Tagged articles
42 articles
Page 1 of 1
MaGe Linux Operations
MaGe Linux Operations
May 10, 2026 · Cloud Native

Docker Container Fails to Start? Common Causes and Troubleshooting Commands

This guide walks operators through a systematic, step‑by‑step process for diagnosing Docker container startup failures, covering status checks, log inspection, detailed use of docker inspect, and categorized troubleshooting of image, configuration, resource, permission, network, and volume issues with concrete commands and examples.

ConfigurationContainerDocker
0 likes · 27 min read
Docker Container Fails to Start? Common Causes and Troubleshooting Commands
Architect
Architect
Apr 20, 2026 · Artificial Intelligence

Why a Tiny Agent Loop Exposes the Real Engineering Hurdles of AI Agents

The article walks through building a minimal 20‑line agent loop, explains each step—from reading a task to invoking tools and feeding observations back—then shows how real systems like Claude Code, OpenClaw and Pi add layers of harness, memory, permission and validation to make the loop safe and reliable in production.

AI AgentAgent LoopFunction Calling
0 likes · 23 min read
Why a Tiny Agent Loop Exposes the Real Engineering Hurdles of AI Agents
Architect's Guide
Architect's Guide
Jun 23, 2025 · Information Security

Discover Sa-Token: The Most Feature‑Rich Java Authentication Framework

Sa-Token is a lightweight Java permission authentication framework that offers zero‑configuration login, comprehensive permission checks, session management, single sign‑on, OAuth2.0 support, distributed sessions, token customization, and many advanced features, with simple one‑line API calls illustrated by clear code examples.

AuthenticationAuthorizationFramework
0 likes · 7 min read
Discover Sa-Token: The Most Feature‑Rich Java Authentication Framework
Selected Java Interview Questions
Selected Java Interview Questions
Nov 27, 2024 · Backend Development

Designing a Flexible Permission Control System with Java Annotations and Spring AOP

This article explains how to build a scalable, maintainable permission control framework in Java by defining custom annotations, designing relational database tables, and using Spring AOP to intercept method calls for organization‑level, personal, limit, and special‑role checks, while providing implementation details and best‑practice recommendations.

BackendJavaaccess control
0 likes · 21 min read
Designing a Flexible Permission Control System with Java Annotations and Spring AOP
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Oct 24, 2024 · Backend Development

Master Fine-Grained Permission Control in Spring Boot 3 with JWT and SpEL

This article demonstrates how to implement fine‑grained permission checks in Spring Boot 3 without using Spring Security, by creating custom HandlerInterceptors, JWT utilities, DAO and service layers, and integrating SpEL expressions for dynamic authorization, complete with code snippets and test results.

Backend DevelopmentJWTSpring Boot
0 likes · 13 min read
Master Fine-Grained Permission Control in Spring Boot 3 with JWT and SpEL
Java Captain
Java Captain
Oct 17, 2024 · Backend Development

Reducing CRUD Boilerplate with APIJSON: One Interface for All Operations

This article explains how APIJSON lets developers replace dozens of SpringBoot CRUD endpoints with a single, configurable interface for GET, POST, PUT, DELETE and HEAD requests, dramatically cutting code lines while supporting complex queries, pagination, joins and role‑based permissions.

APIJSONBackendCRUD
0 likes · 7 min read
Reducing CRUD Boilerplate with APIJSON: One Interface for All Operations
Beike Product & Technology
Beike Product & Technology
Jan 12, 2024 · Information Security

Understanding High‑Risk Kubernetes RBAC Permissions and a Graph‑Based Risk Identification System

This article examines how misconfigured Kubernetes RBAC permissions can lead to privilege escalation across clusters, presents a graph‑based model to represent users, roles, and authorities, and provides code examples and Cypher queries for detecting and visualizing high‑risk permission paths.

KubernetesRBACSecurity
0 likes · 16 min read
Understanding High‑Risk Kubernetes RBAC Permissions and a Graph‑Based Risk Identification System
DeWu Technology
DeWu Technology
Dec 6, 2023 · Frontend Development

Permission Design for Front-end Monorepo in Large-Scale Development

The article presents a practical permission‑management strategy for a large‑scale front‑end monorepo that merges Git‑hook validation with GitLab’s protected branches and role‑based access, defines a clear directory hierarchy, outlines workflow controls, and explores extensions such as fine‑grained ACLs and file‑access logging to prevent unauthorized file changes.

Code reviewGitLabaccess control
0 likes · 17 min read
Permission Design for Front-end Monorepo in Large-Scale Development
Spring Full-Stack Practical Cases
Spring Full-Stack Practical Cases
Nov 27, 2023 · Backend Development

Secure Spring Boot APIs with AOP and Spring Security: A Step‑by‑Step Guide

This article explains how to combine Spring AOP and Spring Security in a Spring Boot 2.7.12 application to implement permission verification, covering concepts, required dependencies, custom filters, annotations, aspect logic, global exception handling, test endpoints, JWT token handling, and extensions for SpEL‑based role checks.

JWTSpring Bootaop
0 likes · 11 min read
Secure Spring Boot APIs with AOP and Spring Security: A Step‑by‑Step Guide
Aikesheng Open Source Community
Aikesheng Open Source Community
Aug 15, 2023 · Databases

Root Cause Analysis of MySQL Replication Error 1590 Caused by INCIDENT_EVENT During Partial Permission Changes

The article analyzes a MySQL 5.7 replication failure where the slave SQL thread stops with error 1590 because the master writes an INCIDENT_EVENT to the binlog when a GRANT or CREATE USER statement partially succeeds due to password‑validation plugin constraints, leading to replication breakage.

Incident EventReplicationdatabase
0 likes · 11 min read
Root Cause Analysis of MySQL Replication Error 1590 Caused by INCIDENT_EVENT During Partial Permission Changes
macrozheng
macrozheng
Jun 15, 2023 · Backend Development

How to Build a Reusable Backend Permission System with Spring Security

This article walks through the complete design and implementation of a reusable permission module for a Java e‑commerce backend, covering functional design, database schema, API contracts, and key technical points such as Spring Security, JWT authentication, and Redis‑based performance optimizations.

BackendJWTpermission
0 likes · 8 min read
How to Build a Reusable Backend Permission System with Spring Security
Java Architect Essentials
Java Architect Essentials
May 13, 2023 · Information Security

Sa-Token Java Authentication and Authorization Framework: Overview, Core Concepts, and SpringBoot Integration

This article introduces the lightweight Sa-Token Java framework, explains its login and permission authentication mechanisms, demonstrates essential API usage with code examples, and provides step‑by‑step integration guides for SpringBoot and WebFlux, covering configuration, session handling, role checks, wildcard permissions, and global exception handling.

AuthenticationAuthorizationSa-Token
0 likes · 23 min read
Sa-Token Java Authentication and Authorization Framework: Overview, Core Concepts, and SpringBoot Integration
Zhuanzhuan Tech
Zhuanzhuan Tech
Jun 16, 2022 · Frontend Development

Frontend SDK Design and Integration for a Unified Permission System

This article explains how to design a unified permission system's frontend SDK, detailing its core APIs, integration methods for standard React and Umi projects, dynamic route generation, and menu/button level permission controls, accompanied by practical code examples.

ReactSDKUmi
0 likes · 9 min read
Frontend SDK Design and Integration for a Unified Permission System
Architecture Digest
Architecture Digest
Dec 13, 2021 · Backend Development

Designing a Dynamic Permission Management System for Frontend‑Backend Separated Applications

This article explains a dynamic permission management solution for modern frontend‑backend separated applications, detailing user‑role‑page‑function relationships, database schema design, menu rendering, fine‑grained function controls, and backend API authorization to handle flexible, real‑time access rights.

Menuaccess controlfrontend
0 likes · 8 min read
Designing a Dynamic Permission Management System for Frontend‑Backend Separated Applications
Top Architect
Top Architect
Nov 26, 2021 · Backend Development

Simplifying CRUD and Complex Queries with APIJSON

This article demonstrates how APIJSON enables developers to implement full CRUD, query, and aggregation operations with just a few lines of code, reducing boilerplate, handling permissions, and supporting complex relational queries through a unified JSON request format.

APIJSONCRUDJSON
0 likes · 8 min read
Simplifying CRUD and Complex Queries with APIJSON
Qunar Tech Salon
Qunar Tech Salon
Nov 18, 2021 · Mobile Development

Comprehensive Guide to Android Source Code Exploration, Environment Setup, Debugging Techniques, and Permission Analysis

This article introduces Android source code directory structures, explains how to configure a local development environment with IDEGen and Android Studio, demonstrates advanced debugging methods such as method, conditional, and log breakpoints, and walks through a real‑world permission‑granting case study to illustrate source‑level analysis and modification strategies.

Android StudioDebuggingidegen
0 likes · 13 min read
Comprehensive Guide to Android Source Code Exploration, Environment Setup, Debugging Techniques, and Permission Analysis
Programmer DD
Programmer DD
Sep 22, 2021 · Information Security

Why Sa-Token Is the Simplest Java Permission Framework for SpringBoot

This article introduces Sa-Token, a lightweight Java permission authentication framework, showcases its simple API with code examples, lists its extensive features such as login, SSO, OAuth2.0 and distributed sessions, and provides Maven dependency, configuration, and quick‑start demo for SpringBoot projects.

AuthenticationJavaSa-Token
0 likes · 11 min read
Why Sa-Token Is the Simplest Java Permission Framework for SpringBoot
Top Architect
Top Architect
Jul 27, 2021 · Backend Development

Implementing Permission Validation in Spring MVC Using Custom Annotations

This article explains how to implement permission validation in Spring MVC by defining user, role, and resource tables, exploring three approaches—including request URI checks, method inspection, and custom annotations—and provides complete Java code examples for a custom annotation, controller, and interceptor to enforce access control.

Custom AnnotationInterceptorJava
0 likes · 4 min read
Implementing Permission Validation in Spring MVC Using Custom Annotations
Top Architect
Top Architect
Jul 2, 2020 · Information Security

Designing Dynamic Role‑Based Permission Management for Front‑End/Back‑End Separated Admin Systems

The article presents a comprehensive approach to dynamic role‑based permission management in a front‑end/back‑end separated admin system, covering user‑role‑page‑function relationships, database schema design, front‑end menu rendering, route guarding, fine‑grained function control, and backend API authorization.

access controlfrontendpermission
0 likes · 10 min read
Designing Dynamic Role‑Based Permission Management for Front‑End/Back‑End Separated Admin Systems
Manbang Technology Team
Manbang Technology Team
Apr 2, 2020 · Operations

Operational Security and Automation: The “Nuclear Button” Strategy

The article examines the critical challenges of operational security in internet companies, proposes a “nuclear button” permission‑minimization framework, and outlines practical automation solutions such as bastion hosts, Ansible task control, and backup management to balance safety, cost, and efficiency.

AnsibleAutomationBackup
0 likes · 9 min read
Operational Security and Automation: The “Nuclear Button” Strategy
iQIYI Technical Product Team
iQIYI Technical Product Team
Sep 1, 2017 · Mobile Development

Implementing Permission Handling, Data Loading, and File Selection in a Daydream Unity Media Player

The article details how to integrate Android permission handling, directory loading, thumbnail browsing, and smooth paged scrolling into a Unity‑based Daydream media player, explaining scripts for requesting permissions, populating file selector pages, snapping to pages, and managing scroll events to enable VR file selection and playback.

AndroidDaydreamFileSelection
0 likes · 15 min read
Implementing Permission Handling, Data Loading, and File Selection in a Daydream Unity Media Player