"Clarification questions
What is the purpose of connecting the DB?
Do we expect high-volumes of traffic to hit the DB
Do we have scalability or reliability concerns?
Format
Code -> DB
Code -> Cache -> DB
API -> Cache -> DB - APIs are built for a purpose and have a specified protocol (GET, POST, DELETE) to speak to the DB. APIs can also use a contract to retrieve information from a DB much faster than code.
Load balanced APIs -> Cache -> DB
**Aut"
Aaron W. - "Clarification questions
What is the purpose of connecting the DB?
Do we expect high-volumes of traffic to hit the DB
Do we have scalability or reliability concerns?
Format
Code -> DB
Code -> Cache -> DB
API -> Cache -> DB - APIs are built for a purpose and have a specified protocol (GET, POST, DELETE) to speak to the DB. APIs can also use a contract to retrieve information from a DB much faster than code.
Load balanced APIs -> Cache -> DB
**Aut"See full answer
"You might build a product like this a few ways. I think you'd definitely want a temperature sensor device (maybe like a TMP422, or maybe there's a different one that is standard for wearables) that was worn by the individual. As far as tracking social distance, my answer here is more dependent on the state of the art of robust (wearable) distance measurement. Maybe there's something available better than ultrasonic sensors, maybe there's some kind of electromagnetism based solution that isn't in"
Ian R. - "You might build a product like this a few ways. I think you'd definitely want a temperature sensor device (maybe like a TMP422, or maybe there's a different one that is standard for wearables) that was worn by the individual. As far as tracking social distance, my answer here is more dependent on the state of the art of robust (wearable) distance measurement. Maybe there's something available better than ultrasonic sensors, maybe there's some kind of electromagnetism based solution that isn't in"See full answer
"Aim of compression is to reduce the file size and bandwidth consumed in transmission in order to preserve the quality of the image or text as experienced by the consumer/user.
Text compression typically uses a library to act as a key for words, either words that repeat in the same document or words that are commonly presented in all documents. And maybe even word parts.
Key points are that 1. it tends not to be lossy, 2. is simple/fast/consumes relatively little memory, 3. is pretty standard"
Raymond W. - "Aim of compression is to reduce the file size and bandwidth consumed in transmission in order to preserve the quality of the image or text as experienced by the consumer/user.
Text compression typically uses a library to act as a key for words, either words that repeat in the same document or words that are commonly presented in all documents. And maybe even word parts.
Key points are that 1. it tends not to be lossy, 2. is simple/fast/consumes relatively little memory, 3. is pretty standard"See full answer
"Use a mapping to store number characters to possible meaning, iterate through the numeronym matching all digits with their representation"
Anonymous Bobcat - "Use a mapping to store number characters to possible meaning, iterate through the numeronym matching all digits with their representation"See full answer
"Started with user-groups to identify the differences world wide: speed of internet, how high end devices are
The interviewer just wanted to dive into the questions of latency & the technical fast.
I then said let's separate out server vs client. On server side, cannot have australian users hitting california servers for data. So must be some sort of global availability of caching. And ensure rapid read out of that cache so something like a redis solution would help.
Then switch gears to cli"
Sim S. - "Started with user-groups to identify the differences world wide: speed of internet, how high end devices are
The interviewer just wanted to dive into the questions of latency & the technical fast.
I then said let's separate out server vs client. On server side, cannot have australian users hitting california servers for data. So must be some sort of global availability of caching. And ensure rapid read out of that cache so something like a redis solution would help.
Then switch gears to cli"See full answer
"As engineering managers, it’s our obligation to prioritize and manage technical debt properly. However, achieving the correct mix between reducing technical debt and providing new features while meeting deadlines can be fairly tough.To manage technical debt efficiently, it’s vital to first understand how to detect it inside your projects. One way to do this is by doing regular code reviews and encouraging your team to share any concerns or areas where they feel the codebase may be improved. This"
Scott S. - "As engineering managers, it’s our obligation to prioritize and manage technical debt properly. However, achieving the correct mix between reducing technical debt and providing new features while meeting deadlines can be fairly tough.To manage technical debt efficiently, it’s vital to first understand how to detect it inside your projects. One way to do this is by doing regular code reviews and encouraging your team to share any concerns or areas where they feel the codebase may be improved. This"See full answer
"These works often aren't comparable, so that I'd use a balanced portfolio of 20%-30% engineering needs and 70%-80% user needs to satisfy both sides. However, this is only a starting point, if engineering requests more than this baseline then I would use ROI to prioritize."
Coco H. - "These works often aren't comparable, so that I'd use a balanced portfolio of 20%-30% engineering needs and 70%-80% user needs to satisfy both sides. However, this is only a starting point, if engineering requests more than this baseline then I would use ROI to prioritize."See full answer
"Before we jump into discussion , few Qs which come to my mind in order to narrow the scope are:
What kind of security system we are thinking .
What do we want to achieve? Is there any biz goal in mind. What security related pain points are we trying to solve.
What is the kind of hotel - is it a vacation rental , standalone hotel, highway motel, big chain resorts?
What are the current systems being used. I think most of hotels have closed circuit cameras , fire alarms installed in"
Samarth S. - "Before we jump into discussion , few Qs which come to my mind in order to narrow the scope are:
What kind of security system we are thinking .
What do we want to achieve? Is there any biz goal in mind. What security related pain points are we trying to solve.
What is the kind of hotel - is it a vacation rental , standalone hotel, highway motel, big chain resorts?
What are the current systems being used. I think most of hotels have closed circuit cameras , fire alarms installed in"See full answer
"Below are few key things enterprises look for in a data center :
Location
Proximity to target user base
Potential risk exposure due to natural calamities (hurricane, storms, tornedos etc)
Real estate cost (Service cost will also be proportional to how expensive it is to acquire and run data center)
Security
Physical security
Logical security (Segregation)
Industry standard compliance
PCI DSS
ISO etc
Ability to support HA and DR requir"
Hmm T. - "Below are few key things enterprises look for in a data center :
Location
Proximity to target user base
Potential risk exposure due to natural calamities (hurricane, storms, tornedos etc)
Real estate cost (Service cost will also be proportional to how expensive it is to acquire and run data center)
Security
Physical security
Logical security (Segregation)
Industry standard compliance
PCI DSS
ISO etc
Ability to support HA and DR requir"See full answer
"Assumptions & Clarifications
Users have access to all Google Workspace applications like Google Drive, Gmail and the same photo editing tool - let us call this tool - Google Photo Editor (GPhoto).
Users can share the images like Google Docs - giving people read-only, read-write / edit access
Goals
Google's vision is to organize the world's information and make it accessible. GPhoto's mission / goal is to organize the world’s photo and make it accessible to others to view, edit or"
Karthik M. - "Assumptions & Clarifications
Users have access to all Google Workspace applications like Google Drive, Gmail and the same photo editing tool - let us call this tool - Google Photo Editor (GPhoto).
Users can share the images like Google Docs - giving people read-only, read-write / edit access
Goals
Google's vision is to organize the world's information and make it accessible. GPhoto's mission / goal is to organize the world’s photo and make it accessible to others to view, edit or"See full answer
"TCP and UDP are ways in which data is transferred over the internet. TCP needs to have a connection between the two hosts in order for data to be transferred, while UDP begin the transfer without waiting for a connection between the two hosts.
This makes UDP faster, but not as reliable as TCP because there is a chance the data transfer wont happen in UDP due to the uncertainty of the connection.
TCP is used where reliable data transfer is crucial e.g file transfers, email, web browsing
and UDP"
Musonda C. - "TCP and UDP are ways in which data is transferred over the internet. TCP needs to have a connection between the two hosts in order for data to be transferred, while UDP begin the transfer without waiting for a connection between the two hosts.
This makes UDP faster, but not as reliable as TCP because there is a chance the data transfer wont happen in UDP due to the uncertainty of the connection.
TCP is used where reliable data transfer is crucial e.g file transfers, email, web browsing
and UDP"See full answer