Skip to main content
Lakshay Jawa

Lakshay Jawa

Engineering Leader | Architecting AI-Driven Execution | Scaling Distributed Systems

System Design · Posts


About nSkillHub
#

A passion-driven space for learning — system design, Java, Spring, and software engineering best practices. As a software engineer with years of experience, this blog shares insights, deep-dives, and interview prep material. Future topics will expand into movies, photography, travel, and more. Stay tuned!

Contact Lakshay on LinkedIn

Recent

URL Shortener (bit.ly)

1. Hook # Every time you click a bit.ly or t.co link, a distributed system silently resolves a 7-character code to a full URL and redirects you — in under 10 milliseconds — before your browser even renders the loading spinner. Behind that invisible handshake sits a deceptively rich design problem: how do you build a service that creates billions of short codes, never loses a mapping, and serves hundreds of thousands of reads per second with single-digit millisecond latency, all while preventing abuse, surviving data-centre failures, and staying profitable?

Data Pipeline and Analytics: OLTP vs OLAP, Batch vs Streaming, CDC

·6 mins
As systems grow, the gap between operational data (what your application uses to run) and analytical data (what your business uses to make decisions) becomes significant. Understanding how to design data pipelines that bridge this gap is an EM-level concern.

Testing Strategy: Test Pyramid, Contract Testing, and Coverage Pragmatics

·7 mins
Testing strategy is an EM-level concern because it directly affects delivery velocity, production reliability, and onboarding speed. Too little testing = production incidents. Too much ceremony = slow CI and frustrated engineers. The goal is the right tests in the right places.

Security and Authentication: JWT, OAuth2, and Secrets Management

·7 mins
Security architecture decisions have higher stakes than most — the cost of getting them wrong is a data breach, not a performance degradation. This post covers the trade-offs that come up in EM-level interviews: authentication approaches, identity protocols, and secrets management.