| 2 | ✦ |
| 3 | ✦ > Consistency Models |
| 4 | ✦ > Consistency Models > Strong Consistency > Linearizability |
| 5 | ✦ > Consistency Models > Strong Consistency > Linearizability > Practical Implications |
| 6 | ✦ > Consistency Models > Strong Consistency > Linearizability > Practical Implications > Trade-offs in Banking Systems |
| 7 | ✦ > Consistency Models > Strong Consistency > Linearizability > Practical Implications > Trade-offs in Social Media |
| 8 | ✦ > Consistency Models > Strong Consistency > Linearizability > Implementation Approaches |
| 9 | ✦ > Consistency Models > Strong Consistency > Sequential Consistency |
| 10 | ✦ > Consistency Models > Strong Consistency > Causal Consistency |
| 11 | ✦ > Consistency Models > Strong Consistency > Causal Consistency > Causal vs Sequential |
| 12 | ✦ > Consistency Models > Strong Consistency > Causal Consistency > Causal vs Sequential > Vector Clocks |
| 13 | ✦ > Consistency Models > Eventual Consistency |
| 14 | ✦ > Consistency Models > Eventual Consistency > Conflict Resolution Strategies > Last Write Wins |
| 15 | ✦ > Consistency Models > Eventual Consistency > Conflict Resolution Strategies > Last Write Wins > Clock Skew Risks |
| 16 | ✦ > Consistency Models > Eventual Consistency > Conflict Resolution Strategies > Merge Functions |
| 17 | ✦ > Consistency Models > Eventual Consistency > Read Repair |
| 18 | ✦ > Consistency Models > Read-Your-Writes Consistency |
| 19 | ✦ > Consistency Models > Read-Your-Writes Consistency > Implementation via Sticky Sessions > Load Balancer Affinity |
| 20 | ✦ > Consistency Models > Read-Your-Writes Consistency > Implementation via Sticky Sessions > Load Balancer Affinity > Session Tokens |
| 21 | ✦ > Fault Tolerance |
| 22 | ✦ > Fault Tolerance > Failure Modes > Crash Failures |
| 23 | ✦ > Fault Tolerance > Failure Modes > Byzantine Failures |
| 24 | ✦ > Fault Tolerance > Failure Modes > Byzantine Failures > Byzantine Generals Problem |
| 25 | ✦ > Fault Tolerance > Failure Modes > Byzantine Failures > Byzantine Generals Problem > Practical Byzantine Fault Tolerance |
| 26 | ✦ > Fault Tolerance > Replication Strategies > Leader-Follower Replication |
| 27 | ✦ > Fault Tolerance > Replication Strategies > Leader-Follower Replication > Synchronous Followers |
| 28 | ✦ > Fault Tolerance > Replication Strategies > Leader-Follower Replication > Synchronous Followers > Semi-Synchronous Replication |
| 29 | ✦ > Fault Tolerance > Replication Strategies > Leaderless Replication |
| 30 | ✦ > Fault Tolerance > Replication Strategies > Leaderless Replication > Quorum Rules |
| 31 | ✦ > Rate Limiting > Token Bucket Algorithm |
| 32 | ✦ > Rate Limiting > Token Bucket Algorithm > Burst Capacity |
| 33 | ✦ > Rate Limiting > Token Bucket Algorithm > Burst Capacity > Token Refill Rate |
| 34 | ✦ > Rate Limiting > Token Bucket Algorithm > Burst Capacity > Token Refill Rate > Per-User vs Global Buckets |
| 35 | ✦ > Rate Limiting > Sliding Window Algorithm |
| 36 | ✦ > Rate Limiting > Sliding Window Algorithm > Fixed Window vs Sliding Window |
| 37 | ✦ > Rate Limiting > Sliding Window Algorithm > Fixed Window vs Sliding Window > Redis Implementation |
| 38 | ✦ > Circuit Breaker Pattern > States > Closed |
| 39 | ✦ > Circuit Breaker Pattern > States > Open |
| 40 | ✦ > Circuit Breaker Pattern > States > Open > Timeout Before Half-Open |
| 41 | ✦ > Circuit Breaker Pattern > States > Open > Timeout Before Half-Open > Probe Request Strategy |
| 42 | ✦ > Circuit Breaker Pattern > States > Half-Open |
| 43 | ✦ > Circuit Breaker Pattern > Failure Thresholds > Error Rate Threshold |
| 44 | ✦ > Circuit Breaker Pattern > Failure Thresholds > Error Rate Threshold > Minimum Request Volume |
| 45 | ✦ > Circuit Breaker Pattern > Failure Thresholds > Error Rate Threshold > Minimum Request Volume > Hystrix Defaults |
| 46 | ✦ > Retry Strategies > Exponential Backoff |
| 47 | ✦ > Retry Strategies > Exponential Backoff > Jitter |
| 48 | ✦ > Retry Strategies > Exponential Backoff > Jitter > Full Jitter vs Equal Jitter |
| 49 | ✦ > Retry Strategies > Exponential Backoff > Jitter > Full Jitter vs Equal Jitter > AWS Recommendations |
| 50 | ✦ > Retry Strategies > Idempotency Keys > Why Idempotency Matters |
| 51 | ✦ > Retry Strategies > Idempotency Keys > Why Idempotency Matters > Idempotency Key Design |
| 52 | ✦ > Retry Strategies > Idempotency Keys > Why Idempotency Matters > Idempotency Key Design > Server-Side Deduplication Window |