1. Welcome Developer Playground by Giri

Developer Playground

Blog

This area is intended for a software engineer audience.

MCP Filesystem Configuration and Usage
MCP Filesystem Configuration and Usage

Explore how to configure the Model Connector Provider (MCP) filesystem interface and examine real-world use cases in development environments.

MCP Filesystem Configuration and Usage
Understanding R2DBC Connection Pool

R2DBC connection pooling implements a fundamentally different approach compared to traditional JDBC connection pools like HikariCP, especially in how it handles idle connections and pool initialization.

MCP Filesystem Configuration and Usage
AWS DocumentDB Comparison Analysis

Current Issues with AWS DocumentDB (Instance-Based Cluster) - Does not support zero-downtime deployments during bug fixes, increasing code-level management points

Handle Floating Point
Solving Floating-Point Precision Issues

When developing financial applications or systems requiring precise calculations, floating-point precision issues can lead to critical bugs. These problems occur in JVM-based languages like Kotlin, and deciding how to store and process values, especially when interacting with databases, is a crucial design decision.

Kafka Basics
Optimizing Kafka Consumer Performance

Explore effective strategies to optimize Kafka consumer performance including partition-pod 1:1 mapping, concurrent listeners, Confluent Parallel Consumer, and asynchronous processing patterns. Learn implementation techniques, advantages, and trade-offs for each approach to maximize throughput and resource efficiency in your Kafka-based systems.

Kafka Basics
Kafka Basics

Topic, Partition, Offsets, Producer, Consumer, Delivery semantics, Broker, Zookeeper, KRaft concepts.

MongoDB Sharding Cluster with Docker Compose
MongoDB Sharding Cluster with Docker Compose

What is MongoDB Sharding?.. MongoDB Sharding Architecture.

Controlling Processing Rate in Kafka Consumers
Controlling Processing Rate in Kafka Consumers

One of the most common challenges when working with message brokers like Kafka is controlling the rate at which messages are processed.

Effective Identifier Generation Strategies in Distributed Environments
Effective Identifier Generation Strategies in Distributed Environments

Generating unique identifiers in distributed systems presents significant challenges. While single-server environments can easily rely on auto-increment values or sequences, distributed environments where multiple servers must simultaneously generate IDs require careful consideration to ensure efficiency and avoid duplication.

JVM Warmup and Class Loading Process
JVM Warmup

When a JVM process starts, all required classes are loaded into memory by the class loader through three stages. This process is based on lazy loading.

Z Garbage Collector (ZGC) Architecture
About ZGC

ZGC performs high-cost operations concurrently without stopping application threads for more than 10ms. The pause time is independent of heap size, working effectively with heaps ranging from a few hundred megabytes to 16 terabytes.

G1 Garbage Collector Architecture
About G1GC

G1 GC has been available since Java 7 and was designated as the default garbage collector in Java 9. It is suitable for multi-processor machines with large memory.

Network Replay Attack Prevention Diagram
How to Prevent Replay Attacks

A replay attack is a type of network attack where an attacker intercepts valid network data packets and later reuses them. By retransmitting the data, the system processes it as legitimate data. Replay attacks are difficult to detect because they appear as normal requests. Additionally, they can be successful even if the original transmission was encrypted. Replay attacks can overload systems through repetitive requests, potentially disrupting normal system operations.

Copyright © 2025 Giri Labs Inc.·Trademark Policy