Latest episodes
 
        #36: Microservices architecture: principles and how to break them
Around IT In 256 Seconds, 
        #35: Reactive programming: from spreadsheets to modern web frameworks
Around IT In 256 Seconds, 
        #34: SQL joins
Around IT In 256 Seconds, 
        #33: OAuth 2.0
Around IT In 256 Seconds, 
        #32: (Cryptographic) hash function
Around IT In 256 Seconds, 
        #31: Redis
Around IT In 256 Seconds, 
        #30: Linear Regression
Around IT In 256 Seconds, 
        #29: Time synchronization
Around IT In 256 Seconds, 
        #28: Event sourcing
Around IT In 256 Seconds, 
        #27: Proof-of-work algorithm in blockchain
Around IT In 256 Seconds, 
        #26: Blockchain
Around IT In 256 Seconds, 
        #25: High-frequency trading
Around IT In 256 Seconds, 
        #24: Service discovery
Around IT In 256 Seconds, 
        #23: Garbage collection
Around IT In 256 Seconds, 
        #22: Moore's Law
Around IT In 256 Seconds, 
        #21: SSE and WebSockets
Around IT In 256 Seconds, 
        #20: Chaos engineering
Around IT In 256 Seconds, 
        #19: GraalVM
Around IT In 256 Seconds, 
        #18: JIT - Just-in-time compilation
Around IT In 256 Seconds, 
        #17: BPM: Business process modeling
Around IT In 256 Seconds, 
        #16: Akka
Around IT In 256 Seconds, 
        #15: Mutation testing
Around IT In 256 Seconds, 
        #14: Static, Dynamic, Strong and Weak Type Systems
Around IT In 256 Seconds, 
        #13: Cassandra
Around IT In 256 Seconds, 
        #12: Continuous integration, delivery and deployment
Around IT In 256 Seconds, 
        #11: MapReduce
Around IT In 256 Seconds, 
        #10: HTTP protocol
Around IT In 256 Seconds, 
        #9: Retrying failures
Around IT In 256 Seconds, 
        #8: Kafka's design
Around IT In 256 Seconds, 
         
 
        