"While all branches should ideally be tested, some are more critical than others based on the following factors:
A. High-Risk or Business-Critical Logic
Branches that handle authentication & authorization
(e.g., login, role-based access control)
Financial transactions or payment processing logic
(e.g., tax calculations, refunds, invoice generation)
Security-related branches
(e.g., encryption/decryption, token verification)
B. Error Handling & Exception Paths
Branches that deal with error conditi"
Adesegun K. - "While all branches should ideally be tested, some are more critical than others based on the following factors:
A. High-Risk or Business-Critical Logic
Branches that handle authentication & authorization
(e.g., login, role-based access control)
Financial transactions or payment processing logic
(e.g., tax calculations, refunds, invoice generation)
Security-related branches
(e.g., encryption/decryption, token verification)
B. Error Handling & Exception Paths
Branches that deal with error conditi"See full answer
"Control plane has few component, it's like the brain of the cluster, the data plane is the work horse, CP has etcd, api-server, DP has kublet and kube-proxy"
Hyder A. - "Control plane has few component, it's like the brain of the cluster, the data plane is the work horse, CP has etcd, api-server, DP has kublet and kube-proxy"See full answer
"The real discussion was very much similar o what exposed at https://www.tryexponent.com/courses/software-engineering/system-design/design-rate-limiter, but - as I commented the video - the real interviewer wasn't so naive to do not forgive the client identification only because IP. I had to introduce glimpses of https://en.wikipedia.org/wiki/Knowyourcustomer practice, I quoted JWT. I proposed a logical map of id addressing a "deque" of time-stamps of requests, with a threshold for the deque an"
Luca D. - "The real discussion was very much similar o what exposed at https://www.tryexponent.com/courses/software-engineering/system-design/design-rate-limiter, but - as I commented the video - the real interviewer wasn't so naive to do not forgive the client identification only because IP. I had to introduce glimpses of https://en.wikipedia.org/wiki/Knowyourcustomer practice, I quoted JWT. I proposed a logical map of id addressing a "deque" of time-stamps of requests, with a threshold for the deque an"See full answer
"I studied Exponent's TinyURL system design video. My interviewer was asking many detailed questions on API design, schema, as well as data required to store. I found system design questions are bit high level instead of depth. I think should have detail design of API, schema and some additional flavors."
Yag S. - "I studied Exponent's TinyURL system design video. My interviewer was asking many detailed questions on API design, schema, as well as data required to store. I found system design questions are bit high level instead of depth. I think should have detail design of API, schema and some additional flavors."See full answer
"using a relational database isn't a good choice for this system! we need more availability here than consistency (CAP theorem)"
Anonymous Capybara - "using a relational database isn't a good choice for this system! we need more availability here than consistency (CAP theorem)"See full answer
"I understand this is more focused on ML. However, I have a system question. If users allow us to access their location, or they send location via text box, could we use CDNs for the search without hitting our database? We only query the database when we have zero information on location. Other questions: does embedding always guarantee information on location? Do we discharge the user images after we return a prediction? I heard the feedback that we should keep it for future learning. What would"
Bini T. - "I understand this is more focused on ML. However, I have a system question. If users allow us to access their location, or they send location via text box, could we use CDNs for the search without hitting our database? We only query the database when we have zero information on location. Other questions: does embedding always guarantee information on location? Do we discharge the user images after we return a prediction? I heard the feedback that we should keep it for future learning. What would"See full answer
"I tried solving this question and here is the recorded video for the entire solution - https://youtu.be/G_LIbTp58XA
Feel free to comment here or on the video for further discussion."
Rjj - "I tried solving this question and here is the recorded video for the entire solution - https://youtu.be/G_LIbTp58XA
Feel free to comment here or on the video for further discussion."See full answer
"TCP server/client to facilitate high throughput of incoming metrics.(This is the standard used in the industry by Datadog etc).
NoSQL or timeseries database for storing metrics. Timeseries databases are better for aggregating metrics in a given time period.
REST API for serving metrics data to visualization frontend."
Abhi R. - "TCP server/client to facilitate high throughput of incoming metrics.(This is the standard used in the industry by Datadog etc).
NoSQL or timeseries database for storing metrics. Timeseries databases are better for aggregating metrics in a given time period.
REST API for serving metrics data to visualization frontend."See full answer
"Functional Requirement
Monitor health, metrics
Alert in case of failure/anomaly
Visualize the live health
Analyse machines on periodic basis
Non Functional
Should not exert load on machines
low latency
Highly scalable
Logs/Metrics Gathering
push - machine gather and send to system and low priority background thread along with batching
pull - heart beat check (for offline machines)
Processing
Real time streaming using Kafka/kinesis + Flink
TimeSeries database for stor"
Sourabh G. - "Functional Requirement
Monitor health, metrics
Alert in case of failure/anomaly
Visualize the live health
Analyse machines on periodic basis
Non Functional
Should not exert load on machines
low latency
Highly scalable
Logs/Metrics Gathering
push - machine gather and send to system and low priority background thread along with batching
pull - heart beat check (for offline machines)
Processing
Real time streaming using Kafka/kinesis + Flink
TimeSeries database for stor"See full answer
"Microservices are small parts of a application we can deploy them seprately and use them as a application feature."
Anonymous Salamander - "Microservices are small parts of a application we can deploy them seprately and use them as a application feature."See full answer
"The interviewer focused on the data models and steered the conversation there from the beginning. He had a specific design in mind and I just wasn't hitting it. He also wanted details on how I would implement the logic for splitting users into variants. I would recommend reading the LinkedIn blog on their AB Test system design."
Anonymous Kingfisher - "The interviewer focused on the data models and steered the conversation there from the beginning. He had a specific design in mind and I just wasn't hitting it. He also wanted details on how I would implement the logic for splitting users into variants. I would recommend reading the LinkedIn blog on their AB Test system design."See full answer
"A load balancer accepts requests from clients (e.g. web browsers on the Internet) and backend services (e.g. a web server). Load balancers are useful for replicating backend services onto multiple machines to meet increased demand.
The design of a load balancer should address the following questions:
What protocols should be supported?
IP allows computers to communicate using packets, similarly to how people send letters. IP packets are addressed using an IP address and port number.
"
Anonymous Hyena - "A load balancer accepts requests from clients (e.g. web browsers on the Internet) and backend services (e.g. a web server). Load balancers are useful for replicating backend services onto multiple machines to meet increased demand.
The design of a load balancer should address the following questions:
What protocols should be supported?
IP allows computers to communicate using packets, similarly to how people send letters. IP packets are addressed using an IP address and port number.
"See full answer