Tagged articles
139 articles
Page 2 of 2
360 Quality & Efficiency
360 Quality & Efficiency
Feb 28, 2020 · Operations

External Network Quality Monitoring System at 360: Architecture, Features, and Alert Strategies

The article details 360's external network quality monitoring system, explaining its background, real‑time detection features, CDN‑based source host selection, three‑layer architecture, data collection and storage pipelines, fault‑diagnosis strategies, and visualization approaches for rapid network fault localization.

AlertingCDNNetwork Monitoring
0 likes · 10 min read
External Network Quality Monitoring System at 360: Architecture, Features, and Alert Strategies
21CTO
21CTO
Feb 24, 2020 · Information Security

Top 10 Open‑Source Security Tools Every Professional Should Know

This article introduces ten essential open‑source security tools—including Nessus, Snort, Nagios, Ettercap, Infection Monkey, Delta, Cuckoo Sandbox, The Sleuth Kit, Lynis, and Certbot—detailing their main features, licensing models, and typical use cases for vulnerability scanning, intrusion detection, network monitoring, and forensic analysis.

Network Monitoringdigital forensicsencryption
0 likes · 9 min read
Top 10 Open‑Source Security Tools Every Professional Should Know
Ctrip Technology
Ctrip Technology
Feb 13, 2020 · Mobile Development

Design and Implementation of an Application Performance Management (APM) System for Mobile Apps

This article introduces the background, core features, network and page performance modules, error monitoring, reporting, and optimization practices of a mobile App Performance Management (APM) system, highlighting its impact on monitoring, diagnostics, and performance improvement for large‑scale applications.

APMNetwork MonitoringPage TTI
0 likes · 20 min read
Design and Implementation of an Application Performance Management (APM) System for Mobile Apps
360 Tech Engineering
360 Tech Engineering
Feb 6, 2020 · Operations

External Network Quality Monitoring System at 360: Architecture, Features, and Alert Strategies

The article describes how 360 implements an external network quality monitoring system that uses CDN nodes as source hosts to perform minute‑level, end‑to‑end ping measurements, stores results in time‑series and other databases, analyzes them to detect VIP, data‑center or ISP faults, and generates visualized alerts and reports for operations teams.

AlertingCDNNetwork Monitoring
0 likes · 8 min read
External Network Quality Monitoring System at 360: Architecture, Features, and Alert Strategies
JD Retail Technology
JD Retail Technology
Nov 14, 2019 · Mobile Development

Shooter Mobile Performance Monitoring Platform: Architecture, Implementation, and Key Monitoring Dimensions

The article introduces Shooter, a mobile performance monitoring platform for Android that provides non‑intrusive, lightweight SDKs to monitor app startup, jank, network, native page, and WebView performance, explains the technical solutions, data collection methods, and showcases console visualizations and real‑world empowerment cases.

AndroidNetwork MonitoringWebView
0 likes · 14 min read
Shooter Mobile Performance Monitoring Platform: Architecture, Implementation, and Key Monitoring Dimensions
Liangxu Linux
Liangxu Linux
Sep 2, 2019 · Operations

Master Linux Socket Stats: Essential ss Command Guide for Sysadmins

This guide explains the Linux ss command, its purpose for socket statistics, common options, example outputs, filtering techniques, and handy alias shortcuts, helping system administrators efficiently monitor and troubleshoot network connections.

Network MonitoringSysadmincommand-line
0 likes · 7 min read
Master Linux Socket Stats: Essential ss Command Guide for Sysadmins
dbaplus Community
dbaplus Community
Aug 26, 2019 · Operations

Boost Network Transparency: Automated Monitoring and Ops Tools for SREs

Network engineers often go unnoticed until outages, so this guide explains how to make network status transparent through device availability checks, log and traffic monitoring, SNMP error tracking, and automation scripts—leveraging Python, syslog servers, and northbound APIs—to reduce troubleshooting time and prevent incidents.

Network MonitoringPythonSNMP
0 likes · 11 min read
Boost Network Transparency: Automated Monitoring and Ops Tools for SREs
360 Tech Engineering
360 Tech Engineering
Jul 1, 2019 · Mobile Development

QDAS-APM: 360’s iOS Mobile Performance Monitoring Solution

This article introduces 360’s iOS mobile performance monitoring solution, QDAS‑APM, detailing its background, monitored metrics such as page rendering time, main‑thread stalls, network errors, FPS, CPU, memory, crash and startup duration, and explains implementation techniques using KVO, runtime class traversal, and code snippets.

KVOMobile DevelopmentNetwork Monitoring
0 likes · 12 min read
QDAS-APM: 360’s iOS Mobile Performance Monitoring Solution
Meitu Technology
Meitu Technology
Apr 22, 2019 · Mobile Development

MTHawkeye: iOS Debugging and Performance Optimization Toolkit

MTHawkeye is Meitu’s iOS debugging and performance‑optimization toolkit that provides a three‑layer architecture—foundation, UI foundation, and plugin layers—to assist developers across development, testing, and production by offering memory leak detection, main‑thread profiling, CPU, network, graphics, storage monitoring, and integrated FLEX utilities.

APMInstrumentationNetwork Monitoring
0 likes · 8 min read
MTHawkeye: iOS Debugging and Performance Optimization Toolkit
Efficient Ops
Efficient Ops
Apr 2, 2019 · Operations

How Event‑Flow Diagrams Transform Network Fault Monitoring

This article explains how visualizing network faults with an event‑flow diagram—showing data‑center, time and severity together—helps operators quickly detect, diagnose, and understand abnormal events, offering a far more intuitive alternative to traditional tabular views.

Network Monitoringaiopsevent flow diagram
0 likes · 6 min read
How Event‑Flow Diagrams Transform Network Fault Monitoring
MaGe Linux Operations
MaGe Linux Operations
Jan 23, 2019 · Operations

Mastering tcpdump: Practical Commands for Network Packet Capture

This guide explains how to use tcpdump for network packet capture, covering basic commands, filtering by interface, host, port, protocol, advanced examples, saving captures to files, and a practical troubleshooting scenario involving Nginx and a Node.js server.

LinuxNetwork MonitoringPacket Capture
0 likes · 8 min read
Mastering tcpdump: Practical Commands for Network Packet Capture
MaGe Linux Operations
MaGe Linux Operations
Oct 27, 2018 · Operations

Top 18 Linux Command-Line Tools to Monitor Network Bandwidth

This article introduces a curated list of Linux command-line utilities for monitoring network usage, detailing each tool's functionality, installation commands across major distributions, and usage examples, enabling users to track overall bandwidth, per‑process traffic, and socket‑level statistics efficiently.

LinuxNetwork MonitoringSystem Administration
0 likes · 18 min read
Top 18 Linux Command-Line Tools to Monitor Network Bandwidth
Efficient Ops
Efficient Ops
Apr 26, 2018 · Operations

How 360 Detects Network Anomalies with AI‑Powered Time‑Series Algorithms

This article explains how 360’s network operations team uses time‑series analysis, statistical thresholds, EWMA, dynamic limits, and machine‑learning models such as K‑Means and Isolation Forest to automatically detect, locate, and remediate traffic anomalies across massive data‑center exits.

AI OpsNetwork MonitoringTime Series
0 likes · 15 min read
How 360 Detects Network Anomalies with AI‑Powered Time‑Series Algorithms
MaGe Linux Operations
MaGe Linux Operations
Jan 12, 2018 · Information Security

How to Detect If Your UNIX Server Has Been Compromised: 11 Practical Checks

This guide walks through eleven hands‑on techniques for uncovering UNIX or Solaris intrusions, from inspecting password files and processes to verifying daemon configurations, network sockets, logs, core dumps, hidden files, file integrity, kernel modules, and the limits of manual detection versus IDS solutions.

Network Monitoringintrusion detectionkernel integrity
0 likes · 14 min read
How to Detect If Your UNIX Server Has Been Compromised: 11 Practical Checks
MaGe Linux Operations
MaGe Linux Operations
Jan 8, 2018 · Operations

Top 17 Open‑Source Monitoring Tools Every Ops Engineer Should Know

This article surveys the most prominent open‑source monitoring solutions—from Zabbix and Nagios to Open Falcon and Ntop—detailing their key features, scalability, and ideal use cases, helping operations teams choose the right tool as their infrastructure grows in size and complexity.

Network Monitoringopen-source
0 likes · 17 min read
Top 17 Open‑Source Monitoring Tools Every Ops Engineer Should Know
ITPUB
ITPUB
Dec 27, 2017 · Operations

Top 10 Linux Command‑Line Network Monitoring Tools You Can Run Over SSH

Managing network usage without a GUI is crucial for administrators, and this guide reviews ten command‑line Linux tools—such as iftop, vnstat, iptraf, Monitorix, dstat, bwm‑ng, ibmonitor, htop, arpwatch, and Wireshark—that help monitor traffic, diagnose issues, and maintain system performance over SSH.

LinuxNetwork MonitoringWireshark
0 likes · 8 min read
Top 10 Linux Command‑Line Network Monitoring Tools You Can Run Over SSH
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Dec 15, 2017 · Operations

Automated Fault Recovery Architecture for Alibaba's Network during Double Eleven

The article describes Alibaba's end‑to‑end automated fault recovery system for its massive network, covering extensive data collection, Spark‑based event processing, flexible alerting with Siddhi, alert convergence using PageRank, and scripted recovery actions to achieve high availability during the Double Eleven traffic surge.

Big DataNetwork MonitoringOperations
0 likes · 9 min read
Automated Fault Recovery Architecture for Alibaba's Network during Double Eleven
Efficient Ops
Efficient Ops
Nov 20, 2017 · Operations

How JD.com Scales Network Monitoring for Massive Traffic Peaks

This article explains how JD.com’s network team continuously optimizes its large‑scale infrastructure, designs effective monitoring strategies, implements practical monitoring solutions, and outlines future directions to improve network availability, fault detection, and operational efficiency across data centers and the internet backbone.

JD.comNetwork MonitoringOperations
0 likes · 16 min read
How JD.com Scales Network Monitoring for Massive Traffic Peaks
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Nov 14, 2017 · Operations

Unlocking Scalable Network Automation: Lessons from 360’s Ops Strategy

This article explores how rapid growth in network devices drives the need for comprehensive automation—covering script‑based tasks, zero‑touch provisioning, orchestration with OpenStack, device selection criteria, fault diagnosis, and monitoring—to keep operations ahead of business demands.

Fault DiagnosisNetwork MonitoringOpenStack integration
0 likes · 10 min read
Unlocking Scalable Network Automation: Lessons from 360’s Ops Strategy
Hujiang Technology
Hujiang Technology
Jun 26, 2017 · Mobile Development

iOS Network Monitoring: NSURLProtocol, Hook Techniques, and NSURLSessionTaskMetrics

The article explains the challenges of mobile network environments in China, introduces connection migration issues, and presents iOS network monitoring solutions using NSURLProtocol, code injection (Hook) with Method Swizzling, NSProxy, and Fishhook, as well as detailed usage of NSURLSessionTaskMetrics for performance analysis.

FishhookHookMethod Swizzling
0 likes · 18 min read
iOS Network Monitoring: NSURLProtocol, Hook Techniques, and NSURLSessionTaskMetrics
MaGe Linux Operations
MaGe Linux Operations
Mar 6, 2017 · Information Security

How I Stopped a Massive Linux DDoS Attack and Eradicated Hidden Rootkits

A remote Ubuntu 12.04 server suffered a sudden 800 MB traffic surge caused by a hidden backdoor that sent continuous HTTP requests to malicious IPs; by analyzing logs, using iftop, netstat, lsof, and replacing compromised tools, the author identified and removed malicious processes, restored normal traffic, and outlined preventive security measures.

Network Monitoringiptablessecurity
0 likes · 9 min read
How I Stopped a Massive Linux DDoS Attack and Eradicated Hidden Rootkits
Efficient Ops
Efficient Ops
Mar 1, 2017 · Operations

How to Build an Effective APM Platform for Enterprise IT Operations

This article shares practical insights from a senior network manager on why enterprises need Application Performance Management, how to visualize, automate, and intelligent‑ly monitor network infrastructure, define KPI metrics, select tools like Zabbix and ELK, and implement a custom APM platform to improve reliability and reduce operational friction.

APMELKIT Operations
0 likes · 19 min read
How to Build an Effective APM Platform for Enterprise IT Operations
ITPUB
ITPUB
Jan 17, 2017 · Information Security

How to Diagnose and Eradicate a Linux Trojan That Spikes Outbound Traffic

This article recounts a real‑world incident on an Ubuntu 12.04 server where massive outbound traffic was traced to a hidden trojan, detailing step‑by‑step investigation, identification of malicious processes, removal techniques, and preventive hardening measures.

Network MonitoringRootkitincident response
0 likes · 9 min read
How to Diagnose and Eradicate a Linux Trojan That Spikes Outbound Traffic
ITPUB
ITPUB
Aug 9, 2016 · Databases

Why Does Oracle RAC Throw ‘IPC Send timeout’ and How to Fix It?

The article explains the common Oracle RAC “IPC Send timeout” error, shows real alert‑log examples, analyzes root causes such as network loss, resource exhaustion, or bugs, and provides step‑by‑step troubleshooting methods including monitoring tools and configuration checks.

ClusterwareIPC Send timeoutNetwork Monitoring
0 likes · 11 min read
Why Does Oracle RAC Throw ‘IPC Send timeout’ and How to Fix It?
MaGe Linux Operations
MaGe Linux Operations
Jul 17, 2016 · Operations

Essential Linux Network Monitoring Tools: From nethogs to ntopng

This tutorial introduces a wide range of Linux command‑line network monitoring utilities—such as nethogs, nload, slurm, iftop, collectl, netstat, netwatch, speedometer, cbm, bmon, tcpdump, and ntopng—explaining their purpose, basic usage commands, and installation methods for various distributions.

LinuxNetwork Monitoringcommand-line tools
0 likes · 22 min read
Essential Linux Network Monitoring Tools: From nethogs to ntopng
Big Data and Microservices
Big Data and Microservices
Mar 22, 2016 · Operations

Top 12 Free Network Monitoring Tools for Stable Enterprise Operations

Ensuring uninterrupted network performance is critical for multi‑level organizations, and this guide compiles twelve free network monitoring solutions—such as Fiddler, Nagios, NeDi, EasyNetMonitor, Microsoft Network Monitor, Cacti, Zenoss, PRTG, BandwidthD, Icinga, The Dude, and Total Network Monitor—detailing their key features, capabilities, and visual interfaces to help IT teams select the right tool for reliable, secure operations.

IT OperationsNetwork Monitoringfree tools
0 likes · 8 min read
Top 12 Free Network Monitoring Tools for Stable Enterprise Operations
MaGe Linux Operations
MaGe Linux Operations
Jul 27, 2015 · Information Security

Master lsof: Unlock Hidden Files and Network Connections on Unix

This comprehensive guide explains how to use the powerful lsof command to list open files, inspect network connections, filter by users, processes, ports, and hosts, and apply advanced options for system monitoring and security troubleshooting on Unix-like systems.

Network MonitoringUnixlsof
0 likes · 13 min read
Master lsof: Unlock Hidden Files and Network Connections on Unix