Latest episodes

#36: Microservices architecture: principles and how to break them
Around IT In 256 Seconds,
#35: Reactive programming: from spreadsheets to modern web frameworks
Around IT In 256 Seconds,
#34: SQL joins
Around IT In 256 Seconds,
#33: OAuth 2.0
Around IT In 256 Seconds,
#32: (Cryptographic) hash function
Around IT In 256 Seconds,
#31: Redis
Around IT In 256 Seconds,
#30: Linear Regression
Around IT In 256 Seconds,
#29: Time synchronization
Around IT In 256 Seconds,
#28: Event sourcing
Around IT In 256 Seconds,
#27: Proof-of-work algorithm in blockchain
Around IT In 256 Seconds,
#26: Blockchain
Around IT In 256 Seconds,
#25: High-frequency trading
Around IT In 256 Seconds,
#24: Service discovery
Around IT In 256 Seconds,
#23: Garbage collection
Around IT In 256 Seconds,
#22: Moore's Law
Around IT In 256 Seconds,
#21: SSE and WebSockets
Around IT In 256 Seconds,
#20: Chaos engineering
Around IT In 256 Seconds,
#19: GraalVM
Around IT In 256 Seconds,
#18: JIT - Just-in-time compilation
Around IT In 256 Seconds,
#17: BPM: Business process modeling
Around IT In 256 Seconds,
#16: Akka
Around IT In 256 Seconds,
#15: Mutation testing
Around IT In 256 Seconds,
#14: Static, Dynamic, Strong and Weak Type Systems
Around IT In 256 Seconds,
#13: Cassandra
Around IT In 256 Seconds,
#12: Continuous integration, delivery and deployment
Around IT In 256 Seconds,
#11: MapReduce
Around IT In 256 Seconds,
#10: HTTP protocol
Around IT In 256 Seconds,
#9: Retrying failures
Around IT In 256 Seconds,
#8: Kafka's design
Around IT In 256 Seconds,