EP97: 10 Good Coding Principles to Improve Code Quality

This week’s system design refresher:


ScyllaDB Summit | Feb 14-15 | Free + Virtual (Sponsored)

Join thousands of your peers for an unprecedented opportunity to learn from experts at Discord, Disney, Expedia, Zee, ShareChat, Paramount & more – for free, from anywhere. 

30+ talks on NoSQL, Kafka, Kubernetes, and AI/ML system architectures and best practices, plus interactive hands-on training. 

Discord Keynote: Everything's great until the database is down. Bo Ingram, staff engineer at Discord and author of ScyllaDB in Action, shares lessons from their  database outage so that you can learn from their mistakes.

Book Bonus: Register this week to get Database Performance at Scale and an early access copy of ScyllaDB in Action.

GET YOUR FREE TICKET


How Disney Hotstar Captures One Billion Emojis!

Subscribe to our YouTube Channel Now


10 Good Coding Principles to improve code quality

Software development requires good system designs and coding standards. We list 10 good coding principles in the diagram below.

Over to you: which one do you prefer, and with which one do you disagree?


Latest articles

If you’re not a paid subscriber, here’s what you missed this month.

  1. Good Code vs. Bad Code

  2. Mastering Design Principles - SOLID

  3. A Crash Course in Networking

  4. Netflix: What Happens When You Press Play - Part 2

  5. Netflix: What Happens When You Press Play?

To receive all the full articles and support ByteByteGo, consider subscribing:

Subscribe now


Top Network Security Cheatsheet

The diagram below shows some possible network attacks in 7 OSI model layers.

Over to you - What did we miss?


How does a VPN work?

This diagram below shows how we access the internet with and without VPNs.

A VPN, or Virtual Private Network, is a technology that creates a secure, encrypted connection over a less secure network, such as the public internet. The primary purpose of a VPN is to provide privacy and security to data and communications.

A VPN acts as a tunnel through which the encrypted data goes from one location to another. Any external party cannot see the data transferring.

A VPN works in 4 steps:

Advantages of a VPN:

Disadvantages of a VPN:


What is a cookie?

Imagine Bob goes to a coffee shop for the first time, orders a medium-sized espresso with two sugars. The cashier records Bob’s identity and preferences on a card and hands it over to Bob with a cup of coffee.

The next time Bob goes to the cafe, he shows the cashier the preference card. The cashier immediately knows who the customer is and what kind of coffee he likes.

A cookie acts as the preference card. When we log in to a website, the server issues a cookie to us with a small amount of data. The cookie is stored on the client side, so the next time we send a request to the server with the cookie, the server knows our identity and preferences immediately without looking into the database.