Level Up Coding System Design Newsletter
Subscribe
Sign in
Home
Latest
Top
Discussions
REST APIs Properly Explained
(4 minutes) | Constraints, trade-offs, when not to use it, and more
Mar 31
•
Nikki Siapno
34
1
3
How SSO Actually Works
(5 minutes) | What actually happens when you click “Sign in with Google”
Mar 28
•
Nikki Siapno
33
1
2
Hashing vs Encryption vs Tokenization
(5 minutes) | One question decides which one you should use...
Mar 24
•
Nikki Siapno
32
3
5
Sync vs Async Clearly Explained
(5 minutes) | One design choice determines if your system blocks or flows.
Mar 21
•
Nikki Siapno
31
3
2
Why “Hash the Password” Isn’t Enough
(5 minutes) | How salts, key stretching, and memory-hard algorithms stop brute-force attacks.
Mar 16
•
Nikki Siapno
26
2
CAP Theorem Clearly Explained
(4 minutes) | Choosing your failure mode, avoiding common mistakes, and a decision checklist.
Mar 13
•
Nikki Siapno
31
1
7
Event-Driven Architecture Clearly Explained
(4 minutes) | When fan-out is power, and when it becomes operational debt.
Mar 3
•
Nikki Siapno
51
9
February 2026
What Protocols Actually Do When You Load a Page
(7 minutes) | Every layer has a defined responsibility. Learn how to trace failures precisely.
Feb 27
•
Nikki Siapno
32
1
Forward Proxy vs Reverse Proxy: A Clean Mental Model
(3 minutes) | They both relay traffic. But they solve completely different problems.
Feb 25
•
Nikki Siapno
30
1
3
Domain-Driven Design, Broken Down
(5 minutes) | How DDD prevents your model from collapsing as systems and teams scale
Feb 21
•
Nikki Siapno
36
3
7
Bloom Filters Clearly Explained
(5 minutes) | Most systems waste time proving what isn’t there. Bloom filters make “no” almost free.
Feb 14
•
Nikki Siapno
28
2
3
Database Types Clearly Explained
(7 minutes) | It’s not the schema. It’s the question you optimize for.
Feb 6
•
Nikki Siapno
35
5
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts