Efficient Ops
Author

Efficient Ops

This public account is maintained by Xiaotianguo and friends, regularly publishing widely-read original technical articles. We focus on operations transformation and accompany you throughout your operations career, growing together happily.

2.8k
Articles
0
Likes
6.1k
Views
0
Comments
Recent Articles

Latest from Efficient Ops

100 recent articles max
Efficient Ops
Efficient Ops
Sep 22, 2025 · Operations

Ultimate Linux Command Cheat Sheet: Master File, Network, and System Operations

This comprehensive guide lists essential Linux commands—covering help, file and directory manipulation, content processing, compression, system information, networking, disk management, permissions, user administration, built‑in utilities, system monitoring, and process control—providing concise English descriptions for each to help users efficiently manage and troubleshoot Linux systems.

Unixbashcommand-line
0 likes · 16 min read
Ultimate Linux Command Cheat Sheet: Master File, Network, and System Operations
Efficient Ops
Efficient Ops
Sep 21, 2025 · Cloud Native

Master Helm: The Ultimate Guide to Kubernetes Package Management

This comprehensive guide explains what Helm is, its core concepts like charts and releases, how to install and upgrade it across platforms, essential commands for managing charts and releases, and why Helm simplifies Kubernetes application deployment, version control, and dependency management.

DevOpsHelmPackage Management
0 likes · 8 min read
Master Helm: The Ultimate Guide to Kubernetes Package Management
Efficient Ops
Efficient Ops
Sep 18, 2025 · Artificial Intelligence

How ICBC Revolutionized Credit‑Card Risk Management with AI‑Driven Data Architecture

ICBC’s Software Development Center built an AI‑powered, multi‑layer data platform and decision engine that enables real‑time, precise risk monitoring and automated response for credit‑card operations, dramatically improving detection speed, coverage, and warning quality while supporting a full‑process intelligent risk‑control loop.

AI risk managementcredit carddata architecture
0 likes · 11 min read
How ICBC Revolutionized Credit‑Card Risk Management with AI‑Driven Data Architecture
Efficient Ops
Efficient Ops
Sep 17, 2025 · Operations

How to Use Smartctl for Proactive Disk Health Monitoring and Failure Prevention

This guide introduces Smartctl, a powerful command‑line utility for monitoring disk health, covering installation, device discovery, health checks, SMART attribute interpretation, self‑tests, error log analysis, and automation techniques to proactively prevent storage failures on Linux systems.

Disk MonitoringLinuxSMART
0 likes · 7 min read
How to Use Smartctl for Proactive Disk Health Monitoring and Failure Prevention
Efficient Ops
Efficient Ops
Sep 16, 2025 · Backend Development

Why Tomcat Thread‑Pool Saturation Crashed Our Service and How to Avoid It

A detailed post‑mortem explains how a sudden traffic surge, insufficient pod count, and a custom thread‑pool bottleneck caused Tomcat thread‑pool saturation, health‑check failures, and a zone‑wide outage, and offers concrete lessons on capacity planning, monitoring, and safe coding practices.

CapacityPlanningJavaPerformance
0 likes · 28 min read
Why Tomcat Thread‑Pool Saturation Crashed Our Service and How to Avoid It
Efficient Ops
Efficient Ops
Sep 15, 2025 · Operations

Mastering Prometheus Histograms: From Basics to Advanced Queries

This article explains the fundamentals of Prometheus Histogram metrics, covering data format, metric types, how histograms work as cumulative time series, provides Go code examples for collection, and demonstrates practical queries for rate, bucket analysis, and quantile calculations to monitor service performance.

GoHistogramMetrics
0 likes · 12 min read
Mastering Prometheus Histograms: From Basics to Advanced Queries
Efficient Ops
Efficient Ops
Sep 14, 2025 · Cloud Computing

Master Terraform: From Basics to Advanced CLI Commands

This guide introduces Terraform, an open-source IaC tool, covering its core concepts, key features, installation steps, command hierarchy, and execution workflow, enabling readers to confidently automate and manage cloud and on-premise infrastructure using declarative configurations.

DevOpsInfrastructure as CodeTerraform
0 likes · 8 min read
Master Terraform: From Basics to Advanced CLI Commands
Efficient Ops
Efficient Ops
Sep 10, 2025 · Cloud Native

Unlock Docker Compatibility with nerdctl: A Guide to Containerd’s Powerful CLI

This article introduces nerdctl, a Docker‑compatible CLI built on containerd, outlines its key features, installation methods, and essential commands—including image building and Docker Compose support—providing developers and sysadmins a lightweight alternative for advanced container management.

CLIContainer ManagementDocker Compatibility
0 likes · 6 min read
Unlock Docker Compatibility with nerdctl: A Guide to Containerd’s Powerful CLI
Efficient Ops
Efficient Ops
Sep 9, 2025 · Fundamentals

Inside 3FS: How Distributed File Systems Hide Complexity and Scale

3FS is an open‑source distributed file system that abstracts multiple machines into a single namespace, offering massive scalability, fault tolerance, and high throughput through components like Meta, Mgmtd, Storage, and Client, and leveraging the CRAQ protocol for strong consistency and efficient reads and writes.

3FSCRAQdistributed file system
0 likes · 12 min read
Inside 3FS: How Distributed File Systems Hide Complexity and Scale
Efficient Ops
Efficient Ops
Sep 9, 2025 · Information Security

What Dior’s Shanghai Data Breach Reveals About China’s Personal Information Protection Law

In May 2024, Dior Shanghai faced an administrative investigation for illegally transferring user data abroad, failing to obtain explicit consent, and neglecting encryption, highlighting critical compliance gaps under China’s Personal Information Protection Law and prompting a strong security reminder for data handlers.

China cybersecurity lawDiorcross‑border data transfer
0 likes · 3 min read
What Dior’s Shanghai Data Breach Reveals About China’s Personal Information Protection Law