11? There is a way to achieve it by using [hidden]= “false”. However, if you are migrating large angularjs...
For entire azure resources even across subscriptions if you want to know about your billing, invoice, budget, alerts, recommendations then you must go to ...
You want to connect your Azure resources from your on-premise office machine or home laptop right? So how would you do that? Read this article. In order t...
Azure Advisor collects recommendations from all of the services within your subscription and display them in a single page. Example you can see recommenda...
Have you realized writing code that is not production ready is not good practice? Have you seen code which violates the DRY principle? Did you notice spec...
You can monitor performance and health of Virtual Machines and Virtual Machines scale sets, running processors and other resources dependencies with Azure...
Do you have node.js project that has specs and you want to make sure these specs run when you push your code to GitHub repo? Well you must setup CI in you...
I am happy that I cleared my Microsoft Azure Fundamental Certification (Az 900) Exam. This is the start of my Azure journey. In this article, I will expla...
Azure Security Center is the base infrastructure service to collect logs analyze them and generate tailored recommendations. Learn how can you review and ...
Do you have node.js project that you want to write specs using Jasmine? Are you wondering how to write specs and run all specs in your node.js project? Le...
This article will teach you the how to configure and implement diagnostics log for Azure resources. This article will help you to prepare for az-303: Mi...
Webbooks are basically user defined HTTP callbacks which are triggered by specific events. Whenever that trigger event occurs in the source site, the webh...
Azure Service Bus is a transport layer comprises of messaging entities. Learn what is Topology in messaging world and how N-Service bus makes life easy by...
Learn Merge Sorting algorithm in recursion function. In this article I will show you the execution of the recursion function for Merge Sorting.
Microsoft Azure Solutions Architect Expert is a role-based certification with a 1 year expiry.
Learn how to help your company to migrate its database workload to Microsoft Azure. How can you use Azure Cosmos DB to migrate your data to cloud and reta...
In order to become Azure Solution Architect Expert You must give AZ-303 and AZ-304 certification exams.
Can you explain concepts and terminology for the core Azure architecture components? Can you describe the benefits and usages of Azure subscriptions and m...
Do you love open-source? Do you want to make your PowerShell really powerful? Consider installing scoop and make your life simple! 😄 Learn how can scoop h...
Do you love open-source? Do you want to make your PowerShell really powerful? Consider installing scoop and make your life simple! 😄 Learn how can scoop h...
Do you want to understand binary search? Read this article, I have discussed binary search problems in JavaScript.
Did you know your company can take advantage of using many Azure cloud computing which will help your company to reduce its overall computing costs? Did y...
Do you want to build your first Angular App and deploy over cloud using GitHub Actions? How to deploy/publish Angular App to GitHub Pages automatically? D...
Microsoft offers 6 kinds of support plans. In this article lets quickly check them out.
While building/compiling angular or node application on Local Build Machine or Azure Pipelines or GitHub Workflows or Netflix or Heroku. The main issue we...
Microsoft offers 6 kinds of support plans. In this article lets quickly check them out.
Azure Information Protection (AIP) is a cloud-based solution that enables organizations to classify and protect documents and emails by applying labels.
Creating Azure Function in Csharp
Do you want to create your own custom GitHub Action? It’s very simple & really fun! In this article I will walk you through the steps to write, test, ...
Azure Load Balancer evenly distributes incoming network traffic load among backend resources or servers. It works at layer 4 (Transport Layer) of OSI (Ope...
Are you wondering how to publish Test Results over Azure CI Build while using Angular and JEST? In this article I will demonstrate nx monorepo publishing ...
Azure Information Protection (AIP) is a cloud-based solution that enables organizations to classify and protect documents and emails by applying labels.
In order to become Azure Developer Associate you must pass AZ-204 exam. If you want to become Cloud Solution Architect then consider giving Microsoft AZ-2...
Can you describe basic concepts of cloud computing? Is Azure right solution for your business needs? How can you create your Azure subscription today? I w...
Learn some important built-in very helpful methods in Powershell. It could be a quick note for you so don’t forget to bookmark this article! 🥇
Learn everything you should know about Azure Services and their concepts as a beginner.
Have you tried to host NServiceBus within Azure Functions? In this article I will teach you how can you host your first NServiceBus project within Azure F...
When I was learning Azure Infrastructure, I had big question in my mind what is subnet and why do I need Subnet in my network? If you share my question th...
When I was learning Azure Infrastructure, I had big question in my mind what is subnet and why do I need Subnet in my network? If you share my question th...
Do you prefer LINQ queries? I do because they provide a single consistent programming model across how they work with objects in application code and how ...
Are you wondering how your function app authenticate & authorize to read or write to Azure SQL table? Do you think how your web application will get p...
Are you wondering how your function app authenticate & authorize to read or write to Azure SQL table? Do you think how your web application will get p...
Do you want to create dotnet csharp console app and write CRUD ( Create, Read, Update and Delete ) operations over Azure Cosmos DB noSQL data? Read this a...
Did you know you can create and deploy Azure resources using JSON template? Did you also know that you can enforce business compliances on your resources?...
Do you want to make your PowerShell prompt colorful? Please read this article to make your PowerShell Terminal colorful and Git supported. I will use oh-m...
Did you know you can create and deploy Azure resources using JSON template? Did you also know that you can enforce business compliances on your resources?...
Do you want to learn Azure and afraid of being charged your credit card or getting big bills? Learn this article where I will explain how you can get free...
Are you wondering how to enforce business compliance to the deployed resources over Azure? Did you know you can write configuration file to deploy resourc...
Do you want to create Cosmos DB & Collection from DotNet Core Project? Read this article to create your first .net core project. And write csharp code...
Do you want to refresh AZ 304 Microsoft Azure Architect Design related random questions? This article will give you great random flashcards to remember Az...
Do you want to create your new Cosmos DB account and first database and collections right from Visual Studio Code? Read this article to learn hands on cod...
Did you know you can write a script and run from your machine to create and destroy multiple cloud infrastructures? Well yes I am not joking this is possi...
Are you using repository pattern? And want to commit multiple repository operations as a single logical transaction in Azure Cosmos DB? Read this article ...
.Net running on-process till .Net Core 3.1 & .Net isolated workers are coming on .Net 6 onwards & you can deploy Azure Function Apps in production...
Are you beginner on Azure Functions and want to learn the basics of Azure Functions? Did you know you can create Azure Functions and publish to Azure usin...
Do You want to start IT Business and you don’t have equipments? Don’t worry Azure is the solution for your business. By using Azure Compute Resources you ...
Did you know how can you protect your business against software or hardware disaster within Azure data-center? Did you also know how can you protect your ...
Are you beginner on Azure Cosmos DB and want to know what exactly is Cosmos DB? Then read this article. Azure Cosmos DB is a fully managed NoSQL database ...
Do you know in Azure Data Center you can protect your server against regular server software maintenance outages? You can also protect your VMs on Azure a...
Convert Angular service to a Message Handler. Do you want to organize your Angular code base as Service Oriented Architecture (SOA) way. And you want to c...
I have WordPress or Blogger blog and I decided to move away from WordPress and switch to Jekyll. I loved the way Jekyll is working. You can deploy Jekyll ...
Are you non-computer background student? I am a Electronics Engineering student and have been in software company and worked more than 16 years from junio...
When I started learning coding for a coding-interview for Facebook, Amazon or Google. I faced problems when I saw programmers were using terminologies lik...
Did you know how your servers are placed in Azure Data-Center? Do you understand how Azure Data Center protects your servers against software or hardware ...
Are you preparing for cloud solution architect interview then you must aware of soft skill questions. In this article I will give you questions that you m...
Learn how can you can create & host your own new Blog site for FREE. With high performance and SEO enabled using Jekyll and host them in GitHub Pages....
Are you willing to become cloud solution architect? I am going to add a few important technical questions that you must know for your next cloud solution ...
Did you know Azure DevOps Services and Azure DevOps Server are different entities? I have learned lessons while working on Azure DevOps Server 2020 on-pre...
Learn how Storage Spaces Direct provides you a Data fault tolerance at verity of levels. You don’t loose data at any stage. You get Data resiliency out of...
Do you want to show Angular Code Coverage Report in Azure CI Pipeline then read this article and follow the steps. IstanbulReporter in Karma.conf.js Go...
If you are working on nx monorepo workspace and if you have notice below error and want to fix it then read this article. “Error: A project without tags c...
Understanding Azure architecture gives you power to learn lots of higher level concepts on Azure like Virtual Machine scale sets etc. Therefore, in this a...
Do you want to schedule your Jekyll blog post to be published on GitHub Pages on future date time? Then read this article. Introduction Jekyll static s...
Do you want to restore and publish your scoped and public npm packages from Azure CI Pipeline? Do you want to Configure CI/CD for Node application with Az...
Artifacts caching does not work on-premise Azure DevOps Server 2020. The Azure DevOps documentation on Cache Action is not updated and that is misleading....
Do you want to know how to tag your git branch while building your source code when someone commits or merge to MASTER/MAIN branch? Then please read this ...
Are you wondering how to create an .npmrc file and put an authentication token from azure devOps for your team member’s development boxes? Do you have mul...
Are you using windows machine for local development? Do you have Azure DevOp’s server git repo and want to connect from local box? Then read this article....
Do you want to follow Conventional Commits and want to enforce a rule such that your team also follows it? In this article, You will learn how to enforce ...
Are you worried that new angular 10 project is not running in “IE11” even though you enable the given polyfills by angular team? Then please read this art...
Do you want to organize your CSS files in your angular app? Do you want to find out the strategy to segregate the CSS based on cross browsers and operatin...
If you are working on Nx Monorepo workspace and have many angular projects. And if you are using Azure CI/CD Pipeline then you might aware that there is no i...
If you have a blogging site using Jekyll and you want to publish your blogs to your Dev.To account? Then read this article. Jekyll Project I have my Jekyll...
So you want to learn how you will integrate CkEditor v5 in Nx Monorepo. Do you also want to learn how to create custom plugin inside CkEditor v5? Then I w...
If you want to run node.js script from azure-pipelines.yml and get the value returned from node.js script and use it in your CI next task. Then read this ...
Publish Test Results task publishes test results to Azure CI Pipelines. Step 1: Publish Unit Test Summary Report Step 1 - To generate Test Report I’m using...
Did you have requirement to update your Angular CI build number as your new Package.json version number and Branch name? Well this is a good practice to d...
Publish Code Coverage task Publishes Cobertura or JaCoCo code coverage results from your build in azure CI Pipeline. Azure DevOps provides us with the a...
Do you want to create environment level variable for your Azure Build CI Pipeline and access them in your azure pipeline task? Example: If you are using n...
Do you want to debug your NRWL/NX monorepo specs in visual studio code or right in chrome? Then this article is for you. I am going to use JEST test runne...
In my previous article “Imposing Constraints on Dependency Graph” you did learn how to isolate all projects of a folder (service A) from all of the projec...
Do you want to publish your nx monorepo app to npmjs.org? In this article, I will explain how can u publish your app to npmjs.org. Introduction In my m...
Are you using NRWL/NX monorepo in your company? and you are worried how to configure dependencies so that you can better control your projects? I use nx d...
In this article, I will explain how to know which applications or libraries are changed in your nx monorepo workspace. First time building Nx Monorepo ...
Do you want to create a new application on my nx monorepo work-space? Also do want to make sure that you should be able to build and test your application...
Do you want to create one variable in task-1 and read the value of that variable in task-2 in your azure ci pipeline? If your answer is yes then read this ar...
Protecting Master Branch from Bad Pull Requests is big challenge now a days while working in a team. You are working on git with distributed architecture. Wh...
Subscribe to email alerts to get notified for your build CI/CD in azure pipeline. It is good idea to setup subscription to get email to a group email id...
All are hosted CI/CD server supporting the build running in the build machines and deployment to target machines. Travis CI A hosted continuous int...
If you are following agile then continuous integration is must. I have setup CI/CD in Azure DevOps and I personally found my Angular build is taking lot of t...
If you want to create Build definition for Angular project in Azure DevOps, then this article is for you. Login to Dev Azure and go to the pipelines and foll...
Yaml files are used in Azure Pipelines for build and release definition. Yaml files are also used in GitHub build and release. Yaml is designed to be clean a...
In this video tutorial 0010-4 JWT authentication for distrubuted system we will learn what makes JWT authentication world’s most popular authentication type....
As we already discussed rest of the authentication types in our previous video tutorials, JWT based authentication is best among all. It is world famous and ...
In this video tutorial Cookie Based Authentication Advantage And Disadvantage | 0010-02 we will discuss about cookie based authentication. In this type of au...
Authentication is vital to most of the applications and the way it is achieved has evolved substantially in recent years. Basically there are three types of ...
About the Class Learn how to build an e-commerce online shopping responsive web application from scratch using Angular 8+, express & MongoDb comple...
Whenever somebody asks developer about difference between server side & client side coding, generally answer comes as “Anything angular or HTML code or a...
What is User Story A User Story is a note that captures what a user does or needs to do as part of her work. Each User Story consists of a short descripti...
In this video session Given When Then | Angular | BDD, we will teach you how to write unit tests in more readable fashion. Like Given When Then Style using J...
In our previous video session Add Item To Cart | Test Driven | RxJS | Demo we have already discussed Add item use case in our shopping cart project. Next in ...
In our previous demo session Creating Store Using RxJS | Angular | Demo we have written base code for our Cart Store. Now we will add methods to it, based on...
In this video session Creating Store Using RxJS | Angular | Demo we will create our Cart store and it is nothing but just a wrapper on top of state, so it be...
Till now in previous demo session Responsive Products Page | e-Commerce | Angular Material | 2 we have done loading of products with spinner, applied sorting...
In our previous demo session Responsive Products Page | e-Commerce | Angular Material | 1 we discussed how to use mat-table rather mat-cards or mat-grids in ...
In our previous demo session Pagination And Filter e-Commerce Angular App | mat-table we have covered filtering and pagination functionality in our ecommerce...
As we already fixed design and responsiveness of Login and Register pages of our ecommerce app in previous demo session Creating Responsive Login And Registe...
In our previous demo session Responsive Toolbar Online ecommerce Store Part 2 we have learnt how to create responsive toolbar with proper design. Next in thi...
In continuity to our previous demo session Responsive Toolbar Online eCommerce Store Part 1 where we made required changes to our ecommerce store to make its...
After learning error handling in our previous demo session Handling Server Side HTTP Error | 0009-27, next we will focus on creating responsive toolbar in ou...
🔥 Master the real, in-demand tech skills from home with Full Stack Master 100% online learning platform. Come out of this disaster with higher-paying,...
As we discussed in our previous video session Designing Shopping Page Using Angular Material Grid And Card | 0009-26, our web app is now growing as we are ad...
As we already discussed in our previous demo session like with growing maturity our code becomes complex and difficult to debug. Then we come up with this de...
Gradually, as our code base will grow it will become complex and we will face difficulties in debugging our code. In this session Debugging Server Side Code ...
Save the below code in bat file and execute it. It will install all the important VS Code Extensions that you need to do Angular / React or any Front End De...
While writing test in jasmine you will encounter a situation where you want to create a mock object & also you want to spy it's property. Jasmine cre...
In this video session User Login In Angular With MongoDB | Demo | 0009-23 we will login into our product Mart app through MongoDB database and we will see ho...
[iframe src="https://mailchi.mp/f98949daab5f/build-online-e-commerce-application-meanjs-full-stack-the-complete-course" width="100%" height="3500px"]
Fullstack Development Training
In this video session Saving User To MongoDB | Mongoose | Demo | 0009-22 we will explain how to save user data in mongo db and how to validate user at server...
[advanced_iframe securitykey=”” src=”https://gumroad.com/fullstackmaster/p/up-coming-full-stack-master-courses” id=”” name=”” width=”100%” height=”1500px” m...
Now in this demo session Installing And Configuring Mongodb & Mongoose | Demo | 0009-21 we will see how to install MongoDB in our machine and how to use ...
Introduction Now a days event based architecture is very popular. Writing JavaScript web application from scratch using event based architecture is a grea...
In our previous demos session we have created our server and restful API and tested API with postman also. Next we will try to integrate this Restful API in ...
In this demo session Creating Endpoint For Authentication | Express | Demo | 0009-19 we will create a restful API and will host it in Node.js using express. ...
Let’s begin this demo session 0009-18- Demo: Adding Registration and Logout feature with change in some look and feel of our user registration page, by impor...
In this demo session Creating Registration Component | Angular | Demo | 0009-17 we will first create registration component which will allow us to save user ...
In this demo session Adding Log In Component | Angular | Demo| 0009-16 we will learn to implement Login functionality in our app. With this functionality, us...
In our previous demo sessions we successfully created our Product Mart app. Now we are ready to deploy our code to so called production environment. For this...
Nowadays, we build large enterprise applications with Angular. But how to best structure such projects to ensure long-term maintainability and re-usability?...
In this demo session Integrating Toolbar | Angular CLI | Demo | 0009-13 we will see how to integrate toolbar in our angular app. In order to put toolbar in o...
This demo session Applying Card Component | Angular Material | Demo | 0009-12 talks about integrating card components from angular material so that we can p...
In this demo session Creating Product Service | Angular Service | Demo | 0009-11 we will see how to show products from JSON file in our angular project. Each...
In continuity of our demo session Creating Products Module | Lazy loaded module | Angular | 0009-09 we will see how to create Products page for our app keepi...
Let’s begin this demo session Creating Products Module | Lazy loaded module | Angular | 0009-09 by creating a home component. Command used to generate home c...
As we discussed in our last demo session Installing Angular Material Using Angular CLI | Tutorial | 0009-07 we are missing out component module installation ...
In order to install required angular material, angular team has provided six steps to follow in angular material home page. All of them are listed when we cl...
As you begin learning of coding basics, one important thing which makes your learning process easier and practical is availability of code. Most of the onlin...
So far in our angular project development from scratch we have covered two things: Environmental setup Creation of project using angular CLI An important q...
We saw in our previous session Creating Angular App using Angular CLI | 0009-03 how to do environmental set up and installation for our first angular project...
Let’s begin our Angular app development project from scratch. This article explains each step very minutely, so that you do not feel lost anywhere. It also s...
MEAN is an acronym for MongoDB, ExpressJS, AngularJS and Node.js. From client to server to database, MEAN is full stack JavaScript framework, ideal for build...
There are certain steps that we need to understand thoroughly to begin any angular project from scratch. In our previous video tutorial we already explained ...
When we talk about angular app development, most of the people get confused about its build & deployment activities. Our video tutorial Angular app Devel...
The Prototype Pattern creates new objects, but rather than creating non-initialized objects it returns objects that are initialized with values it copied fro...
In our previous video session JavaScript Concepts- Module Pattern | 0004-11 we have learnt about basics of Module Pattern. Here in this video tutorial JavaSc...
The Module Pattern is one of the most common design patterns used in JavaScript. It is easy to use and creates encapsulation of our code. Before we deep dive...
In our previous article JavaScript Concepts: What Is this Keyword | 0004-08 We read about ‘This’ concept of JavaScript which refers to calling context of the...
‘This’ keyword is widely used in almost all programming languages. Like in some programming languages This variable points to instance of an object or class....
Hoisting is another important JavaScript concept. It defines that in JS every variable gets declared at the beginning of the function. It literally means as ...
Closure is another JavaScript concept which comes in line with Scope concept. It basically comes into picture when we have nested functions. Whenever we have...
Though the concept of scope is not that easy to understand for beginners, yet we have tried to explain it in easiest way in our video tutorial JavaScript Con...
If you are planning to accelerate your career as JavaScript Professional, you must know some basic JavaScript concepts. Here in our video tutorials we have e...
In our eighth angular coding session Angular Coding Session Learn Dependency Injection | Practical | 8/8, we will see how to dynamically inject the console o...
In our sixth angular coding session Angular Coding Session Learn Dependency Injection | Practical | 6/8, we will see how to configure logger based on environ...
In our fifth angular coding session Angular Coding Session Learn Dependency Injection | Practical | 5/8 we will see how to create mini-logger by using existi...
In our fourth angular coding session Angular Coding Session Learn Dependency Injection | Practical | 4/8, we will see how to Inject Base URL from module in o...
In our third angular coding session Angular Coding Session Learn Dependency Injection | Practical | 3/8 we will see how to use http logger as a service in ou...
In our second angular coding session Angular Coding Session Learn Dependency Injection | Practical | 2/8, we will see how to use console logger as a service ...
As we know about Dependency Injection in detail like what is DI, where to use it and what is its significance? So in order to understand Dependency Injection...
Memory Issues Trouble shooting memory issues in web application is very important and it needs careful understanding of memory analysis. There are various...
A provider is an instruction to the DI system on how to obtain a value for a dependency. It is the provider that determines which instance or value should be...
As we know UseExisting provider configures the Injector to return a value of another UseExisting token. Through this provider, we can use already existing in...
Multi: true means that one provider token provides an array of elements. Using multi: true we tell Angular that the provider is a multi provider. This is use...
UseFactory provider configures the Injector to return a value by invoking a UseFactory function. It is basically a function which follows factory design patt...
UseValue provider configures the Injector to return a value for a token. It comes in that category of providers where we do not have unique thing to identify...
UseExisting provider configures the Injector to return a value of another UseExisting token. Through this provider, we can use already existing instance or o...
Class Provider configures the Injector to return an instance of useClass for a token. It is similar to type provider but it has different way of providing co...
A provider is an instruction to the DI system on how to obtain a value for a dependency. Most of the time, these dependencies are services that you create an...
There are 2 types of architectures one is Pull Based the second one is Push Based. I will explain you how can we leverage RxJS BehaviorS...
What are RxJS subjects and the benefits of using them. How to understand RxJS subjects such that you can apply it in your day to day coding at your own p...
Heroku PaaS best Cloud Platform Heroku is a cloud platform that lets you to build, deliver, monitor and scale application. Heroku is Platform as Service (Paa...
Angular 8.0.0 is here! Is there any breaking changes in Angular 8? No, Angular 8 is released now! As Angular team had promised they have not introduced break...
Introduction Welcome to step by step hands-on guide to setup webpack in your upcoming typescript project. Please follow the steps and you should be able t...
Unit Testing RxJS with Marble Diagrams Welcome to Unit Testing RxJS with Marble Diagrams course excercise material portal. Please watch Uni...
Scope of Dependency in Angular is very important concept to understand for a full stack developer. This is primarily asked question by interviewer in many di...
As we know, one must configure an injector with a provider, or it won't know how to create the dependency. The most obvious way for an injector to create an ...
A Dependency Provider configures an Injector with a DI Token, which that injector uses to provide the concrete, runtime version of a dependency value. The in...
We cannot simply ignore the shortcomings like Interface, Array (bunch of objects) cannot be used as DI Token in angular. There can be possibility where we ne...
No, we cannot do dependency injection through Interface in Typescript Angular; it can be done in C# or Java. This is very important concept need to know for ...
When we think of learning Dependency Injection in Angular, couple of questions arises like How this DI concept works in Angular? What are all the important ...
React: React is a JavaScript library for building UI components for web applications, maintained by Facebook. React Native, another popular outcome from Face...
Due to its component based architecture, angular has capability to protect our code for future. It is basically making our code future ready as each componen...
One of the main architectural principles in Angular is that an application should be composed of well encapsulated, loosely coupled components. In this sessi...
In 0008-7- angular: Hierarchical Dependency Injection video session, you will see how Angular hierarchical dependency injection system works. You will discov...
Most of the applications connect to multiple environments during their lifecycle. Environment which your application needs to connect can differ depending on...
Angular has a unique feature that makes it more popular and provides an upper hand as compare to other app building platforms like vue JS, React JS i.e. its ...
Dependency Injection Container or Injector is basically a static or global thing which is being used throughout the app to inject dependencies or objects. It...
Basically there are three types of dependency injection, Depending on the context we can choose any type which is being supported by that framework. Three ty...
Wikipedia Definition: Dependency injection is a technique whereby one object (or static method) supplies the dependencies of another object. A dependency is ...
Are you preparing for Angular interview? Not sure from where to start? Well we do have answers to all your angular related queries. We will help you to list ...
Along with choosing right template, best resume format, putting educational qualifications etc, the most important component required in an interview-winning...
Did you know you can create your own publish-subscribe library for your RxJS project? By using BehaviorSubject and filter operator it is possible to create ...
Did you know you can use RxJS simple operators and do html form validation re-actively? Well I learn RxJS operators by implementing them in real world proje...
I love to create automatic API Documentation of my project. Regardless I work on Angular, React or VueJS as far as it uses Typescript. Did you know you coul...
You might be aware of EADDRINUSE node error in node.js application. Where it says address is in use. This is very annoying. It happenes if some of the port...
I love Typescript the way it helps development speed and accuracy. I wanted to work with Typescript, Webpack and Express.JS finally came up with a project w...
Model in Domain Driven Design is a system of abstraction that eliminates things which are not required. Domain Model allows us to think about a particular do...
How to Inject Base Assets path URL dependency to webpack CSS bundle? In your JavaScript project build by webpack, if you have requirement where at the build ...
Dependency Injection In Software Engineering Dependency Injection is a technique where one object injects or passes the dependency object to other object at ...
Decorator is a concept in Typescript that can be used to annotate a class or it's members. Decorator also enables meta programming where one can collect as ...
Loading... In this article we will see how can you create your own typescript library that you can easily consume in your another typescript project. ...
RxJS Marble Diagrams are made to visualize the values emitted from the RxJS Observable over timeline.</p> Hi in this article I will explain why we need...
In this article we are going to talk about. What goals are ? How to set Goals ? What makes really good goal ? Organize your life goal Sort out your lif...
What is Scope in JavaScript Imagine Scope as a boundary within that things can be isolated. Like in your colony there are certain areas which has stuffs that...
When you create your own Typescript library then you need a barrel file where you put all of your files that you want to expose to the outside world kind of...
Eric Even wrote Domain Driven Design (DDD) book. Eric says DDD is the Philosophy of software design that helps projects dealing with complex problem. I ...
Why JavaScript I believe JavaScript is very popular language nowadays. I love JavaScript because of many reasons. Now various powerful client side framework...
How to add your own logo on README.md file Here is a simple way to create your own logo for your npm package. I hope you will enjoy this. Where to go and get...
What is GhPages Do you want to save time to create post or article while writing software code ? Or do you want to see your angular app live running in the i...
This blog post supports the sample code for the “Unit Testing RxJS with Marble Diagrams” course on Pluralsight, identifying common issues along with their so...
Hi everyone, I am very excited to announce that I became an author in Pluralsight.com and my first course on Unit Testing with RxJS Marble Diagram is going t...
Hi everyone, I started my FullstackMaster YouTube channel where I want to put some technical learning stuffs. I started putting RxJS videos over there. I hop...
Cloud itself is complex so why are customers bothering about multi-cloud at all? Why not just take google cloud and deploy all of your workload and be hap...
I recently wrote one article on JavaScript Module pattern in Code project. Please visit this website and suggest me your thoughts on it... Javascript Module ...
Today, I learned about one Excel Sheet Formula "VLOOKUP". It is very useful formula that gives us the power to search a value in a particular column. ...
I came through an open source JavaScript named as “Knockout.js”. After learning this javascript functionality and features. I found it very powerful, wh...
I took session on jQuery. It was nice experience to talk in front of my colleagues. First time I took session where some of my colleagues joined on phone als...
Suppose you are searching for a product in a shopping website and you got a big set of results. It normally comes in a grid view with a long scroll bar. Some...
My Friend was looking for one error that he was continuously getting when he was trying to setup my old version 1.0 .net code. The error message was: Th...
From last 4 days, I have been struggling on how I should load the UserControl dynamically in my default page. I know in today’s world where .Net 4.0 came up...
In order to make the application more loosely coupled we should use interfaces. In Dependency injection pattern there exist a class called as asse...
Almost 3 years ago Scottgu announced that Microsoft would begin offering product support for jQuery. Now Microsoft is playing a great role on contri...
I was trying to make my own menu widget using jQuery and I came with this below Widget. [sourcecode language="javascript"] //Menu Widget created by Rup...
In any jQuery Plugin there JavaScript local alias pattern is being used as a best practice. They have localized the global jQuery object as an alias $. ...
At the outset, I used to write programs that just work because, I had to complete and deliver the project on time.</p> I remember, when was a...
Recently, I received one question how to send the xml data from one page to another page without using any state management or caching technique of Asp...
Hi all,</p> I recently installed Internet Explorer 8 in my laptop and wondering many new features about the IE8. I was enjoying the good and...
I just read the great article Introducing "Razor" – a new view engine for ASP.NET by Scottgu. I found Razor more comfortable than the other view engines. It'...
Plethora of times it is required to show complex tool tip. Complex, I mean the tool tip that can contain images, links , text decoration etc...To show the cu...
Hi I just came across a greate website http://bililite.com/blog/understanding-jquery-ui-widgets-a-tutorial/ There I learned how to create custom jQuery widge...
There is a great article written by Douglas Crockford. I recommend everybody to read this article. By using Prototypal inheritance technique, we can create t...