Tag

isolation

0 views collected around this technical thread.

Sanyou's Java Diary
Sanyou's Java Diary
Mar 18, 2024 · Databases

Understanding InnoDB Locks: How MySQL Handles Transactions, Isolation, and Deadlocks

This comprehensive guide explains why MySQL needs InnoDB locking, details the seven lock types, shows how a single SQL statement acquires locks under different isolation levels, demonstrates how to view lock information, and walks through practical deadlock analysis examples.

InnoDBMySQLdeadlock
0 likes · 46 min read
Understanding InnoDB Locks: How MySQL Handles Transactions, Isolation, and Deadlocks
Architecture and Beyond
Architecture and Beyond
Oct 21, 2023 · Operations

Isolation Strategies for SaaS: Principles, Layers, Tenant Models, and Key Considerations

The article explains the importance of isolation in SaaS, describes its core goals of independence and security, outlines hardware, OS, application, database, and network isolation layers, compares tenant isolation models, and provides factors and steps for selecting an appropriate isolation strategy.

SaaSSecurityarchitecture
0 likes · 14 min read
Isolation Strategies for SaaS: Principles, Layers, Tenant Models, and Key Considerations
37 Interactive Technology Team
37 Interactive Technology Team
Sep 25, 2023 · Cloud Native

Investigation of Kubernetes Container Isolation Mechanism and Its Impact

The article investigates a cloud‑vendor Kubernetes isolation feature that inserts iptables DROP rules into a pod’s network namespace, demonstrating how it fully blocks traffic, triggers liveness‑probe restarts, and impacts services depending on replica count and probe configuration, while preserving state only without probes.

Container SecurityKubernetesTesting
0 likes · 7 min read
Investigation of Kubernetes Container Isolation Mechanism and Its Impact
Selected Java Interview Questions
Selected Java Interview Questions
Aug 11, 2023 · Databases

Introduction to MySQL Locks and Their Types

This article explains the purpose, classification, and implementation of MySQL locks—including global, table, page, row, intention, and gap/record/next-key locks—as well as optimistic and pessimistic locking strategies, providing code examples and usage scenarios for ensuring data consistency in concurrent transactions.

ConcurrencyDatabaseInnoDB
0 likes · 11 min read
Introduction to MySQL Locks and Their Types
政采云技术
政采云技术
Mar 14, 2023 · Frontend Development

Analysis of Qiankun Micro‑frontend Framework Sandbox Implementations

This article examines the sandbox mechanisms employed by the micro‑frontend framework Qiankun, detailing three implementations—SnapshotSandbox, LegacySandbox, and ProxySandbox—explaining their principles, code structures, advantages, and drawbacks, and illustrating how they isolate JavaScript global state across micro‑applications.

JS Sandboxisolationmicro-frontend
0 likes · 15 min read
Analysis of Qiankun Micro‑frontend Framework Sandbox Implementations
Top Architect
Top Architect
Dec 26, 2022 · Databases

Understanding Transaction Isolation and Concurrency Issues in MySQL

The article explains why transaction isolation is needed, describes common concurrency problems such as lost updates, dirty reads, non‑repeatable reads and phantom reads, outlines the ACID properties of a transaction, and details MySQL's four isolation levels and their impact on data consistency.

ACIDDatabaseMySQL
0 likes · 8 min read
Understanding Transaction Isolation and Concurrency Issues in MySQL
Architects' Tech Alliance
Architects' Tech Alliance
Oct 30, 2022 · Fundamentals

Network Slicing Architecture, Isolation Mechanisms, and Challenges in 5G/6G

The article explains how 5G/6G network slicing virtualizes a physical infrastructure into multiple logical networks with customized topologies and resources, describes the architectural layers, various isolation techniques across access, transport, and core networks, and outlines operational challenges for end‑to‑end slice deployment.

5GSDNTelecommunications
0 likes · 11 min read
Network Slicing Architecture, Isolation Mechanisms, and Challenges in 5G/6G
Efficient Ops
Efficient Ops
Aug 2, 2022 · Operations

Mastering Incident Response: Principles and Methods for Effective Operations

This guide outlines essential incident‑response principles—prioritizing business recovery and timely escalation—and presents practical methods such as restart, isolation, and downgrade, while also detailing stakeholder roles and post‑incident review practices for reliable operations.

Incident ResponseOperationsdowngrade
0 likes · 10 min read
Mastering Incident Response: Principles and Methods for Effective Operations
Dada Group Technology
Dada Group Technology
Apr 29, 2022 · Frontend Development

Micro‑Frontend Architecture for Dada Express Operation System: Challenges and Solution

The Dada Express operation system, originally a monolithic front‑end composed of rapidly growing sub‑systems, suffered from queued deployments, inability to roll back, and slow builds, leading to a micro‑frontend redesign using single‑spa, import‑maps, and SystemJS to isolate, version, and accelerate development without sacrificing user experience.

frontend architectureimport-mapsisolation
0 likes · 16 min read
Micro‑Frontend Architecture for Dada Express Operation System: Challenges and Solution
Sohu Tech Products
Sohu Tech Products
Apr 27, 2022 · Fundamentals

Understanding the ShadowRealm API: Isolated JavaScript Realms and Their Usage

The article introduces the ShadowRealm API, a new JavaScript proposal that creates highly isolated execution realms, explains its type signatures, demonstrates .evaluate() and .importValue() methods with code examples, compares it to eval, Function, iframes, Web Workers, and Node.js vm, and outlines practical use cases such as plugin execution, testing, and web scraping.

JavaScriptSecurityShadowRealm
0 likes · 9 min read
Understanding the ShadowRealm API: Isolated JavaScript Realms and Their Usage
IT Services Circle
IT Services Circle
Apr 14, 2022 · Frontend Development

Understanding the ShadowRealm API: Isolated JavaScript Execution Environments

This article introduces the ShadowRealm API, a new JavaScript proposal that creates independent, highly isolated realms for executing code, explains its type signatures, demonstrates .evaluate() and .importValue() methods with practical examples, and compares it with eval, Web Workers, iframes, and Node.js vm.

JavaScriptSecurityShadowRealm
0 likes · 10 min read
Understanding the ShadowRealm API: Isolated JavaScript Execution Environments
Continuous Delivery 2.0
Continuous Delivery 2.0
Apr 10, 2022 · Operations

Why Selenium Tests Appear Unstable and How to Make Them Reliable

This article explains common reasons why Selenium end‑to‑end tests become flaky—such as poor test isolation, reliance on unstable external services, and inadequate timeout settings—and provides practical solutions to improve test stability and overall CI reliability.

AutomationCIEnd-to-End Testing
0 likes · 8 min read
Why Selenium Tests Appear Unstable and How to Make Them Reliable
Refining Core Development Skills
Refining Core Development Skills
Oct 25, 2021 · Fundamentals

Understanding Linux Network Namespaces: Implementation, Usage, and Internals

This article explains how Linux network namespaces provide isolated network stacks by using virtual Ethernet devices, kernel data structures, and per‑namespace routing and iptables, offering step‑by‑step commands, code excerpts, and deep insight into the kernel mechanisms that enable container networking isolation.

DockerKernelLinux
0 likes · 18 min read
Understanding Linux Network Namespaces: Implementation, Usage, and Internals
Top Architect
Top Architect
Jun 6, 2021 · Backend Development

Understanding Spring Transaction Fundamentals and Propagation Mechanisms

This article explains the core principles of Spring transactions, how they rely on database support, demonstrates JDBC transaction steps, introduces Spring's declarative transaction management, compares JDK and CGLIB proxies, and details propagation attributes, isolation levels, and read‑only transaction usage with practical code examples.

DeclarativePropagationSpring
0 likes · 13 min read
Understanding Spring Transaction Fundamentals and Propagation Mechanisms
Top Architect
Top Architect
Apr 16, 2021 · Backend Development

When to Use Microservices: Modules, Monoliths, and Service Boundaries

The article examines the historical evolution of software modularity, explains why microservices are an extreme reaction to monoliths, discusses isolation challenges across layers, and offers practical criteria for deciding where service boundaries should be drawn in modern backend systems.

backendisolationmicroservices
0 likes · 17 min read
When to Use Microservices: Modules, Monoliths, and Service Boundaries
Architects Research Society
Architects Research Society
Apr 11, 2021 · Cloud Native

Understanding Containerization: Isolation, Portability, Scalability, and Control

Containerization packages applications, dependencies, and configurations into isolated, portable images that run on shared operating systems, offering benefits such as isolation, scalability, flexibility, and control across development and operations environments and deployment.

Cloud NativeContainerizationDevOps
0 likes · 5 min read
Understanding Containerization: Isolation, Portability, Scalability, and Control
DataFunTalk
DataFunTalk
Jan 18, 2021 · Artificial Intelligence

Graph Algorithm Design and Optimization for Detecting Black Market Users in Virtual Networks

This article presents a comprehensive overview of using graph representation learning and clustering, particularly GraphSAGE and its optimizations, to identify and mitigate black‑market (malicious) accounts in virtual networks, discussing background, objectives, challenges such as isolation and heterogeneity, and evaluation results.

GraphSAGEblack market detectiongraph algorithms
0 likes · 13 min read
Graph Algorithm Design and Optimization for Detecting Black Market Users in Virtual Networks
Architect's Tech Stack
Architect's Tech Stack
Jun 1, 2020 · Backend Development

Fundamentals and Advanced Concepts of Spring Transaction Management

This article explains the core principles of Spring transaction management, including JDBC transaction steps, declarative @Transactional usage, AOP proxy mechanisms, propagation behaviors, isolation levels, nested transactions, and Spring Boot support, while also providing code examples and practical guidance for developers.

AOPPropagationReadOnly
0 likes · 14 min read
Fundamentals and Advanced Concepts of Spring Transaction Management
JD Retail Technology
JD Retail Technology
Jul 12, 2019 · Databases

Understanding MySQL Lock Mechanisms, Transaction Isolation, and Concurrency Control

This article explains MySQL's lock types—including table and row locks, InnoDB's shared, exclusive, and intention locks—covers lock algorithms such as record, gap, next‑key, and insert‑intention locks, discusses deadlock and blocking issues, and details transaction management, isolation levels, and related configuration parameters.

ACIDConcurrencyInnoDB
0 likes · 39 min read
Understanding MySQL Lock Mechanisms, Transaction Isolation, and Concurrency Control
Architects' Tech Alliance
Architects' Tech Alliance
Apr 3, 2019 · Databases

Choosing Between Optimistic and Pessimistic Locks in Production Systems

The article explains the concepts, advantages, and drawbacks of optimistic and pessimistic locking, provides real‑world examples such as lost updates and inconsistent reads, and offers practical guidelines and implementation techniques for selecting the appropriate concurrency control strategy in database‑driven applications.

DatabaseVersion Controlconcurrency control
0 likes · 10 min read
Choosing Between Optimistic and Pessimistic Locks in Production Systems