Learn Algorithms

Subject: Data Models and Algorithms

10 chapters

Chapters

  1. Relational - normalization forms (1NF through 3NF at minimum), entity-relationsh — Relational - normalization forms (1NF through 3NF at minimum), entity-relationship diagrams, primary/foreign key relationships, and when to denormalize for performance.
    r&b, educational · 3:55
    Learn how to transform messy, redundant data into clean, efficient relational databases through normalization forms and entity-relationship design principles. Discover when breaking these rules through denormalization can actually boost performance in real-world applications.
  2. Document/NoSQL - JSON/BSON structures, embedding vs. referencing, schema-on-read — Document/NoSQL - JSON/BSON structures, embedding vs. referencing, schema-on-read patterns. MongoDB and DynamoDB are the common ones to understand conceptually.
    r&b, educational · 3:21
    Learn how document databases like MongoDB and DynamoDB store flexible JSON/BSON data structures, exploring the key design decisions between embedding related data versus referencing it separately. Discover schema-on-read patterns that allow dynamic data structures without rigid table constraints.
  3. Graph - nodes, edges, properties, and when graph models outperform relational (s — Graph - nodes, edges, properties, and when graph models outperform relational (social networks, fraud detection, dependency mapping). Neo4j is the canonical example.
    r&b, educational · 3:16
    Graph databases excel at managing complex relationships like social networks and fraud detection, where traditional relational models struggle with interconnected data. Learn how Neo4j and graph structures using nodes, edges, and properties can elegantly solve problems involving dependencies and multi-layered connections.
  4. Key-Value and Wide-Column - Redis-style caching patterns, Cassandra/HBase for ti — Key-Value and Wide-Column - Redis-style caching patterns, Cassandra/HBase for time-series or high-write scenarios.
    r&b, educational · 3:45
    Discover how Redis caching accelerates data retrieval through key-value storage and explore Cassandra's wide-column architecture for handling massive time-series datasets and high-volume write operations.
  5. Data Warehousing - star and snowflake schemas, fact vs. dimension tables, slowly — Data Warehousing - star and snowflake schemas, fact vs. dimension tables, slowly changing dimensions.
    r&b, educational · 2:45
    Sarah's journey through data warehousing reveals how star and snowflake schemas organize scattered business information using fact tables for measurements and dimension tables for context. Learn the essential architecture patterns that transform chaotic data into structured, queryable warehouses for better business intelligence.
  6. Fundamentals - Big O notation (time and space complexity), recursion, hash table — Fundamentals - Big O notation (time and space complexity), recursion, hash tables, trees (binary, B-trees for databases), and basic sorting/searching.
    r&b, educational · 3:49
    Explore the essential building blocks of computer science through Sarah's coding journey as she discovers how Big O notation measures algorithm efficiency, learns recursive problem-solving techniques, and masters fundamental data structures like hash tables and trees. This R&B-infused lesson breaks down complex concepts including time and space complexity, binary trees, B-trees for databases, and core sorting and searching algorithms into digestible, memorable segments.
  7. Graph Algorithms - breadth-first and depth-first search, shortest path (Dijkstra — Graph Algorithms - breadth-first and depth-first search, shortest path (Dijkstra's), minimum spanning trees. These come up in network design and dependency analysis.
    r&b, educational · 3:00
    Explore essential graph algorithms through Sarah's network engineering challenges, learning breadth-first search, depth-first search, Dijkstra's shortest path, and minimum spanning trees for real-world applications in network design and dependency analysis.
  8. String Matching - useful for log analysis, pattern detection in compliance conte — String Matching - useful for log analysis, pattern detection in compliance contexts.
    r&b, educational · 3:51
    Maria's cybersecurity challenge introduces string matching algorithms, teaching listeners how to efficiently search for patterns within large datasets like server logs. You'll discover the computational techniques that power everything from threat detection to compliance monitoring in real-world security scenarios.
  9. Caching Strategies - LRU, write-through vs. write-back, cache invalidation patte — Caching Strategies - LRU, write-through vs. write-back, cache invalidation patterns.
    r&b, educational · 4:07
    Explore essential caching strategies through smooth R&B rhythms, learning how LRU algorithms manage memory, the trade-offs between write-through and write-back policies, and effective cache invalidation techniques that keep your systems running efficiently.
  10. Distributed Systems Concepts - CAP theorem, eventual consistency, sharding strat — Distributed Systems Concepts - CAP theorem, eventual consistency, sharding strategies, replication patterns.
    r&b, educational · 3:32
    Sarah's global Netflix server challenge introduces the fundamental CAP theorem, teaching you why distributed systems must sacrifice one of three critical properties—consistency, availability, or partition tolerance—when network failures occur.