NiuNiu MaTe
Author

NiuNiu MaTe

Joined Tencent (nicknamed "Goose Factory") through campus recruitment at a second‑tier university. Career path: Tencent → foreign firm → ByteDance → Tencent. Started as an interviewer at the foreign firm and hopes to help others.

97
Articles
0
Likes
79
Views
0
Comments
Recent Articles

Latest from NiuNiu MaTe

97 recent articles
NiuNiu MaTe
NiuNiu MaTe
Apr 13, 2026 · R&D Management

What Really Happens When You Use Superpowers to Build a Multi‑File PDF Merger?

The author walks through using the Superpowers AI‑driven workflow to create a multi‑file PDF merging web tool, exposing three major pitfalls—design docs that don’t guarantee functional output, AI skipping prescribed steps, and the slow, over‑engineered Subagent mode—while offering practical guidance to enforce a strict step‑by‑step process and choose the right execution mode for small projects.

PDF mergingSubagent modeSuperpowers
0 likes · 7 min read
What Really Happens When You Use Superpowers to Build a Multi‑File PDF Merger?
NiuNiu MaTe
NiuNiu MaTe
Mar 30, 2026 · Artificial Intelligence

Which AI Drawing Tool Is Best for Scientific Comics? A Hands‑On Comparison

This article reviews three AI‑powered illustration platforms—Banana Painter, NotebookLM, and JiMeng AI—detailing their free and paid plans, usage methods, visual styles, strengths and weaknesses, and provides a side‑by‑side comparison table to help creators choose the most suitable tool for scientific comic production.

AIImage Generationillustration
0 likes · 7 min read
Which AI Drawing Tool Is Best for Scientific Comics? A Hands‑On Comparison
NiuNiu MaTe
NiuNiu MaTe
Mar 20, 2026 · Artificial Intelligence

Why Your AI‑Generated Code Fails and How to Prompt It Effectively

The article explains why AI‑generated code often fails when prompts lack clear context, demonstrates real comparisons between vague and detailed requests, and provides a practical three‑step framework—background, purpose, and requirements—to craft precise prompts that yield reliable, production‑ready code.

AI promptingRedisSpring Boot
0 likes · 7 min read
Why Your AI‑Generated Code Fails and How to Prompt It Effectively
NiuNiu MaTe
NiuNiu MaTe
Mar 16, 2026 · Information Security

Is OpenClaw Safe? Inside the Massive AI Agent Security Crisis

OpenClaw, the popular AI agent with over 300,000 GitHub stars, harbors severe security flaws—including 512 vulnerabilities, malicious skill injections, and an exposed backend—allowing attackers to execute commands, steal credentials, and hijack systems; this article outlines the four main threat vectors and practical steps to mitigate them.

AI securityOpenClawSupply Chain Attack
0 likes · 9 min read
Is OpenClaw Safe? Inside the Massive AI Agent Security Crisis
NiuNiu MaTe
NiuNiu MaTe
Mar 13, 2026 · Artificial Intelligence

OpenClaw Explained: Turning Your PC into a Local AI Agent (Architecture & Risks)

OpenClaw is a locally‑run AI agent that listens to messages from multiple platforms, translates them into a unified format, uses an LLM to plan actions, executes tasks via modular Skills, and stores context in a transparent local memory, while exposing significant security considerations.

AI AgentLocal AutomationOpenClaw
0 likes · 10 min read
OpenClaw Explained: Turning Your PC into a Local AI Agent (Architecture & Risks)
NiuNiu MaTe
NiuNiu MaTe
Jan 28, 2026 · Fundamentals

Why a Successful Ping Doesn’t Prove Your Network Is Healthy – A Deep Dive into ICMP Mechanics

This article demystifies the ping command by explaining the ICMP protocol, interpreting TTL, latency and packet‑loss metrics, detailing the five‑step process from DNS lookup to reply, and highlighting ping’s inherent limitations such as its inability to gauge bandwidth, application‑layer issues, or firewall restrictions.

ICMPLatencyNetwork Diagnostics
0 likes · 13 min read
Why a Successful Ping Doesn’t Prove Your Network Is Healthy – A Deep Dive into ICMP Mechanics
NiuNiu MaTe
NiuNiu MaTe
Jan 22, 2026 · Backend Development

Why RPC Still Matters in Microservices: From Service Discovery to Governance

This article explains why remote procedure call (RPC) remains essential for microservice communication, detailing its historical roots, the limitations of HTTP, the multi‑step RPC workflow—including service discovery, serialization, network transmission, dynamic proxies, and governance—and how RPC and HTTP complement each other in modern architectures.

Dynamic ProxyMicroservicesRPC
0 likes · 15 min read
Why RPC Still Matters in Microservices: From Service Discovery to Governance
NiuNiu MaTe
NiuNiu MaTe
Dec 23, 2025 · Fundamentals

Why TCP Needs a Three‑Way Handshake: The Secret Behind Reliable Connections

TCP’s three‑way handshake is a carefully designed three‑step “social ritual” that establishes a reliable connection by exchanging SYN, SYN‑ACK, and ACK packets, each carrying sequence numbers and flags to confirm readiness, prevent “ghost” connections, and ensure ordered, secure data transmission.

Connection establishmentReliabilitySequence numbers
0 likes · 10 min read
Why TCP Needs a Three‑Way Handshake: The Secret Behind Reliable Connections
NiuNiu MaTe
NiuNiu MaTe
Dec 17, 2025 · Backend Development

Master Redis Distributed Locks: Prevent Race Conditions, Zombie Locks, and Expiration Issues

This guide explains how Redis implements distributed locks, outlines common pitfalls such as lock contention, zombie locks, and mismatched expiration times, and provides step‑by‑step solutions—including single‑node SET commands, Redlock high‑availability algorithm, Lua‑based safe release, and best‑practice recommendations for real‑world deployments.

Distributed LockRedisRedlock
0 likes · 15 min read
Master Redis Distributed Locks: Prevent Race Conditions, Zombie Locks, and Expiration Issues
NiuNiu MaTe
NiuNiu MaTe
Dec 10, 2025 · Operations

How Memory Leaks Sneak Into Your System and How to Stop Them

This article explains why memory leaks act like invisible thieves that gradually fill the RSS space, outlines their four‑step attack process, shows how to spot the tell‑tale signs using process‑level and system‑level metrics, and provides practical emergency and preventive measures to protect your applications.

MonitoringOOM killerRSS
0 likes · 17 min read
How Memory Leaks Sneak Into Your System and How to Stop Them