Post - 4 Series of elmasiri's book:
Tuning as a Life Cycle
File systems have no a One-Time Fix
Many teams launch a database and only "tune" it when it crashes. Elmasri argues that Database Tuning (Phase 6 of the design process) must be a continuous loop.
The Concept: Tuning involves adjusting the Internal Schema (indexes, record placement, and buffering) based on real-world transaction frequencies.
Real-World Project Impact:
An index that speeds up a SELECT query will inevitably slow down every INSERT and UPDATE.
As your app grows from 100 users to 100,000, the "correct" index today becomes a "bottleneck" tomorrow.
The Pro Move: Use Database Profiling to identify which queries are "heavy" and adjust your physical design (Phase 5) dynamically as user behavior changes.
As of your project u need to pay attention on what is most friction right now. is it performance, data accuracy or scale
#Dataenginering #Backend #systemdesign #dataintegrity
@pixeldrive
Tuning as a Life Cycle
File systems have no a One-Time Fix
Many teams launch a database and only "tune" it when it crashes. Elmasri argues that Database Tuning (Phase 6 of the design process) must be a continuous loop.
The Concept: Tuning involves adjusting the Internal Schema (indexes, record placement, and buffering) based on real-world transaction frequencies.
Real-World Project Impact:
An index that speeds up a SELECT query will inevitably slow down every INSERT and UPDATE.
As your app grows from 100 users to 100,000, the "correct" index today becomes a "bottleneck" tomorrow.
The Pro Move: Use Database Profiling to identify which queries are "heavy" and adjust your physical design (Phase 5) dynamically as user behavior changes.
As of your project u need to pay attention on what is most friction right now. is it performance, data accuracy or scale
#Dataenginering #Backend #systemdesign #dataintegrity
@pixeldrive
❤1👍1
🚀 Want to step into the world of Cyber Security & Ethical Hacking?
This hands-on practical course covers everything from Linux Basics to Website Hacking & Post Exploitation 🔐
✨ What You’ll Learn:
✔️ Linux Fundamentals
✔️ Network Hacking & Security
✔️ Attacks & Cracking Techniques
✔️ Gaining Access to Systems
✔️ Social Engineering
✔️ Website Hacking & Vulnerabilities
✔️ Post Exploitation
✔️ Bonus Advanced Sections
Download Link 🔗
https://drive.google.com/drive/mobile/folders/1if6MCeBCj8sxWwJIKhtgwU0GBuBW8uLx
🎯 Perfect for:
👨💻 Beginners | 🎓 Students | 🛡️ Cyber Security Enthusiasts
This hands-on practical course covers everything from Linux Basics to Website Hacking & Post Exploitation 🔐
✨ What You’ll Learn:
✔️ Linux Fundamentals
✔️ Network Hacking & Security
✔️ Attacks & Cracking Techniques
✔️ Gaining Access to Systems
✔️ Social Engineering
✔️ Website Hacking & Vulnerabilities
✔️ Post Exploitation
✔️ Bonus Advanced Sections
Download Link 🔗
https://drive.google.com/drive/mobile/folders/1if6MCeBCj8sxWwJIKhtgwU0GBuBW8uLx
🎯 Perfect for:
👨💻 Beginners | 🎓 Students | 🛡️ Cyber Security Enthusiasts
🔥1
This little guy thinks he’s the main character. Designed a mascot for my future game/comic
#medibangillustrator
@pixeldrive
#medibangillustrator
@pixeldrive
😁3
Forwarded from Debugging Epohul (epohul)
I was meant to share this a while back. It's a really nice book, easy to follow and pretty up-to-date since it's published this year.
(Only 127 pages)
the book is in the comment
(Only 127 pages)
the book is in the comment
🔥3👏2❤1
Forwarded from Nahom G.
🌟 We Built AlgoWars at a Global Hackathon From Ethiopia
We joined Vercel’s “Prompt to Production” week in Addis Ababa — a global hackathon where teams build real AI projects from idea to working prototype in one night. The experience was intense, creative, and inspiring.
Our team built AlgoWars – Where Code is Weapon (@@fuauda) — a project that turns coding and logic into a competitive strategy concept, highlighting innovation, problem-solving, and engineering skills.
Now our project is live, and we need your vote to compete globally and represent Addis Ababa and Ethiopia. Every vote helps us move closer to the top.
How to vote:
1️⃣ Open → https://v0-v0prompttoproduction2026.vercel.app/browse
2️⃣ Sign in
3️⃣ Select Engineering from categories
4️⃣ Find @@fuauda (make sure look for the project with an image b/c there is a one )
5️⃣ Click Vote ❤️
Let’s show the world what Addis Ababa can build — your support makes a real difference.
#PromptToProduction #AlgoWars #Ethiopia
We joined Vercel’s “Prompt to Production” week in Addis Ababa — a global hackathon where teams build real AI projects from idea to working prototype in one night. The experience was intense, creative, and inspiring.
Our team built AlgoWars – Where Code is Weapon (@@fuauda) — a project that turns coding and logic into a competitive strategy concept, highlighting innovation, problem-solving, and engineering skills.
Now our project is live, and we need your vote to compete globally and represent Addis Ababa and Ethiopia. Every vote helps us move closer to the top.
How to vote:
1️⃣ Open → https://v0-v0prompttoproduction2026.vercel.app/browse
2️⃣ Sign in
3️⃣ Select Engineering from categories
4️⃣ Find @@fuauda (make sure look for the project with an image b/c there is a one )
5️⃣ Click Vote ❤️
Let’s show the world what Addis Ababa can build — your support makes a real difference.
#PromptToProduction #AlgoWars #Ethiopia
❤2
A neighborhood near Al Sheena is known for its sea of ~1,500 identical houses.
Same layout. Same design. Same structure.
From above, it looks efficient.
From a security perspective? It’s a monoculture.
In security, uniformity is a double-edged sword.
When every system, device, or configuration looks the same:
✅ Management is easier
✅ Deployment is faster
❌ One vulnerability scales instantly
That’s why modern security focuses on:
• Segmentation over sprawl
• Diversity over uniformity
• Zero Trust over assumed safety
Resilient design looks boring from above but survives real attacks
@pixeldrive
Same layout. Same design. Same structure.
From above, it looks efficient.
From a security perspective? It’s a monoculture.
In security, uniformity is a double-edged sword.
When every system, device, or configuration looks the same:
✅ Management is easier
✅ Deployment is faster
❌ One vulnerability scales instantly
That’s why modern security focuses on:
• Segmentation over sprawl
• Diversity over uniformity
• Zero Trust over assumed safety
Resilient design looks boring from above but survives real attacks
@pixeldrive
💻 Just started an intermediate course in Ethical Hacking.
I’ll be spending the next few weeks focusing on [pick 1 or 2: Active Directory exploitation, Buffer Overflows, or Advanced Network Pivoting]. It’s a challenge, but that’s where the growth is. Stay tuned for some project updates!
Duration: 70hrs ~
Passing the exam on NetAcad
#Pentesting #HackTheBox #CyberSkills
@pixeldrive
I’ll be spending the next few weeks focusing on [pick 1 or 2: Active Directory exploitation, Buffer Overflows, or Advanced Network Pivoting]. It’s a challenge, but that’s where the growth is. Stay tuned for some project updates!
Duration: 70hrs ~
Passing the exam on NetAcad
#Pentesting #HackTheBox #CyberSkills
@pixeldrive
I redesigned AASTU’s website.
If the slogan is “University for Industry”… why doesn’t the website feel like it?
I’ve always believed that a website is more than just information. It’s identity. It’s positioning. It’s power. And when I looked at the original site, I felt like something was missing a university that calls itself university for industry. they could've focused on the creation process, success, entrepreneurship. Education shouldn’t be a conveyor belt to industry
@pixeldrive
If the slogan is “University for Industry”… why doesn’t the website feel like it?
I’ve always believed that a website is more than just information. It’s identity. It’s positioning. It’s power. And when I looked at the original site, I felt like something was missing a university that calls itself university for industry. they could've focused on the creation process, success, entrepreneurship. Education shouldn’t be a conveyor belt to industry
@pixeldrive
❤5🔥2
this is today's progress it's not finished yet there is a lot i have to add but i need to move to other stuff now
#Day5challenge #pixeldrive
@pixeldrive
#Day5challenge #pixeldrive
@pixeldrive
👍1🔥1
So I made this using help of ai ofc 😅😅 optimized landing page for Highlights:
Desktop-First Architecture: Tailored specifically for large-scale displays to ensure the 3D assets and typography maintain perfect visual balance.
live model Integration: A custom-rendered 3D planet that serves as a high-impact focal point for the theme "cyber-game"
Sleek Aesthetics: A minimalist navigation and brand-heavy layout, powered i don't think it was built for desktop screen descriptive
Link: Pixeldrive.vercel.app
@pixeldrive
Desktop-First Architecture: Tailored specifically for large-scale displays to ensure the 3D assets and typography maintain perfect visual balance.
live model Integration: A custom-rendered 3D planet that serves as a high-impact focal point for the theme "cyber-game"
Sleek Aesthetics: A minimalist navigation and brand-heavy layout, powered i don't think it was built for desktop screen descriptive
Link: Pixeldrive.vercel.app
@pixeldrive
🔥7
If you’re into OSINT, or just love exploring the internet’s hidden layers, you need to check out Shodan
Often called the “search engine for the Internet of Things” Shodan lets you discover exposed servers, webcams, routers, industrial systems, analyze vulnerabilities and security risks and more
Often called the “search engine for the Internet of Things” Shodan lets you discover exposed servers, webcams, routers, industrial systems, analyze vulnerabilities and security risks and more
Shodan
Search engine of Internet-connected devices. Create a free account to get started.
👍1
TIP: Hacking is NOT a Crime ( hackingisnotacrime.org ) is a nonprofit organization that attempts to raise awareness about the pejorative use of the term hacker. Historically, hackers have been portrayed as evil or illegal. Luckily, a lot of people already know that hackers are curious individuals who want to understand how things work and how to make them more secure.
⚡2