Apple introduces a new design era for the user interface in WWDC25, called Liquid Glass. This modern UI design is evolving towards depth, transparency and layered visuals. Liquid Glass is a combined immersive effect of glass and fluid elements. Liquid Glass is also known as frost glass or blur glass. In this blog, I will […]
Introduction The Smart TV market is no longer just about streaming movies. Its apps have evolved from simple interfaces into interactive platforms. If you’re already building HTML-based TV apps, adding lightweight games is an easy way to increase user engagement. In e-commerce apps, games are often used to keep users engaged for longer. Here’s the […]
Introduction As designers, there is a version of this scenario most of us have lived through. You are deep into a product, the brand palette is changing, and suddenly you are spending an afternoon tracking down every button, card, and banner across 20 Figma files, manually updating colours, hoping you have not missed anything. Three […]
The Ninety-Second Sign-Up Live match in the evening of a Friday night. The punter, a loyal football fan as well, picks up his mobile device and downloads an online gambling app. They enter their name, their date of birth and take a snap of their driving licence. Done! Their betting account gets verified within seconds. […]
Architecture, Implementation, and Production Engineering Considerations In OTT platforms, monetization is inseparable from playback architecture. Advertising-driven models such as AVOD and hybrid SVOD+AVOD depend heavily on reliable ad delivery mechanisms. Among these, Client-Side Ad Insertion (CSAI) remains one of the most widely adopted techniques. From an engineering standpoint, CSAI is not simply “playing an ad […]
Introduction With the growing adoption of containers and Kubernetes, securing containerized workloads has become a critical responsibility for DevOps and platform teams. Organizations running workloads on Kubernetes must ensure that their infrastructure, container images, runtime configurations, and resource governance follow security best practices. In this blog, we walk through the end-to-end container hardening approach implemented […]
Introduction I’ll be honest when I say running a high-traffic production environment on AWS is fun…. until you see the cloud bill. At first, you overprovision a bit of memory “just to be safe.” Containers stay up a little longer than needed. Logs? Oh, we log everything because, you know, one day you might need […]
Introduction Large Language Models (LLMs) are transforming the way that users interact with applications, and they introduce observability challenges that require new approaches. Unlike deterministic APIs that return predictable results, LLMs have variable performance, unpredictable outputs, and complex failure modes. Observing these systems effectively means collecting data that captures not just the performance of LLM […]
Introduction Private clusters in Google Kubernetes Engine improve security by preventing public access to the Kubernetes control plane, but this also makes remote management more difficult.This step-by-step guide will walks you through how to configure Tinyproxy on a private bastion host and how to use Identity-Aware Proxy (IAP) to safely access a private GKE cluster […]
Introduction In ad-tech, logs are not “nice to have.” They are the product’s heartbeat. Every impression, every click, every bid request — everything generates logs. Multiply that by millions of requests per minute, and you’re suddenly dealing with millions of events and TB’s of logs per day. That’s exactly where one of our platforms was. […]
Introduction If you’ve worked in production long enough, you’ve probably heard this: “Let’s right-size the services and reduce the AWS bill.” So we do it. We check CPU and memory metrics for a week. We reduce task sizes. Costs drop. Everyone’s happy. And then…. six months later, the bill increases again. Nothing “dramatic” changed. No […]
Introduction When we started with Amazon ECS on AWS Fargate, it felt simple. No EC2 to manage. No AMIs. No cluster scaling headaches. Then the number of services grew. Working for the ad-tech client from last 5 years and running their workload on ECS Fargate has taught us many things. Different traffic patterns. Different scaling […]