Posts

insomnius logo 2Muhammad Arief Rahman

How Unicorn Scale Company Detect Millions of Violated Ecommerce Product Everyday

At Unicorn Scale Company, sellers constantly try to bypass marketplace policies by slightly modifying images of prohibited products. Traditional hash-based methods fail to detect these manipulations, so we implemented perceptual hashing (pHash) to identify visually similar images—even when altered. In this article, we dive into the architecture, implementation, and real-world impact of our scalable detection system that processes millions of products daily.

an images

3 days ago

4 min read

loading...

golang

security

insomnius logo 2Muhammad Arief Rahman

Building a Go Wallet App with a Redis-like Single-Threaded Event Loop Concept

Go concurrency for wallet apps: Implement serial execution for data integrity and prevent race conditions.

an images

4 months ago

15 min read

loading...

golang

algorithm

insomnius logo 2Muhammad Arief Rahman

Securing Image With Signed URL in Golang

Signed URLs help protect sensitive data by ensuring that API access is time-limited and authorized. This article explains how to implement signed URLs in Go.

an images

4 months ago

4 min read

loading...

golang

security

insomnius logo 2Muhammad Arief Rahman

Why Testing Matters: A Software Engineering Perspective

Coding isn't just about finishing tasks—it's about creating reliable, user-friendly systems through thoughtful testing.

an images

4 months ago

4 min read

loading...

testing

mental-model

insomnius logo 2Muhammad Arief Rahman

Golang Generic for Value to Pointer Function

Golang generics simplify coding by enabling reusable functions for various data types. This tutorial shows how to convert values to pointers efficiently, reducing repetitive code.

an images

December 22, 2023

2 min read

loading...

golang