mbarkt3sto.hashnode.devDistributed Systems: CAP TheoremIn modern software architecture, distributed systems are no longer optional—they are the default. Cloud platforms, microservices, global applications, and high-traffic systems all rely on multiple machines working together.This is where the CAP Theor...Jan 13·4 min read
mbvrk.hashnode.devDistributed Systems: CAP TheoremIntroduction In modern software architecture, distributed systems are no longer optional—they are the default. Cloud platforms, microservices, global applications, and high-traffic systems all rely on multiple machines working together.This is where ...Dec 30, 2025·4 min read
mbarkt3sto.hashnode.devIdempotency in Software EngineeringWhat Is Idempotency? In software engineering, an idempotent operation is one that can be executed multiple times and always produce the same result. Think of it as operational repeatability without side effects. Simple real-life analogy Imagine press...Nov 17, 2025·8 min read
mbarkt3sto.hashnode.devCryptography: Vigenère CipherThe Vigenère Cipher is a classical encryption technique that extends the Caesar Cipher by using a key to shift letters in a cyclic manner. Unlike the Caesar Cipher, which uses a single shift value, the Vigenère Cipher applies multiple shifts based on...Feb 14, 2025·3 min read
mbarkt3sto.hashnode.devCryptography: Caesar CipherThe Caesar Cipher is one of the simplest and most widely known encryption techniques. Named after Julius Caesar, who reportedly used it to protect military messages, this cipher works by shifting the letters in the plaintext by a fixed number of plac...Feb 14, 2025·4 min read