Skip to content

Commit 93b091a

Browse files
committed
posts projects
1 parent 3c6bfba commit 93b091a

8 files changed

Lines changed: 1570 additions & 4 deletions

File tree

blog/api-proxy-security-design/index.html

Lines changed: 232 additions & 0 deletions
Large diffs are not rendered by default.

blog/cloud-deployment-patterns/index.html

Lines changed: 236 additions & 0 deletions
Large diffs are not rendered by default.

blog/index.html

Lines changed: 124 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,36 @@
6262
"@type": "BlogPosting",
6363
"headline": "Event-Driven API Integrations: Designing for Retries, Idempotency, and Traceability",
6464
"url": "https://pklavc.com/blog/event-driven-api-integrations/"
65+
},
66+
{
67+
"@type": "BlogPosting",
68+
"headline": "OAuth Token Management in Backend Workers: Secure Credential Flow for API Integrations",
69+
"url": "https://pklavc.com/blog/oauth-token-management/"
70+
},
71+
{
72+
"@type": "BlogPosting",
73+
"headline": "Zero-Trust API Proxy Design: AES-256 Encryption and PII Detection in Python",
74+
"url": "https://pklavc.com/blog/api-proxy-security-design/"
75+
},
76+
{
77+
"@type": "BlogPosting",
78+
"headline": "ETL Pipelines in API Integration Workers: Data Extraction, Normalization, and Sync",
79+
"url": "https://pklavc.com/blog/integration-worker-etl-pipelines/"
80+
},
81+
{
82+
"@type": "BlogPosting",
83+
"headline": "Monorepo Architecture for Backend APIs: CI Workflows and Code Execution at Scale",
84+
"url": "https://pklavc.com/blog/monorepo-backend-architecture/"
85+
},
86+
{
87+
"@type": "BlogPosting",
88+
"headline": "Infrastructure Anomaly Detection and Self-Healing Backends in Python",
89+
"url": "https://pklavc.com/blog/infrastructure-anomaly-detection/"
90+
},
91+
{
92+
"@type": "BlogPosting",
93+
"headline": "Cloud Deployment Patterns: Container Orchestration, CI/CD, and Infrastructure as Code",
94+
"url": "https://pklavc.com/blog/cloud-deployment-patterns/"
6595
}
6696
]
6797
},
@@ -151,12 +181,12 @@ <h1>Backend writing for real engineering work.</h1>
151181
<p>Use this blog as a practical reading layer for automation architecture, API integration engineering, SaaS backend design, and operational reliability patterns connected to real portfolio implementations.</p>
152182
<div class="blog-hero-metrics" aria-label="Blog coverage metrics">
153183
<div class="blog-metric">
154-
<strong>3</strong>
155-
<span>pillar posts live at launch</span>
184+
<strong>9</strong>
185+
<span>posts covering all portfolio projects</span>
156186
</div>
157187
<div class="blog-metric">
158-
<strong>4</strong>
159-
<span>core SEO topics reinforced</span>
188+
<strong>7</strong>
189+
<span>core engineering topics covered</span>
160190
</div>
161191
<div class="blog-metric">
162192
<strong>100%</strong>
@@ -225,6 +255,96 @@ <h3><a href="/blog/event-driven-api-integrations/">Event-Driven API Integrations
225255
</div>
226256
<a class="blog-link" href="/blog/event-driven-api-integrations/">Read article</a>
227257
</article>
258+
259+
<article class="blog-card" role="article">
260+
<div class="blog-card-meta">
261+
<span>API Security</span>
262+
<span>7 min read</span>
263+
</div>
264+
<h3><a href="/blog/oauth-token-management/">OAuth Token Management in Backend Workers: Secure Credential Flow for API Integrations</a></h3>
265+
<p>Designing dedicated credential workers that acquire, distribute, and refresh OAuth tokens so downstream integration services never manage authentication state inline.</p>
266+
<div class="blog-tag-row">
267+
<span>oauth lifecycle</span>
268+
<span>token distribution</span>
269+
<span>node.js workers</span>
270+
</div>
271+
<a class="blog-link" href="/blog/oauth-token-management/">Read article</a>
272+
</article>
273+
274+
<article class="blog-card" role="article">
275+
<div class="blog-card-meta">
276+
<span>API Security</span>
277+
<span>8 min read</span>
278+
</div>
279+
<h3><a href="/blog/api-proxy-security-design/">Zero-Trust API Proxy Design: AES-256 Encryption and PII Detection in Python</a></h3>
280+
<p>Building a zero-trust proxy layer with field-level AES-256 encryption, dynamic masking, and automated PII detection that enforces data privacy at the integration boundary.</p>
281+
<div class="blog-tag-row">
282+
<span>zero-trust</span>
283+
<span>aes-256</span>
284+
<span>pii detection</span>
285+
</div>
286+
<a class="blog-link" href="/blog/api-proxy-security-design/">Read article</a>
287+
</article>
288+
289+
<article class="blog-card" role="article">
290+
<div class="blog-card-meta">
291+
<span>API Integration</span>
292+
<span>9 min read</span>
293+
</div>
294+
<h3><a href="/blog/integration-worker-etl-pipelines/">ETL Pipelines in API Integration Workers: Data Extraction, Normalization, and Sync</a></h3>
295+
<p>Patterns for reliable CRM and ERP data extraction, shared payload normalization contracts, and reporting synchronization across multi-worker integration architectures.</p>
296+
<div class="blog-tag-row">
297+
<span>etl pipeline</span>
298+
<span>payload normalization</span>
299+
<span>crm erp sync</span>
300+
</div>
301+
<a class="blog-link" href="/blog/integration-worker-etl-pipelines/">Read article</a>
302+
</article>
303+
304+
<article class="blog-card" role="article">
305+
<div class="blog-card-meta">
306+
<span>Backend Engineering</span>
307+
<span>8 min read</span>
308+
</div>
309+
<h3><a href="/blog/monorepo-backend-architecture/">Monorepo Architecture for Backend APIs: CI Workflows and Code Execution at Scale</a></h3>
310+
<p>Structural patterns for Node.js monorepos covering code execution API sandbox design, multi-package CI automation, and achieving 85%+ QA coverage without coverage theater.</p>
311+
<div class="blog-tag-row">
312+
<span>monorepo</span>
313+
<span>ci workflows</span>
314+
<span>code execution api</span>
315+
</div>
316+
<a class="blog-link" href="/blog/monorepo-backend-architecture/">Read article</a>
317+
</article>
318+
319+
<article class="blog-card" role="article">
320+
<div class="blog-card-meta">
321+
<span>Backend Automation</span>
322+
<span>9 min read</span>
323+
</div>
324+
<h3><a href="/blog/infrastructure-anomaly-detection/">Infrastructure Anomaly Detection and Self-Healing Backends in Python</a></h3>
325+
<p>How predictive anomaly detection, automated recovery workflows, and structured escalation paths turn infrastructure resilience from an operational procedure into a system property.</p>
326+
<div class="blog-tag-row">
327+
<span>anomaly detection</span>
328+
<span>self-healing</span>
329+
<span>python automation</span>
330+
</div>
331+
<a class="blog-link" href="/blog/infrastructure-anomaly-detection/">Read article</a>
332+
</article>
333+
334+
<article class="blog-card" role="article">
335+
<div class="blog-card-meta">
336+
<span>Cloud Engineering</span>
337+
<span>8 min read</span>
338+
</div>
339+
<h3><a href="/blog/cloud-deployment-patterns/">Cloud Deployment Patterns: Container Orchestration, CI/CD, and Infrastructure as Code</a></h3>
340+
<p>Production-ready deployment design covering Docker container orchestration, CI/CD promotion gates, Infrastructure as Code, and rollback strategies for scalable API backends.</p>
341+
<div class="blog-tag-row">
342+
<span>docker</span>
343+
<span>ci/cd</span>
344+
<span>infrastructure as code</span>
345+
</div>
346+
<a class="blog-link" href="/blog/cloud-deployment-patterns/">Read article</a>
347+
</article>
228348
</div>
229349
</section>
230350

0 commit comments

Comments
 (0)