Tagged articles
33 articles
Page 1 of 1
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
May 7, 2026 · Information Security

Secure Anything with Google Tink: Encrypt Everywhere in Just Three Lines

This article introduces Google Tink, an open‑source cryptographic library for Java, explains its design goals and primitive abstractions, and walks through concise code examples that generate keysets, perform AEAD encryption, stream large files, compute MACs, and create digital signatures, all with minimal boilerplate.

AEADGoogle TinkJava
0 likes · 13 min read
Secure Anything with Google Tink: Encrypt Everywhere in Just Three Lines
Old Zhang's AI Learning
Old Zhang's AI Learning
Apr 18, 2026 · Artificial Intelligence

How to Run MiniMax‑M2.7 on Mac: Comparing Two Quantization Paths

This article explains why standard uniform quantization fails for the 228‑billion‑parameter MiniMax‑M2.7 MoE model on macOS, and compares two practical solutions—JANGTQ + MLX Studio with 2‑bit mixed‑precision achieving 91.5 % MMLU using 56.5 GB, and LM Studio + GGUF which is easier but requires at least 138 GB RAM and yields lower accuracy.

JANGTQLM StudioMLX Studio
0 likes · 8 min read
How to Run MiniMax‑M2.7 on Mac: Comparing Two Quantization Paths
Old Zhang's AI Learning
Old Zhang's AI Learning
Apr 1, 2026 · Artificial Intelligence

Running Large Models Locally on Mac: The Most Powerful Current Solution

This article reviews the JANG quantization format, the vMLX inference engine with a five‑layer cache stack, and the MLX Studio GUI, showing how their combination enables 397B‑parameter models to fit on 128 GB Apple Silicon Macs, achieve up to 224× faster first‑token latency for 100K context, and provide a full‑featured local AI experience.

Apple SiliconJANGMLX Studio
0 likes · 8 min read
Running Large Models Locally on Mac: The Most Powerful Current Solution
Old Zhang's AI Learning
Old Zhang's AI Learning
Mar 19, 2026 · Artificial Intelligence

Testing the Hot oMLX on Mac: Claude‑Opus‑4.6 Distilled and Qwen3.5‑9B Performance Review

The article evaluates oMLX, a Mac‑only LLM runtime built on Apple Silicon and MLX, by walking through installation, UI features, memory usage, single‑request speed, benchmark results for Claude‑Opus‑4.6 and Qwen3.5‑9B, continuous batch processing gains, Claude Code optimizations, multi‑model support, and the failure to run a 27B model.

Apple SiliconBenchmarkClaude Opus
0 likes · 9 min read
Testing the Hot oMLX on Mac: Claude‑Opus‑4.6 Distilled and Qwen3.5‑9B Performance Review
Old Zhang's AI Learning
Old Zhang's AI Learning
Feb 17, 2026 · Artificial Intelligence

Running Qwen3.5 Locally: Step‑by‑Step Guide with Unsloth Dynamic Quantization

This article explains how to run the 397B Qwen3.5 model on a Mac by using Unsloth Dynamic 2.0 quantization (2‑bit, 3‑bit, or 4‑bit), outlines hardware requirements, provides compilation and download commands for llama.cpp, shows how to launch inference in thinking and non‑thinking modes, and compares several deployment options such as llama‑server, Transformers, SGLang/vLLM, and MLX.

Dynamic QuantizationGGUFLLM deployment
0 likes · 14 min read
Running Qwen3.5 Locally: Step‑by‑Step Guide with Unsloth Dynamic Quantization
Deepin Linux
Deepin Linux
Feb 5, 2026 · Fundamentals

Unlocking Ethernet: How MAC and PHY Drive Your Network Traffic

This article demystifies Ethernet by explaining the roles of MAC and PHY within the network protocol stack, covering OSI and TCP/IP models, data encapsulation, ARP address resolution, hardware interfaces like MII/MDIO, and practical troubleshooting tips for real‑world network devices.

HardwareMacOSI model
0 likes · 36 min read
Unlocking Ethernet: How MAC and PHY Drive Your Network Traffic
Eric Tech Circle
Eric Tech Circle
Dec 24, 2024 · Fundamentals

Essential Mac Apps Every Web Full‑Stack Developer Should Use

This guide lists the must‑have macOS applications for web full‑stack developers, covering productivity terminals, markdown editors, IDEs, mobile mini‑program tools, container management, database clients, lightweight editors, AI‑enhanced code editors, and essential package managers to streamline the entire development workflow.

DockerIDEMac
0 likes · 7 min read
Essential Mac Apps Every Web Full‑Stack Developer Should Use
Deepin Linux
Deepin Linux
Dec 16, 2024 · Fundamentals

Understanding Ethernet MAC and PHY Layers: Common Issues and Solutions

This article explains the roles of Ethernet MAC and PHY layers, outlines typical hardware and software problems such as connection faults, power instability, and driver misconfigurations, and provides detailed troubleshooting steps and best‑practice solutions to restore reliable network communication.

HardwareMIIMac
0 likes · 31 min read
Understanding Ethernet MAC and PHY Layers: Common Issues and Solutions
Deepin Linux
Deepin Linux
Jul 12, 2024 · Fundamentals

Understanding Ethernet: MAC, PHY, MII, and SMI Interfaces

This article provides a comprehensive overview of Ethernet technology, explaining the roles of MAC and PHY chips, the OSI layer interactions, and the various interfaces such as MII, RMII, GMII, RGMII, and SMI, along with practical hardware integration details.

MIIMacNetworking
0 likes · 21 min read
Understanding Ethernet: MAC, PHY, MII, and SMI Interfaces
IT Services Circle
IT Services Circle
Sep 5, 2023 · Fundamentals

Microsoft Announces Retirement of Visual Studio for Mac IDE

Microsoft announced that Visual Studio for Mac will be retired, ending support after August 31, 2024, and explained its history from SharpDevelop to Xamarin Studio, the reasons for low adoption, and offered alternatives such as VS Code with C# Dev Kit, VM-based Windows VS, and JetBrains Rider.

C#IDEMac
0 likes · 8 min read
Microsoft Announces Retirement of Visual Studio for Mac IDE
Coolpad Technology Team
Coolpad Technology Team
Apr 13, 2022 · Fundamentals

Understanding Network Layers, MAC, DHCP, TCP Handshake/Teardown and Common WiFi Issues on Android

This article explains the purpose of network layering, the role of the MAC layer, DHCP and TCP mechanisms, and provides a systematic analysis approach for common Android Wi‑Fi problems such as connection failures, DHCP issues, authentication errors, disconnections, RSSI weakness, beacon time‑outs, ARP/DNS failures, data stalls, TX/RX anomalies, AP‑side events and roaming triggers.

DHCPMacWiFi
0 likes · 25 min read
Understanding Network Layers, MAC, DHCP, TCP Handshake/Teardown and Common WiFi Issues on Android
Java Backend Technology
Java Backend Technology
Jan 25, 2022 · Information Security

Can HTTPS Stop Replay Attacks? Deep Dive into TLS Handshake and MAC

This article walks through the TLS handshake, explains how client and server derive symmetric keys and MAC secrets, illustrates the encryption process, and shows why the sequence number in TLS MAC calculations prevents replay attacks, answering whether HTTPS can block such attacks.

HTTPSKey derivationMac
0 likes · 9 min read
Can HTTPS Stop Replay Attacks? Deep Dive into TLS Handshake and MAC
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Jun 4, 2021 · Information Security

Overview of SELinux and Its Use in Android

The article explains SELinux’s origins, core architecture, mandatory access control mechanisms such as type enforcement and MLS, and how Android incorporates SELinux as SEAndroid—detailing its evolution from permissive to enforcing mode, policy file structure, Android O’s split policies, and example domain and object transitions.

AndroidMacSELinux
0 likes · 17 min read
Overview of SELinux and Its Use in Android
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Apr 25, 2021 · Fundamentals

Configuring Linux Network: Files, Routing, IP/MAC Headers, and Common Connection Methods

This article explains how to configure Linux network interfaces, interpret configuration files, set up DNS and hosts, understand routing (static and dynamic), examine IP and MAC header structures, apply CIDR subnetting, differentiate private and public addresses, and choose common virtual networking methods such as bridge, NAT, and host‑only.

LinuxMacNetwork Configuration
0 likes · 16 min read
Configuring Linux Network: Files, Routing, IP/MAC Headers, and Common Connection Methods
Wukong Talks Architecture
Wukong Talks Architecture
Mar 29, 2021 · Fundamentals

Essential Mac Development Tools and Shortcuts for New Mac Users

This article introduces a curated set of productivity shortcuts, package managers, command‑line enhancements, writing utilities, and core development tools for macOS, guiding new Mac owners through installation, configuration, and efficient usage to boost their software development workflow.

GitHomebrewMac
0 likes · 10 min read
Essential Mac Development Tools and Shortcuts for New Mac Users
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Feb 1, 2021 · Fundamentals

Configuring Linux Network, Routing, and IP Fundamentals

This article explains how to configure Linux network settings, describes the contents of key configuration files such as ifcfg, /etc/resolv.conf, and /etc/hosts, and introduces routing concepts, static and dynamic routes, gateways, IP/MAC headers, CIDR, and common virtual networking methods.

LinuxMacNetwork Configuration
0 likes · 17 min read
Configuring Linux Network, Routing, and IP Fundamentals
Programmer DD
Programmer DD
Nov 20, 2020 · Backend Development

Can Docker Run Natively on Apple M1 Macs? What You Need to Know

Docker confirms plans to support Apple Silicon Macs but faces several technical hurdles, requiring pipeline changes, reliance on Go and Electron, and coordination with other virtualization tools like VMware and Parallels to deliver a seamless Docker Desktop experience on M1 devices.

Apple SiliconBackend DevelopmentDocker
0 likes · 4 min read
Can Docker Run Natively on Apple M1 Macs? What You Need to Know
Tencent Music Tech Team
Tencent Music Tech Team
Jun 23, 2020 · Frontend Development

Automating Front-End Development Environment with Alfred Workflows and AppleScript

The article demonstrates how to replace the half‑minute, error‑prone manual steps of launching WebStorm, iTerm, Whistle proxy, and enabling Chrome extensions with a single Alfred workflow that uses AppleScript to open apps, run commands, and toggle extensions, dramatically streamlining front‑end development setup.

AlfredAppleScriptMac
0 likes · 4 min read
Automating Front-End Development Environment with Alfred Workflows and AppleScript
Alibaba Cloud Developer
Alibaba Cloud Developer
Aug 30, 2018 · Information Security

How Alice & Bob Outsmart Eavesdroppers: A Fun Guide to Encryption, MACs, and Digital Signatures

This article uses a playful story of Alice, Bob, Eve, Mallory, and Trent to explain the fundamentals of symmetric and asymmetric encryption, message authentication codes, digital signatures, and public‑key certificates, showing how each technique protects confidentiality, integrity, and authenticity in communications.

CertificateMacasymmetric key
0 likes · 14 min read
How Alice & Bob Outsmart Eavesdroppers: A Fun Guide to Encryption, MACs, and Digital Signatures
21CTO
21CTO
Nov 10, 2017 · Information Security

Symmetric vs Asymmetric Encryption: MACs, Signatures & Certificates Explained

This article explains the fundamentals of symmetric and asymmetric encryption, the key distribution challenges they face, how hybrid cryptosystems combine their strengths, and introduces essential cryptographic tools such as hash functions, message authentication codes, digital signatures, and public‑key certificates, comparing their capabilities.

CertificateMacdigital signature
0 likes · 15 min read
Symmetric vs Asymmetric Encryption: MACs, Signatures & Certificates Explained
WeChat Backend Team
WeChat Backend Team
Dec 9, 2016 · Information Security

Understanding TLS Record Protocol: Encryption, MAC, and Key Management

This article explains how the TLS record layer encrypts and authenticates application data by fragmenting, sequencing, optionally compressing, encrypting, computing HMAC, and transmitting over TCP/IP, while detailing the security parameters, key derivation, and the evolution from MAC‑then‑Encrypt to AEAD modes.

AEADKey ExpansionMac
0 likes · 15 min read
Understanding TLS Record Protocol: Encryption, MAC, and Key Management