Functional Programming in Scala - Day 3
Read from section 2.5.2 to end of chapter 2. Summary Section 2.5.2 Calling HOFs with anonymous functions This section was just going over what anonymous functions are in Scala. An example of an ...
Read from section 2.5.2 to end of chapter 2. Summary Section 2.5.2 Calling HOFs with anonymous functions This section was just going over what anonymous functions are in Scala. An example of an ...
Read from start of Section 2.5 to section 2.5.1 Summary What are polymorphic functions? Section 2.5 goes deeper into what polymorphic functions are. These functions are essentially functions that...
Summary Skimmed Chapter 1 and read until Chapter 2, section 2.4.2 I’ve been looking for something to learn that would help with my practical engineering skills for a while now. That was when I...
Notes Chapter 1: Scale from Zero to Millions of Users This is the chapter where we will design a system that supports a single user and gradually scale it up to serve millions of users. I thin...
Read up to right before “Processing Data with Apache Flink” Summary I think reading the “Kafka as the Ingestion Backbone” section brought more questions than answers. The fundamental issue with m...
This is my commentary on Netflix’s blog article “How and Why Netflix Built a Real-Time Distributed Graph: Part 1 — Ingesting and Processing Data Streams at Internet Scale” Read until “Kafka as th...
Read until page 32 Overview I think DDIA’s first chapter is very boring as a whole. I couldn’t seem to grasp the overall direction that the first chapter is trying to go in, which makes me lose si...
Motivation I had finally taken a long break from work after 2 long years. It was my first time taking time off for longer than 2 days, and it was a nice break to reset and to really think more abou...
Link to problem: https://leetcode.com/problems/special-binary-string/description/ Problem Special binary strings are binary strings with the following two properties: The number of 0’s is equ...