Tagged articles
49 articles
Page 1 of 1
Architect Chen
Architect Chen
May 2, 2026 · Cloud Computing

Docker vs Traditional VMs: 4 Key Differences Explained

The article compares Docker containers with traditional virtual machines across four core aspects—resource consumption, isolation mechanisms, startup speed, and deployment efficiency—showing that containers use shared kernels for lower memory and CPU overhead, provide process‑level isolation, start in under a second, and enable rapid CI/CD workflows.

DeploymentDockerIsolation
0 likes · 4 min read
Docker vs Traditional VMs: 4 Key Differences Explained
AI Step-by-Step
AI Step-by-Step
Mar 13, 2026 · Information Security

Why Installing OpenClaw on Your Main PC Is Risky and How to Isolate It Safely

The article explains why placing OpenClaw on a primary workstation exposes personal accounts, files, and browser sessions to a message‑driven system, and provides a step‑by‑step security baseline—including isolated environments, official audits, sandbox configuration, and permission hardening—to keep the tool safely contained.

Browser ControlIsolationOpenClaw
0 likes · 7 min read
Why Installing OpenClaw on Your Main PC Is Risky and How to Isolate It Safely
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Mar 9, 2026 · Information Security

Securing OpenClaw AI Agents with a Firecracker‑Based Sandbox

This article examines the security vulnerabilities of the open‑source OpenClaw AI agent, explains why traditional Docker isolation is insufficient, and details a micro‑VM sandbox solution built on the E2B architecture and Firecracker to provide hardware‑level isolation, instant cold‑starts, and strict network controls.

AI sandboxE2BFirecracker
0 likes · 14 min read
Securing OpenClaw AI Agents with a Firecracker‑Based Sandbox
Tech Freedom Circle
Tech Freedom Circle
Dec 17, 2025 · Backend Development

Thread Pool: Shared vs Exclusive – How to Choose the Right Strategy for Critical Java Services

This article dissects the interview question “Should thread pools be shared or exclusive?” by exposing common pitfalls, presenting a systematic analysis of isolation versus reuse, and illustrating best‑practice designs with concrete RocketMQ examples, code snippets, and decision‑making guidelines.

IsolationJava concurrencyRocketMQ
0 likes · 22 min read
Thread Pool: Shared vs Exclusive – How to Choose the Right Strategy for Critical Java Services
JavaScript
JavaScript
Sep 26, 2025 · Information Security

How ShadowRealm Can Safely Isolate Untrusted JavaScript in the Browser

ShadowRealm, a forthcoming ECMAScript standard now at TC39 Stage 3, lets developers create isolated JavaScript global environments without DOM overhead, offering a lightweight alternative to iframes and eval for securely executing third‑party code, with APIs like new ShadowRealm(), evaluate() and importValue().

ECMAScriptIsolationJavaScript
0 likes · 4 min read
How ShadowRealm Can Safely Isolate Untrusted JavaScript in the Browser
Senior Tony
Senior Tony
Dec 30, 2024 · Databases

Unlocking MySQL InnoDB: Deep Dive into ACID, Redo/Undo Logs, and Double Write

This article explains MySQL InnoDB's ACID properties in depth, detailing how atomicity relies on Redo and Undo logs, how consistency ensures business logic integrity, how isolation uses locks and MVCC with snapshot and current reads, and how durability is achieved through Redo logs, the innodb_flush_log_at_trx_commit setting, and the Double Write mechanism.

ACIDInnoDBIsolation
0 likes · 11 min read
Unlocking MySQL InnoDB: Deep Dive into ACID, Redo/Undo Logs, and Double Write
37 Interactive Technology Team
37 Interactive Technology Team
Sep 25, 2023 · Cloud Native

Investigation of Kubernetes Container Isolation Mechanism and Its Impact

The article investigates a cloud‑vendor Kubernetes isolation feature that inserts iptables DROP rules into a pod’s network namespace, demonstrating how it fully blocks traffic, triggers liveness‑probe restarts, and impacts services depending on replica count and probe configuration, while preserving state only without probes.

Container SecurityIsolationKubernetes
0 likes · 7 min read
Investigation of Kubernetes Container Isolation Mechanism and Its Impact
Selected Java Interview Questions
Selected Java Interview Questions
Aug 11, 2023 · Databases

Introduction to MySQL Locks and Their Types

This article explains the purpose, classification, and implementation of MySQL locks—including global, table, page, row, intention, and gap/record/next-key locks—as well as optimistic and pessimistic locking strategies, providing code examples and usage scenarios for ensuring data consistency in concurrent transactions.

InnoDBIsolationLocks
0 likes · 11 min read
Introduction to MySQL Locks and Their Types
ITPUB
ITPUB
Mar 23, 2023 · Databases

How MySQL InnoDB Implements ACID: Deep Dive into Transactions, Locks, and Isolation

This article explains how MySQL InnoDB achieves the ACID properties—Atomicity, Consistency, Isolation, Durability—by detailing the roles of undo logs, redo logs, buffer pool, lock mechanisms, and MVCC, and outlines transaction lifecycle commands, isolation levels, and consistency guarantees.

ACIDInnoDBIsolation
0 likes · 10 min read
How MySQL InnoDB Implements ACID: Deep Dive into Transactions, Locks, and Isolation
政采云技术
政采云技术
Mar 14, 2023 · Frontend Development

Analysis of Qiankun Micro‑frontend Framework Sandbox Implementations

This article examines the sandbox mechanisms employed by the micro‑frontend framework Qiankun, detailing three implementations—SnapshotSandbox, LegacySandbox, and ProxySandbox—explaining their principles, code structures, advantages, and drawbacks, and illustrating how they isolate JavaScript global state across micro‑applications.

IsolationJS SandboxProxy
0 likes · 15 min read
Analysis of Qiankun Micro‑frontend Framework Sandbox Implementations
Top Architect
Top Architect
Dec 26, 2022 · Databases

Understanding Transaction Isolation and Concurrency Issues in MySQL

The article explains why transaction isolation is needed, describes common concurrency problems such as lost updates, dirty reads, non‑repeatable reads and phantom reads, outlines the ACID properties of a transaction, and details MySQL's four isolation levels and their impact on data consistency.

ACIDIsolationmysql
0 likes · 8 min read
Understanding Transaction Isolation and Concurrency Issues in MySQL
Programmer DD
Programmer DD
Nov 7, 2022 · Cloud Native

Kubernetes Multi‑Tenant Isolation: Strategies, Tools, and How to Choose

This article explains how Kubernetes can be configured for multi‑tenant isolation using control‑plane mechanisms like namespaces, RBAC, and quotas, data‑plane techniques such as container runtimes, storage policies, and network policies, and compares namespace‑based tenancy with virtual control‑plane and multi‑cluster approaches.

Cloud NativeIsolationKubernetes
0 likes · 11 min read
Kubernetes Multi‑Tenant Isolation: Strategies, Tools, and How to Choose
Architects' Tech Alliance
Architects' Tech Alliance
Oct 30, 2022 · Fundamentals

Network Slicing Architecture, Isolation Mechanisms, and Challenges in 5G/6G

The article explains how 5G/6G network slicing virtualizes a physical infrastructure into multiple logical networks with customized topologies and resources, describes the architectural layers, various isolation techniques across access, transport, and core networks, and outlines operational challenges for end‑to‑end slice deployment.

5GIsolationNetwork Slicing
0 likes · 11 min read
Network Slicing Architecture, Isolation Mechanisms, and Challenges in 5G/6G
Efficient Ops
Efficient Ops
Aug 2, 2022 · Operations

Mastering Incident Response: Principles and Methods for Effective Operations

This guide outlines essential incident‑response principles—prioritizing business recovery and timely escalation—and presents practical methods such as restart, isolation, and downgrade, while also detailing stakeholder roles and post‑incident review practices for reliable operations.

IsolationService Restartdowngrade
0 likes · 10 min read
Mastering Incident Response: Principles and Methods for Effective Operations
JavaEdge
JavaEdge
Jul 24, 2022 · Databases

Understanding Database Transactions: ACID, Isolation, and Real-World Pitfalls

The article examines why robust fault‑tolerance is essential for data stores, explains how transactions simplify error handling, breaks down the ACID guarantees, illustrates isolation and durability with concrete examples and diagrams, and discusses when multi‑object transactions are truly needed.

ACIDConsistencyIsolation
0 likes · 20 min read
Understanding Database Transactions: ACID, Isolation, and Real-World Pitfalls
Dada Group Technology
Dada Group Technology
Apr 29, 2022 · Frontend Development

Micro‑Frontend Architecture for Dada Express Operation System: Challenges and Solution

The Dada Express operation system, originally a monolithic front‑end composed of rapidly growing sub‑systems, suffered from queued deployments, inability to roll back, and slow builds, leading to a micro‑frontend redesign using single‑spa, import‑maps, and SystemJS to isolate, version, and accelerate development without sacrificing user experience.

Frontend ArchitectureImport MapsIsolation
0 likes · 16 min read
Micro‑Frontend Architecture for Dada Express Operation System: Challenges and Solution
Sohu Tech Products
Sohu Tech Products
Apr 27, 2022 · Fundamentals

Understanding the ShadowRealm API: Isolated JavaScript Realms and Their Usage

The article introduces the ShadowRealm API, a new JavaScript proposal that creates highly isolated execution realms, explains its type signatures, demonstrates .evaluate() and .importValue() methods with code examples, compares it to eval, Function, iframes, Web Workers, and Node.js vm, and outlines practical use cases such as plugin execution, testing, and web scraping.

IsolationJavaScriptSecurity
0 likes · 9 min read
Understanding the ShadowRealm API: Isolated JavaScript Realms and Their Usage
IT Services Circle
IT Services Circle
Apr 14, 2022 · Frontend Development

Understanding the ShadowRealm API: Isolated JavaScript Execution Environments

This article introduces the ShadowRealm API, a new JavaScript proposal that creates independent, highly isolated realms for executing code, explains its type signatures, demonstrates .evaluate() and .importValue() methods with practical examples, and compares it with eval, Web Workers, iframes, and Node.js vm.

IsolationJavaScriptRuntime
0 likes · 10 min read
Understanding the ShadowRealm API: Isolated JavaScript Execution Environments
Programmer DD
Programmer DD
Sep 18, 2021 · Backend Development

Isolating Spring @Async Thread Pools to Prevent Task Interference

This tutorial explains why the default shared thread pool for @Async tasks can cause unrelated services to block each other, and shows step‑by‑step how to configure separate thread pools for different async tasks in Spring Boot, complete with code examples and a unit test.

AsyncIsolationJava
0 likes · 10 min read
Isolating Spring @Async Thread Pools to Prevent Task Interference
Top Architect
Top Architect
Jun 6, 2021 · Backend Development

Understanding Spring Transaction Fundamentals and Propagation Mechanisms

This article explains the core principles of Spring transactions, how they rely on database support, demonstrates JDBC transaction steps, introduces Spring's declarative transaction management, compares JDK and CGLIB proxies, and details propagation attributes, isolation levels, and read‑only transaction usage with practical code examples.

BackendDeclarativeIsolation
0 likes · 13 min read
Understanding Spring Transaction Fundamentals and Propagation Mechanisms
Top Architect
Top Architect
Apr 16, 2021 · Backend Development

When to Use Microservices: Modules, Monoliths, and Service Boundaries

The article examines the historical evolution of software modularity, explains why microservices are an extreme reaction to monoliths, discusses isolation challenges across layers, and offers practical criteria for deciding where service boundaries should be drawn in modern backend systems.

BackendIsolationSystem Design
0 likes · 17 min read
When to Use Microservices: Modules, Monoliths, and Service Boundaries
DataFunTalk
DataFunTalk
Jan 18, 2021 · Artificial Intelligence

Graph Algorithm Design and Optimization for Detecting Black Market Users in Virtual Networks

This article presents a comprehensive overview of using graph representation learning and clustering, particularly GraphSAGE and its optimizations, to identify and mitigate black‑market (malicious) accounts in virtual networks, discussing background, objectives, challenges such as isolation and heterogeneity, and evaluation results.

GraphSAGEIsolationblack market detection
0 likes · 13 min read
Graph Algorithm Design and Optimization for Detecting Black Market Users in Virtual Networks
Open Source Linux
Open Source Linux
Sep 12, 2020 · Operations

Mastering Incident Response: Core Principles and Practical Methods

This guide outlines essential incident‑response principles—prioritizing business restoration and timely escalation—while detailing practical methods such as restart, isolation, and degradation, and explains how to organize response teams and conduct thorough post‑incident reviews.

IsolationRestartdegradation
0 likes · 11 min read
Mastering Incident Response: Core Principles and Practical Methods
Architect's Tech Stack
Architect's Tech Stack
Jun 1, 2020 · Backend Development

Fundamentals and Advanced Concepts of Spring Transaction Management

This article explains the core principles of Spring transaction management, including JDBC transaction steps, declarative @Transactional usage, AOP proxy mechanisms, propagation behaviors, isolation levels, nested transactions, and Spring Boot support, while also providing code examples and practical guidance for developers.

Isolationaoppropagation
0 likes · 14 min read
Fundamentals and Advanced Concepts of Spring Transaction Management
JD Retail Technology
JD Retail Technology
Jul 12, 2019 · Databases

Understanding MySQL Lock Mechanisms, Transaction Isolation, and Concurrency Control

This article explains MySQL's lock types—including table and row locks, InnoDB's shared, exclusive, and intention locks—covers lock algorithms such as record, gap, next‑key, and insert‑intention locks, discusses deadlock and blocking issues, and details transaction management, isolation levels, and related configuration parameters.

ACIDInnoDBIsolation
0 likes · 39 min read
Understanding MySQL Lock Mechanisms, Transaction Isolation, and Concurrency Control
dbaplus Community
dbaplus Community
May 25, 2019 · Backend Development

Mastering Thread‑Pool Isolation: Prevent Cascading Failures in Java Services

This article explains the concept of fault tolerance in software architecture, illustrates why thread‑pool isolation is essential for preventing cascading failures, and provides concrete Java implementations—including code examples, pros and cons, and practical guidance for applying the technique in real‑world backend systems.

BackendIsolationJava
0 likes · 10 min read
Mastering Thread‑Pool Isolation: Prevent Cascading Failures in Java Services
Youzan Coder
Youzan Coder
Apr 10, 2019 · Databases

Why Does MySQL Hold Locks Until Commit? A Deep Dive into InnoDB Locking

This article explains why MySQL acquires row locks that persist until a transaction commits, using analogies with multithreading, detailed transaction scenarios, the role of intention locks, and how isolation levels affect lock behavior, all illustrated with code examples and diagrams.

InnoDBIsolationdatabase
0 likes · 7 min read
Why Does MySQL Hold Locks Until Commit? A Deep Dive into InnoDB Locking
Architects' Tech Alliance
Architects' Tech Alliance
Apr 3, 2019 · Databases

Choosing Between Optimistic and Pessimistic Locks in Production Systems

The article explains the concepts, advantages, and drawbacks of optimistic and pessimistic locking, provides real‑world examples such as lost updates and inconsistent reads, and offers practical guidelines and implementation techniques for selecting the appropriate concurrency control strategy in database‑driven applications.

Concurrency ControlIsolationVersion Control
0 likes · 10 min read
Choosing Between Optimistic and Pessimistic Locks in Production Systems
Java Captain
Java Captain
Mar 19, 2019 · Backend Development

Understanding Spring Transaction Management and Its Core Concepts

This article explains how Spring manages transactions, detailing the three essential elements, annotation configuration, rollback rules, propagation behaviors, isolation levels, and the underlying AOP mechanism that enables declarative transaction handling in Java backend applications.

BackendIsolationpropagation
0 likes · 11 min read
Understanding Spring Transaction Management and Its Core Concepts
Alibaba Cloud Native
Alibaba Cloud Native
Oct 16, 2018 · Cloud Native

How Alibaba Achieved 100% Containerization with PouchContainer

Alibaba’s PouchContainer, an internally built container runtime, combines LXC and Docker technologies to enable full‑scale, non‑intrusive containerization of online services, offering rich features such as systemd‑based rich containers, enhanced isolation, P2P image distribution, in‑place upgrades, and native Kubernetes integration.

Cloud NativeIsolationKubernetes
0 likes · 15 min read
How Alibaba Achieved 100% Containerization with PouchContainer
Youzan Coder
Youzan Coder
Jul 27, 2018 · Operations

Youzan Testing Environment: Service Chain Isolation and Operational Practices

Youzan created a cost-effective multi-project testing environment by introducing a weakly isolated “service-chain” that propagates identifiers across RPC and REST calls, standardizing entry/exit points, automating provisioning, and integrating the isolated environments into CI/CD pipelines through cross-team collaboration and tooling.

DevOpsInfrastructureIsolation
0 likes · 17 min read
Youzan Testing Environment: Service Chain Isolation and Operational Practices
Architecture Digest
Architecture Digest
Oct 13, 2017 · Operations

Load Balancing, Reverse Proxy, and Isolation Techniques

This article explains how load balancing and reverse proxy mechanisms such as Nginx, Consul, and Hystrix work together with various isolation strategies—including thread, process, cluster, data‑center, and resource isolation—to improve system reliability and scalability in large‑scale web architectures.

ConsulHystrixIsolation
0 likes · 10 min read
Load Balancing, Reverse Proxy, and Isolation Techniques
ITPUB
ITPUB
Mar 11, 2017 · Databases

How Does MySQL InnoDB Lock Rows? Deep Dive into MVCC, 2PL, and Deadlocks

This article explains MySQL InnoDB's locking mechanisms—including MVCC snapshot vs. current reads, two‑phase locking, isolation levels, lock types, GAP locks, and deadlock scenarios—by analyzing simple and complex SQL examples and showing how different index and isolation configurations affect lock acquisition.

InnoDBIsolationMVCC
0 likes · 25 min read
How Does MySQL InnoDB Lock Rows? Deep Dive into MVCC, 2PL, and Deadlocks
Qunar Tech Salon
Qunar Tech Salon
Jul 6, 2016 · Information Security

Thirteen Ways Containers Are More Secure Than Virtual Machines

The article explains why containers offer stronger security than virtual machines by detailing thirteen best‑practice features such as disabling SSH, limiting ports, short‑lived containers, immutable designs, automated patching, and comprehensive scanning and logging strategies.

ContainersDevOpsIsolation
0 likes · 5 min read
Thirteen Ways Containers Are More Secure Than Virtual Machines