What people say about my writing
“Subscribing to Arpit’s newsletter has been the most productive thing I have done in this quarantine” - Ashwani
"Your blog is awesome. I have read about some topics like Consistent Hashing and TF-IDF so many times but never really enjoyed reading them until I read the in your blog. They are so lucid and the code snippets are the unique things that stand out in your blog." - Satrap
“It is hard to know what CS topics are interesting or usefull, but your bite sized chunks of a topic make it easy to jump in and get inspired” - Lucas Scott
This newsletter is penned by Arpit Bhayani, a Computer Science Engineer who has most recently spent 6 years building scalable distributed systems and search engines at Amazon, Practo, and Unacademy. It features an essay about programming languages internals, or a deep dive on some super-clever algorithm, or just a few tips on building highly scalable distributed systems.
The topics covered are
Language Internals that would help you understand the working of a certain aspect of a programming language.
Algorithms that would make you go “Ahhh … that was clever!”.
System Design that could potentially help you build the next big technological marvel.
Check out some of my writing from the past
How python implements super long integers?
Python must be doing something beautiful internally to support super long integers and today we find out what's under the hood. The essay goes in-depth to explain design, storage, and operations on super long integers as implemented by Python.
Isolation Forest algorithm for anomaly detection
Anomaly detection is an age-old problem and in this essay, we dive deep into an unsupervised algorithm, Isolation Forest, that beautifully exploits the characteristics of anomalies. Instead of profiling normal points and labeling others as anomalies, the algorithm is actually is tuned to detect anomalies.
Everything that you need to know about Image Steganography
Steganography has been around since at least 440 BCE but with the rise of computers, the techniques have evolved to handle digital data. In this essay, we see the science behind image steganography, how it exploits various properties of images to hide secrets and walkthrough a few techniques in detail.
Designing a sliding window-based rate limiter
A rate limiter is used to control the rate of traffic sent or received on the network and in this essay we dive deep and design a sliding window-based rate limiter.
Follow me on Twitter at @arpit_bhayani.
What to expect from this Newsletter?
🔥 Once a week, in your inbox, an essay about programming languages internals, or a deep dive on some super-clever algorithm, or just a few tips on building highly scalable distributed systems.
You won’t have to worry about missing anything. Every new edition of the newsletter goes directly to your inbox. No spams, I promise.