TorBT - Torrents and Magnet Links Search Engine
[pluralsight-training.net] The Elements of Distributed Architecture
- Date: 2025-11-12
- Size: 361 MB
- Files: 111
File Name
Size
05-failure-management/06-idempotency.wmv
11 MB
04-presentation-and-processing/15-generalized-processing-patterns.wmv
10 MB
05-failure-management/09-strategies-consider-agree-execute.wmv
7.9 MB
05-failure-management/04-intermittent-failures.wmv
7.9 MB
04-presentation-and-processing/05-distributed-patterns.wmv
7.3 MB
05-failure-management/02-failure-types.wmv
6.7 MB
01-intro/15-affinity.wmv
6.7 MB
05-failure-management/12-the-cap-theorem.wmv
6.6 MB
02-information/07-fresh-stale-historic.wmv
6.5 MB
06-protection/06-establishing-proof-of-identity.wmv
6.3 MB
04-presentation-and-processing/04-milti-tier-ux.wmv
6.0 MB
04-presentation-and-processing/14-io-threading.wmv
6.0 MB
06-protection/10-eavesdropping-and-encryption.wmv
5.8 MB
05-failure-management/13-acid-vs-base.wmv
5.6 MB
05-failure-management/03-hard-failures.wmv
5.4 MB
06-protection/13-secure-development-principles.wmv
5.3 MB
02-information/11-partitioning.wmv
5.1 MB
03-communication/07-layers.wmv
5.0 MB
05-failure-management/10-coordinators.wmv
4.9 MB
06-protection/11-tampering-and-digital-signature.wmv
4.8 MB
06-protection/09-access-control.wmv
4.7 MB
03-communication/11-congestion-control.wmv
4.7 MB
06-protection/07-who-to-prove-to.wmv
4.7 MB
02-information/02-events-and-state.wmv
4.6 MB
01-intro/14-latency.wmv
4.6 MB
01-intro/03-architecture.wmv
4.6 MB
04-presentation-and-processing/13-workflow-threading.wmv
4.5 MB
06-protection/16-idiots.wmv
4.3 MB
04-presentation-and-processing/02-interaction.wmv
4.3 MB
04-presentation-and-processing/03-the-role-of-the-host.wmv
4.2 MB
03-communication/09-network-and-transport.wmv
4.1 MB
02-information/08-independent-dependent-related.wmv
4.1 MB
04-presentation-and-processing/10-processes-and-threads.wmv
4.1 MB
02-information/04-events-vs-state-vs-data-value.wmv
3.9 MB
05-failure-management/01-intro.wmv
3.9 MB
02-information/12-fan-out-queries.wmv
3.8 MB
02-information/16-group-resource-calendar.wmv
3.8 MB
06-protection/15-hard-failures.wmv
3.7 MB
05-failure-management/08-strategies-try-catch.wmv
3.7 MB
04-presentation-and-processing/01-intro.wmv
3.7 MB
04-presentation-and-processing/11-scheduling.wmv
3.6 MB
04-presentation-and-processing/09-stateful-vs-stateless.wmv
3.5 MB
06-protection/04-identity-theft-and-forgery.wmv
3.3 MB
01-intro/10-failure-management.wmv
3.3 MB
02-information/03-events-vs-state.wmv
3.2 MB
01-intro/18-conclusion.wmv
3.2 MB
05-failure-management/11-acid.wmv
3.2 MB
04-presentation-and-processing/06-distributed-experiences.wmv
3.2 MB
05-failure-management/07-strategies-do-do-do-undo.wmv
3.1 MB
03-communication/03-asynchronous-communication.wmv
3.0 MB
05-failure-management/15-summary.wmv
2.9 MB
02-information/15-personal-address-book.wmv
2.9 MB
02-information/06-private-personal-shared.wmv
2.9 MB
02-information/10-small-large-huge.wmv
2.9 MB
06-protection/12-vulnerabilities.wmv
2.9 MB
04-presentation-and-processing/12-ux-threading.wmv
2.8 MB
02-information/09-owned-foreign-associated.wmv
2.8 MB
04-presentation-and-processing/16-distributed-systems-concepts.wmv
2.7 MB
01-intro/09-processing.wmv
2.6 MB
06-protection/05-establishing-identity.wmv
2.6 MB
03-communication/04-synchronous-vs-asynchronous.wmv
2.4 MB
04-presentation-and-processing/07-business-logic.wmv
2.3 MB
02-information/17-event-log.wmv
2.3 MB
02-information/18-blog.wmv
2.3 MB
02-information/19-email.wmv
2.3 MB
01-intro/17-thieves-and-idiots.wmv
2.3 MB
03-communication/13-brokered-application-protocol-models.wmv
2.3 MB
06-protection/17-summary.wmv
2.3 MB
05-failure-management/05-recovery.wmv
2.2 MB
06-protection/08-unauthorized-access.wmv
2.1 MB
01-intro/13-capacity.wmv
2.1 MB
01-intro/01-intro.wmv
2.1 MB
05-failure-management/14-mixing-models.wmv
2.0 MB
03-communication/10-congestion.wmv
2.0 MB
03-communication/14-direct-application-protocol-models.wmv
2.0 MB
04-presentation-and-processing/08-processing-introduction.wmv
2.0 MB
03-communication/08-links.wmv
2.0 MB
01-intro/16-failure.wmv
2.0 MB
01-intro/04-distributed-systems.wmv
2.0 MB
01-intro/08-presentation.wmv
1.9 MB
02-information/14-text-files.wmv
1.8 MB
03-communication/21-what-do-you-need.wmv
1.8 MB
03-communication/16-unicast-anycast-muticast-broadcast.wmv
1.8 MB
04-presentation-and-processing/17-summary.wmv
1.7 MB
03-communication/17-push-solicit-push-pull.wmv
1.7 MB
01-intro/07-communication.wmv
1.7 MB
01-intro/11-protection.wmv
1.7 MB
02-information/22-summary.wmv
1.7 MB
01-intro/05-the-elements.wmv
1.7 MB
06-protection/01-intro.wmv
1.6 MB
02-information/21-stock-prices.wmv
1.6 MB
03-communication/02-synchronous-communication.wmv
1.6 MB
02-information/20-product-catalog.wmv
1.6 MB
03-communication/22-summary.wmv
1.6 MB
03-communication/18-push-load-balancing.wmv
1.5 MB
02-information/01-intro.wmv
1.5 MB
03-communication/06-structure.wmv
1.4 MB
01-intro/02-what-are-we-discussing.wmv
1.4 MB
01-intro/06-information.wmv
1.3 MB
03-communication/01-intro.wmv
1.2 MB
06-protection/14-safety.wmv
1.2 MB
03-communication/15-oneway-request-reply-duplex.wmv
1.2 MB
03-communication/05-vocabulary.wmv
1.1 MB
03-communication/12-application-protocols.wmv
1.1 MB
03-communication/20-publish-subscribe-model.wmv
1.1 MB
03-communication/19-brokered-load-leveling-and-balancing.wmv
1.1 MB
06-protection/02-security.wmv
1.0 MB
01-intro/12-adversaries.wmv
922 kB
02-information/05-characteristics.wmv
811 kB
06-protection/03-threats.wmv
472 kB
02-information/13-scenarios.wmv
414 kB