Tagged articles
2152 articles
Page 11 of 22
Architects Research Society
Architects Research Society
Jun 15, 2023 · Information Security

Understanding Federated Identity Management: Concepts, Roles, Benefits, and Use Cases

Federated identity management enables users to access multiple applications across trusted domains using a single digital identity, detailing its core roles, benefits, inbound/outbound federation, account linking, just‑in‑time provisioning, home‑realm discovery, and its use as an IAM transition strategy.

IAMSingle Sign-Onaccount linking
0 likes · 15 min read
Understanding Federated Identity Management: Concepts, Roles, Benefits, and Use Cases
Data Thinking Notes
Data Thinking Notes
Jun 14, 2023 · Big Data

Why Data Warehouse Standards Matter and How to Implement Them Effectively

This article explains why data‑warehouse standards are essential for improving team efficiency, product quality, and maintenance costs, and provides a step‑by‑step guide covering standard creation, discussion, rollout, supervision, continuous improvement, as well as detailed design, process, quality, and security specifications.

Big DataStandardsdata modeling
0 likes · 18 min read
Why Data Warehouse Standards Matter and How to Implement Them Effectively
Laravel Tech Community
Laravel Tech Community
Jun 13, 2023 · Information Security

Understanding Tokens, JWT, and Authentication Security

This article explains the principles, structure, and workflow of token‑based authentication—including access and refresh tokens, JWT, CSRF attacks, same‑origin policy, cross‑origin solutions, and common encryption algorithms—highlighting their advantages, limitations, and practical usage in modern web and mobile applications.

AuthenticationJWTToken
0 likes · 18 min read
Understanding Tokens, JWT, and Authentication Security
ITPUB
ITPUB
Jun 12, 2023 · Information Security

Inside Microsoft’s May 2023 Patch: Win32k Exploit Details and Visual Studio Vulnerability

Microsoft’s May 2023 security update addressed 52 CVEs, including a critical Win32k privilege‑escalation flaw (CVE‑2023‑29336) exploited in the wild and a Visual Studio installer UI vulnerability (CVE‑2023‑28299), with researchers detailing the attack vectors, proof‑of‑concept exploits, and mitigation strategies.

CVE-2023-29336Information SecurityMicrosoft
0 likes · 6 min read
Inside Microsoft’s May 2023 Patch: Win32k Exploit Details and Visual Studio Vulnerability
DevOps Engineer
DevOps Engineer
Jun 11, 2023 · Information Security

Understanding SLSA: A Guide to Software Supply Chain Security and Levels

This article explains the SLSA (Supply chain Levels for Software Artifacts) framework, outlines common software supply‑chain threats, details the four SLSA levels and their requirements, discusses limitations, and reviews tools such as OpenSSF Scorecard, slsa‑verifier and Sigstore for improving software artifact integrity.

SLSAartifact provenanceci/cd
0 likes · 15 min read
Understanding SLSA: A Guide to Software Supply Chain Security and Levels
Open Source Linux
Open Source Linux
Jun 6, 2023 · Fundamentals

Master Computer Networking: From Basic Concepts to Advanced Protocols Explained

This comprehensive guide covers fundamental networking concepts, including link, node, protocol, service, PDU layers, network topologies, TCP/IP architecture, routing algorithms, security mechanisms, and practical commands, providing a complete overview for students and professionals seeking to deepen their understanding of modern computer networks.

Computer NetworksNetwork ProtocolsTCP/IP
0 likes · 58 min read
Master Computer Networking: From Basic Concepts to Advanced Protocols Explained
Programmer DD
Programmer DD
Jun 4, 2023 · Information Security

How to Secure Your ChatGPT‑Web Deployment from Free API Exploits

This article explains how the default title of the open‑source ChatGPT‑web project makes deployments vulnerable to discovery by asset‑search engines like FOFA and Shodan, leading to unauthorized API usage, and provides practical steps—changing the title and adding authentication—to protect the site and prevent unexpected costs.

AuthenticationChatGPT-webFOFA
0 likes · 6 min read
How to Secure Your ChatGPT‑Web Deployment from Free API Exploits
Open Source Linux
Open Source Linux
May 30, 2023 · Operations

Essential Linux Ops Interview Questions & Answers for Sysadmins

A comprehensive collection of Linux operations interview questions covering topics such as system administration, RAID configurations, load balancing, middleware, MySQL troubleshooting, network monitoring, security, scripting, and best practices for optimizing and maintaining Linux servers.

LinuxLoadBalancingNetworking
0 likes · 38 min read
Essential Linux Ops Interview Questions & Answers for Sysadmins
DataFunSummit
DataFunSummit
May 25, 2023 · Artificial Intelligence

Edge‑Cloud Perspectives on Graph Neural Network‑Based Recommendation Systems

From an edge‑cloud viewpoint, this article examines the feasibility of deploying graph neural network (GNN) recommendation systems on devices, covering underlying compute evolution, personalization, edge‑cloud collaboration, model compression, deployment strategies, and security challenges, while referencing recent research advances.

AIEdge ComputingGNN
0 likes · 12 min read
Edge‑Cloud Perspectives on Graph Neural Network‑Based Recommendation Systems
Architects Research Society
Architects Research Society
May 24, 2023 · Information Security

Best Practices for Secure Remote Access to Industrial Control Systems (ICS)

This article explains why remote access to industrial control systems is essential, outlines the risks demonstrated by high‑profile attacks, and provides detailed best‑practice guidance—including DMZ architecture, authentication, jump hosts, file transfer, and policies for direct connections—to securely manage OT environments.

AuthenticationDMZICS
0 likes · 18 min read
Best Practices for Secure Remote Access to Industrial Control Systems (ICS)
NetEase Smart Enterprise Tech+
NetEase Smart Enterprise Tech+
May 23, 2023 · Information Security

How to Seamlessly Migrate and Validate Anti‑Cheat Services Across Environments

This article details the end‑to‑end process of migrating an anti‑cheat service to a new data center, verifying strategy effectiveness, building a real‑sample regression pipeline, and automating integration steps using GoAPI and traffic‑comparison platforms to ensure functional consistency and security.

Operationsanti-cheatenvironment migration
0 likes · 9 min read
How to Seamlessly Migrate and Validate Anti‑Cheat Services Across Environments
Open Source Linux
Open Source Linux
May 22, 2023 · Information Security

Top 10 Linux Antivirus Solutions to Secure Your Servers

This article reviews the ten most effective Linux antivirus tools, explains why protection is essential despite Linux's inherent security, and provides concise descriptions of each solution—including Avast, Chkrootkit, ESET NOD32, F‑PROT, Panda Cloud Cleaner, Rootkit Hunter, ClamAV, Firetools, Comodo, and Sophos—to help users choose the right protection for their systems.

AntivirusLinuxRootkit
0 likes · 7 min read
Top 10 Linux Antivirus Solutions to Secure Your Servers
Selected Java Interview Questions
Selected Java Interview Questions
May 21, 2023 · Fundamentals

Introduction to Linux: Basics, Commands, Learning Paths, Desktop Environments, Filesystem Standards, and Security

This article provides a comprehensive overview of Linux fundamentals, covering its basic concepts, essential commands, learning roadmaps, desktop environments, the Filesystem Hierarchy Standard, important directories, kernel study paths, security considerations, and includes reference tables and a community invitation.

FilesystemLearning PathLinux
0 likes · 2 min read
Introduction to Linux: Basics, Commands, Learning Paths, Desktop Environments, Filesystem Standards, and Security
php Courses
php Courses
May 20, 2023 · Information Security

Preventing Brute‑Force Attacks in PHP Applications

This article explains what brute‑force attacks are, why they threaten PHP applications, and presents three practical defenses—two‑factor authentication, enforced password policies, and brute‑force mitigation techniques—along with complete PHP code examples for each method.

PHPTwo-Factor Authenticationbrute force
0 likes · 4 min read
Preventing Brute‑Force Attacks in PHP Applications
Liangxu Linux
Liangxu Linux
May 14, 2023 · Fundamentals

Comprehensive Guide to Computer Networking: From Physical Layer to Security

This extensive guide covers networking fundamentals across all OSI layers, detailing concepts such as links, nodes, protocols, PDU structures, network topologies, TCP/IP encapsulation, transport protocols, application services, security mechanisms, wireless LAN technologies, and key command‑line tools, providing a complete reference for students and professionals alike.

NetworkingOSI modelProtocols
0 likes · 60 min read
Comprehensive Guide to Computer Networking: From Physical Layer to Security
Java Architect Essentials
Java Architect Essentials
May 14, 2023 · Backend Development

Comprehensive Guide to Spring Boot Backend API Design: Validation, Global Exception Handling, Unified Response, Version Control, and Security

This article presents a step‑by‑step tutorial on building robust Spring Boot backend APIs, covering environment setup, parameter validation techniques, global exception handling, unified response structures, optional response wrapping, API versioning via path or header, and comprehensive security measures such as token authentication, timestamp checks, request signing, replay protection, and HTTPS.

APIException HandlingSpring Boot
0 likes · 26 min read
Comprehensive Guide to Spring Boot Backend API Design: Validation, Global Exception Handling, Unified Response, Version Control, and Security
Java Architect Essentials
Java Architect Essentials
May 13, 2023 · Information Security

Sa-Token Java Authentication and Authorization Framework: Overview, Core Concepts, and SpringBoot Integration

This article introduces the lightweight Sa-Token Java framework, explains its login and permission authentication mechanisms, demonstrates essential API usage with code examples, and provides step‑by‑step integration guides for SpringBoot and WebFlux, covering configuration, session handling, role checks, wildcard permissions, and global exception handling.

AuthenticationAuthorizationSa-Token
0 likes · 23 min read
Sa-Token Java Authentication and Authorization Framework: Overview, Core Concepts, and SpringBoot Integration
Top Architect
Top Architect
May 8, 2023 · Backend Development

API Gateway Design, Functions, and Comparison in Microservice Architecture

This article explains the role, functions, and design principles of API gateways in microservice architectures, compares popular implementations such as OpenResty, Kong, Zuul, and Spring Cloud Gateway, and offers practical guidance on performance, availability, and scalability considerations.

Microservicesload balancingsecurity
0 likes · 23 min read
API Gateway Design, Functions, and Comparison in Microservice Architecture
Liangxu Linux
Liangxu Linux
May 7, 2023 · Operations

Essential Linux Ops Tools: Monitoring, Performance, and Security Utilities

This guide introduces a collection of practical Linux operation tools—including Nethogs, IOZone, IOTop, IPtraf, iftop, HTop, NMON, MultiTail, Fail2ban, Tmux, Agedu, NMap, and Httperf—detailing their purpose, installation commands, usage examples, and key options for system administrators.

Linuxmonitoringperformance
0 likes · 12 min read
Essential Linux Ops Tools: Monitoring, Performance, and Security Utilities
Laravel Tech Community
Laravel Tech Community
May 4, 2023 · Information Security

Go 1.20.4 and 1.19.9 Release: Security Fixes in html/template

The Go 1.20.4 and 1.19.9 releases address three critical security vulnerabilities in the html/template package, including improper handling of CSS values, JavaScript whitespace, and HTML empty attributes, which could lead to unintended HTML injection and attribute manipulation.

CVEGoHTML template
0 likes · 2 min read
Go 1.20.4 and 1.19.9 Release: Security Fixes in html/template
php Courses
php Courses
May 2, 2023 · Backend Development

PHP Payment Development: Interview Questions and Answers

This article presents a comprehensive collection of PHP payment interview questions covering implementation steps, amount validation, SQL injection prevention, request fraud protection, data encryption, secure credential storage, callback handling, and OAuth integration, providing detailed answers and code examples for each topic.

PHPPayment Integrationbackend-development
0 likes · 7 min read
PHP Payment Development: Interview Questions and Answers
Liangxu Linux
Liangxu Linux
Apr 26, 2023 · Operations

Essential Linux Ops Practices to Prevent Disasters

Drawing from years of sysadmin experience, this guide lists concrete Linux operational habits—such as rigorous backups, cautious use of rm‑rf, single‑person changes, SSH hardening, firewall rules, monitoring, and disciplined performance tuning—to help teams avoid costly production failures.

Linuxmonitoringperformance tuning
0 likes · 12 min read
Essential Linux Ops Practices to Prevent Disasters
Sohu Tech Products
Sohu Tech Products
Apr 26, 2023 · Backend Development

Designing Robust and Idempotent APIs: Principles and Practices

This article explores essential API design principles—idempotency, robustness, and security—by discussing practical techniques such as request locks, database unique constraints, Redis distributed locks, token‑based authentication, JWT, and defensive coding practices to ensure reliable, safe, and maintainable backend services.

BackendIdempotencyRobustness
0 likes · 36 min read
Designing Robust and Idempotent APIs: Principles and Practices
MaGe Linux Operations
MaGe Linux Operations
Apr 25, 2023 · Backend Development

Choosing JWT vs Session: A Practical Guide to Secure Backend Authentication

This article compares JWT and session authentication, explains their differences, security and performance trade‑offs, and provides a complete Java implementation with Redis integration, guiding developers on selecting and implementing the most suitable authentication method for distributed backend systems.

AuthenticationJWTSession
0 likes · 14 min read
Choosing JWT vs Session: A Practical Guide to Secure Backend Authentication
Liangxu Linux
Liangxu Linux
Apr 23, 2023 · Information Security

Force Users to Change Their Linux Password on Next Login

Learn how to enforce password changes for Linux users by adjusting the minimum password age with chage or expiring the password using passwd, ensuring stronger security while providing clear step‑by‑step commands and execution guidance.

LinuxPassword ManagementSystem Administration
0 likes · 4 min read
Force Users to Change Their Linux Password on Next Login
MaGe Linux Operations
MaGe Linux Operations
Apr 19, 2023 · Cloud Native

How to Securely Validate Kubernetes YAML: Best Practices & Tools

This article explains why YAML is the preferred format for defining Kubernetes applications, outlines the three validation levels—structural, semantic, and security—and recommends practical tools and best‑practice workflows to ensure configurations are correct and safe before deployment.

Configuration ValidationDevSecOpsKubeval
0 likes · 7 min read
How to Securely Validate Kubernetes YAML: Best Practices & Tools
AntTech
AntTech
Apr 19, 2023 · Information Security

ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure‑Aware Directed Greybox Fuzzing

The paper presents ODDFuzz, a structure‑aware directed greybox fuzzing framework that combines lightweight static taint analysis with targeted fuzzing to efficiently discover previously unknown Java deserialization (ODD) vulnerabilities, achieving higher recall and precision than existing tools and uncovering six new CVE‑rated bugs in popular Java frameworks.

DeserializationODDFuzzfuzzing
0 likes · 19 min read
ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure‑Aware Directed Greybox Fuzzing
21CTO
21CTO
Apr 13, 2023 · Information Security

How a Redis Client Bug Exposed ChatGPT Users’ Data – What Went Wrong?

A recent OpenAI investigation revealed that a bug in the redis-py client caused ChatGPT to leak conversation histories and personal details of about 1.2% of Plus users, prompting a temporary service shutdown and a rapid patch deployment.

BackendChatGPTdata leak
0 likes · 6 min read
How a Redis Client Bug Exposed ChatGPT Users’ Data – What Went Wrong?
Architects Research Society
Architects Research Society
Apr 12, 2023 · Databases

Introduction to Time Series Data and Best Practices with MongoDB

This article introduces time series data concepts, outlines the challenges of storing and analyzing high‑frequency data, and presents best‑practice guidelines for building MongoDB‑based time‑series applications, covering ingestion, read/write workloads, retention, security, and real‑world use cases.

AnalyticsDatabase designMongoDB
0 likes · 12 min read
Introduction to Time Series Data and Best Practices with MongoDB
Open Source Linux
Open Source Linux
Apr 12, 2023 · Information Security

Master Linux Security: Essential Baseline Hardening Scripts Explained

This article walks through why Linux servers need baseline hardening, explains baseline concepts and scanning, and provides a comprehensive collection of shell scripts that automatically check and enforce security settings such as password policies, file permissions, service configurations, and network controls.

Baseline HardeningLinuxcompliance
0 likes · 23 min read
Master Linux Security: Essential Baseline Hardening Scripts Explained
MaGe Linux Operations
MaGe Linux Operations
Apr 6, 2023 · Cloud Native

How to Secure Multi‑Tenant Kubernetes Clusters: Best Practices & Strategies

This article explains the concept of multi‑tenant Kubernetes clusters, outlines common enterprise scenarios such as internal shared clusters and SaaS/KaaS models, and presents practical security and resource‑scheduling techniques—including RBAC, NetworkPolicy, PSP, OPA, and dedicated nodes—to achieve reliable isolation.

Cloud NativeResource Quotaaccess control
0 likes · 13 min read
How to Secure Multi‑Tenant Kubernetes Clusters: Best Practices & Strategies
Efficient Ops
Efficient Ops
Apr 3, 2023 · Cloud Native

How to Secure Multi‑Tenant Kubernetes Clusters: Best Practices & Architecture

This article explains the concept of multi‑tenant Kubernetes clusters, outlines common enterprise scenarios, and details native security mechanisms such as RBAC, NetworkPolicy, PodSecurityPolicy, OPA, resource quotas, and dedicated nodes to achieve effective isolation and protect sensitive data.

Cloud NativeKubernetesNetworkPolicy
0 likes · 12 min read
How to Secure Multi‑Tenant Kubernetes Clusters: Best Practices & Architecture
MaGe Linux Operations
MaGe Linux Operations
Apr 2, 2023 · Information Security

How to Harden SSH on Linux: 8 Essential Security Steps

This guide explains why the default SSH configuration is risky and provides eight practical measures—including disabling root login, changing the default port, restricting password use, and employing key‑based authentication—to secure SSH access on Linux servers.

LinuxSSHServer Hardening
0 likes · 6 min read
How to Harden SSH on Linux: 8 Essential Security Steps
Liangxu Linux
Liangxu Linux
Apr 1, 2023 · Information Security

Master Linux Security Hardening: Essential Baseline Scripts and Checks

This guide explains why Linux servers need security baseline hardening, describes baseline scanning, and provides a comprehensive set of Bash scripts that back up critical files, enforce password policies, restrict services, adjust file permissions, and verify system integrity to protect against common vulnerabilities.

BaselineHardeningLinux
0 likes · 24 min read
Master Linux Security Hardening: Essential Baseline Scripts and Checks
Top Architect
Top Architect
Mar 29, 2023 · Information Security

Understanding OAuth2.0: Principles, Architecture, and Implementation

This article explains the fundamentals of OAuth2.0, distinguishes it from SSO, describes the roles of resource owner, client, authorization server and resource server, outlines the step‑by‑step authorization flow, and clarifies related terminology such as authentication, federated identity, and delegated authorization.

AuthenticationAuthorizationOAuth2.0
0 likes · 13 min read
Understanding OAuth2.0: Principles, Architecture, and Implementation
DataFunSummit
DataFunSummit
Mar 29, 2023 · Backend Development

Analysis of the Redis‑py Bug that Caused a ChatGPT Data Leak

A recent Redis‑py library vulnerability caused ChatGPT to expose personal data of about 1.2% of Plus users, prompting an OpenAI apology, a detailed post‑mortem, and a series of backend and security fixes to prevent similar incidents.

BackendChatGPTDataLeak
0 likes · 5 min read
Analysis of the Redis‑py Bug that Caused a ChatGPT Data Leak
Laravel Tech Community
Laravel Tech Community
Mar 28, 2023 · Backend Development

2023 Spring Salary Trends for Chinese Software Engineers Across Roles

The article analyzes post‑pandemic salary changes in China for various tech positions—including backend (Java, PHP, Python), frontend, network security, mobile, testing, operations, data analysis, algorithm engineering, and architecture—showing modest growth in most areas with notable declines for Python and Android developers.

BackendChinaMobile
0 likes · 5 min read
2023 Spring Salary Trends for Chinese Software Engineers Across Roles
Java Architecture Diary
Java Architecture Diary
Mar 28, 2023 · Information Security

Understanding OAuth 2.0 Device Authorization Flow (RFC 8628)

OAuth 2.0 Device Authorization (RFC 8628) defines a secure flow for granting access tokens to devices lacking browsers or input capabilities, detailing the roles of client devices, authorization servers, user codes, device codes, polling, and token issuance, illustrated with a TV‑mobile example.

AuthorizationDevice FlowOAuth
0 likes · 3 min read
Understanding OAuth 2.0 Device Authorization Flow (RFC 8628)
Tencent Cloud Developer
Tencent Cloud Developer
Mar 24, 2023 · Industry Insights

Inside QQ Browser: How Tencent’s TBS Engine Powers Billions of Docs

This interview explores the evolution of QQ Browser from its 2009 launch, the technical challenges of building a mobile web rendering engine, the role of Tencent Browser Service (TBS) in document and media handling, performance and security optimizations, market positioning, and future product strategies.

Industry AnalysisMobile BrowsersQQ Browser
0 likes · 15 min read
Inside QQ Browser: How Tencent’s TBS Engine Powers Billions of Docs
Java Architecture Diary
Java Architecture Diary
Mar 22, 2023 · Information Security

Understanding Spring Framework DoS Vulnerability CVE-2023-20861 and How to Fix It

This article explains the Spring Framework DoS vulnerability (CVE‑2023‑20861), outlines affected versions, details the root cause in SpEL expression handling, and provides step‑by‑step mitigation and upgrade instructions for both Spring Framework and Spring Boot, along with references and security considerations.

CVE-2023-20861DoSMitigation
0 likes · 7 min read
Understanding Spring Framework DoS Vulnerability CVE-2023-20861 and How to Fix It
Aikesheng Open Source Community
Aikesheng Open Source Community
Mar 21, 2023 · Databases

MySQL 8.0 New Features: Performance, Security, Optimizer, and Other Enhancements

This article provides a comprehensive overview of MySQL 8.0 enhancements, covering performance improvements such as contention‑aware scheduling and hash joins, security upgrades including authentication plugins and password policies, optimizer refinements, and various other features like persistent variables, GIS support, and binlog expiration handling.

Hash JoinJSONReplication
0 likes · 16 min read
MySQL 8.0 New Features: Performance, Security, Optimizer, and Other Enhancements
政采云技术
政采云技术
Mar 21, 2023 · Information Security

In‑Depth Analysis of Spring Security Authentication Process and Core Components

This article provides a comprehensive walkthrough of Spring Security’s authentication mechanism, detailing the filter chain, core security components, and the underlying source‑code flow—from UsernamePasswordAuthenticationFilter through AuthenticationManager, ProviderManager, and DaoAuthenticationProvider—illustrated with code examples and diagrams.

AuthenticationAuthorizationBackend
0 likes · 20 min read
In‑Depth Analysis of Spring Security Authentication Process and Core Components
DevOps
DevOps
Mar 20, 2023 · Information Security

2023 DevSecOps Forecast: Five Key Trends Shaping Software Supply Chain Security, AI/ML Integration, and Observability

The 2023 DevSecOps forecast highlights five major trends—including prioritizing software supply‑chain security, embedding security education in DevOps, pervasive AI/ML across the SDLC, deeper value‑stream analysis, and left‑shifting observability—while emphasizing zero‑trust, SBOM adoption, and the growing role of security in cloud‑native environments.

AI/MLDevSecOpsValue Stream
0 likes · 7 min read
2023 DevSecOps Forecast: Five Key Trends Shaping Software Supply Chain Security, AI/ML Integration, and Observability
DataFunSummit
DataFunSummit
Mar 13, 2023 · Information Security

Unified Remote Attestation for TEE Interoperability: A Practical Overview

This article presents a comprehensive overview of TEE interoperability, describing the background of trusted execution environments, their remote attestation processes, a unified remote attestation framework, and the overall strategy for achieving cross‑TEE compatibility, including open‑source implementations and future directions.

TEEUnified Attestationremote attestation
0 likes · 9 min read
Unified Remote Attestation for TEE Interoperability: A Practical Overview
Java Architecture Diary
Java Architecture Diary
Mar 13, 2023 · Information Security

Why MaxKey Stands Out as a Leading Open-Source SSO Solution

MaxKey is an open-source, Apache-licensed SSO platform that supports major authentication protocols, offers extensive login methods, provides multi-tenant IAM features, and includes detailed Linux deployment steps with code snippets and interface screenshots, making it a comprehensive solution for enterprise identity management.

AuthenticationIAMSSO
0 likes · 6 min read
Why MaxKey Stands Out as a Leading Open-Source SSO Solution
Continuous Delivery 2.0
Continuous Delivery 2.0
Mar 9, 2023 · Fundamentals

Ten Essential Software Architecture Quality Attributes

The article explains ten key non‑functional quality attributes of software architecture—such as scalability, availability, consistency, resilience, usability, observability, security, persistence, agility, and maintainability—describing their meanings, typical implementation techniques, and why selecting the right attributes is crucial for any system.

AvailabilityNon-functional RequirementsScalability
0 likes · 9 min read
Ten Essential Software Architecture Quality Attributes
MaGe Linux Operations
MaGe Linux Operations
Mar 4, 2023 · Databases

Why Docker Struggles with MySQL: 7 Critical Reasons

This article examines why running MySQL in Docker containers often leads to data‑security risks, performance bottlenecks, state management issues, and resource‑isolation problems, while also outlining scenarios where containerization can still be viable and offering practical mitigation strategies.

Dockercontainerizationdatabase
0 likes · 7 min read
Why Docker Struggles with MySQL: 7 Critical Reasons
Architects' Tech Alliance
Architects' Tech Alliance
Mar 3, 2023 · Fundamentals

Arm Announces Armv9 Architecture: New Security, AI, and SVE2 Vector Extensions

Arm's newly unveiled Armv9 architecture, presented at Vision Day, introduces major enhancements across security, artificial intelligence, and scalable vector extensions (SVE2), while outlining a roadmap for future CPUs, performance gains, and the confidential compute architecture that reshapes trust boundaries in modern computing.

Armv9Artificial IntelligenceCPU architecture
0 likes · 13 min read
Arm Announces Armv9 Architecture: New Security, AI, and SVE2 Vector Extensions
Selected Java Interview Questions
Selected Java Interview Questions
Feb 27, 2023 · Information Security

Designing User Authentication in a Microservice Architecture Using JWT and Gateway Strategies

This article explains traditional session‑based authentication, introduces JWT and the JJWT library for secure token creation and verification, and compares two microservice authentication patterns—server‑side verification and API‑gateway unified verification—while discussing practical challenges such as token expiration, key management, and caching.

Microservicesjavajjwt
0 likes · 14 min read
Designing User Authentication in a Microservice Architecture Using JWT and Gateway Strategies
MaGe Linux Operations
MaGe Linux Operations
Feb 26, 2023 · Information Security

Mastering JWT: Secure Token Authentication with Spring Boot and Angular

This article explains what JSON Web Tokens are, their structure and security considerations, introduces the JJWT Java library, and provides a complete Spring Boot and Angular example—including Maven setup, Java filters, controllers, and front‑end code—to demonstrate secure token‑based authentication.

AngularAuthenticationJWT
0 likes · 19 min read
Mastering JWT: Secure Token Authentication with Spring Boot and Angular
Architect
Architect
Feb 22, 2023 · Backend Development

Custom Logback Desensitization Component (slf4j + logback) – Usage and Configuration Guide

This article explains how to securely mask sensitive data in log output by using either a conversionRule tag with MessageConverter or a custom utility class, and provides a step‑by‑step guide to integrate a reusable Logback desensitization component with Maven dependency, appender replacement, and YAML configuration.

Configurationdesensitizationlogback
0 likes · 10 min read
Custom Logback Desensitization Component (slf4j + logback) – Usage and Configuration Guide
Alibaba Cloud Big Data AI Platform
Alibaba Cloud Big Data AI Platform
Feb 20, 2023 · Big Data

How Alibaba’s DataWorks Transforms Data Governance for Efficiency, Security, and Cost Savings

This article explores Alibaba's DataWorks platform and its comprehensive data governance practices, covering application efficiency, security controls, cost optimization, organizational structure, and cultural initiatives that together enable scalable, secure, and cost‑effective data management across the enterprise.

Big DataCost OptimizationData Governance
0 likes · 31 min read
How Alibaba’s DataWorks Transforms Data Governance for Efficiency, Security, and Cost Savings
Programmer DD
Programmer DD
Feb 16, 2023 · Artificial Intelligence

How GitHub Copilot’s New AI Model Boosts Code Quality, Speed, and Security

GitHub’s February 14 update introduces a stronger AI Codex model, Fill‑In‑The‑Middle context handling, and lightweight client improvements that raise code suggestion quality, cut response time, and add real‑time security filtering, while enterprise Copilot now offers VPN support and easy licensing for thousands of developers.

AI code generationGitHub Copilotenterprise tools
0 likes · 7 min read
How GitHub Copilot’s New AI Model Boosts Code Quality, Speed, and Security
Selected Java Interview Questions
Selected Java Interview Questions
Feb 5, 2023 · Backend Development

Comprehensive Overview of Spring Boot: Features, Core Annotations, Configuration, and Best Practices

This article provides a detailed introduction to Spring Boot, covering its purpose, advantages, core @SpringBootApplication annotation, supported logging frameworks, starter mechanism, new features in version 2.x, configuration methods, security, CORS handling, actuator monitoring, hot deployment, multi‑datasource setup, session sharing, and packaging differences, all aimed at helping developers quickly adopt and master the framework.

ConfigurationMicroservicesSpring Boot
0 likes · 24 min read
Comprehensive Overview of Spring Boot: Features, Core Annotations, Configuration, and Best Practices
Open Source Linux
Open Source Linux
Feb 3, 2023 · Cloud Native

Why eBPF Is the Secret Weapon Behind Modern Cloud‑Native Platforms

This article explains how eBPF extends kernel functionality to enable secure, high‑performance networking, observability, and programmable workloads in cloud‑native environments, detailing its architecture, use cases, market adoption, commercialization models, and the challenges and advantages that make it comparable to JavaScript for the kernel.

Cloud NativeLinuxNetworking
0 likes · 12 min read
Why eBPF Is the Secret Weapon Behind Modern Cloud‑Native Platforms
Efficient Ops
Efficient Ops
Feb 2, 2023 · Operations

How Chinese Banks Accelerate Digital Transformation with DevOps Maturity Models

This article reviews how eight Chinese city commercial banks and other financial institutions adopted the CAICT‑led DevOps Capability Maturity Model, detailing their continuous delivery, technical operations, security, and system‑tool assessments, and highlighting the practical benefits and lessons for industry peers.

BankingContinuous DeliveryDevOps
0 likes · 16 min read
How Chinese Banks Accelerate Digital Transformation with DevOps Maturity Models
DataFunTalk
DataFunTalk
Jan 17, 2023 · Information Security

Community Anti‑Cheat Exploration and Practice in Xiaohongshu

This article examines Xiaohongshu's community anti‑cheat efforts, detailing the significance of fraud prevention, the black‑gray industry ecosystem, strategic defense frameworks, system architecture, and practical risk governance and detection methods for data‑inflation attacks.

anti-cheatcommunitydata integrity
0 likes · 15 min read
Community Anti‑Cheat Exploration and Practice in Xiaohongshu
Alibaba Cloud Developer
Alibaba Cloud Developer
Jan 17, 2023 · Artificial Intelligence

What’s Driving the Next Wave of Tech: AI, Chiplets, Cloud‑Native Security and More

From multimodal pre‑training models and chiplet integration to compute‑in‑memory, cloud‑native security, predictive networking, dual‑engine decision systems, computational optical imaging, large‑scale digital twins, and generative AI, this overview highlights the key technological trends reshaping AI, hardware, and cloud infrastructures.

Artificial IntelligenceChipletDigital Twin
0 likes · 11 min read
What’s Driving the Next Wave of Tech: AI, Chiplets, Cloud‑Native Security and More
Tencent Tech
Tencent Tech
Jan 16, 2023 · Operations

How a Mini-Game Scaled to 100M DAU: Architecture, Ops, and Security Lessons

This article examines how the viral mini‑game "Sheep..." overcame its initial 5,000‑QPS bottleneck and scaled to over 100 million daily active users by redesigning its architecture, implementing cloud‑native auto‑scaling, enhancing operational monitoring with CLS, and fortifying security with WAF.

cloud-nativegame-developmentscaling
0 likes · 11 min read
How a Mini-Game Scaled to 100M DAU: Architecture, Ops, and Security Lessons
21CTO
21CTO
Jan 14, 2023 · Information Security

Why Chrome is Adding Rust: Boosting Security and Simplicity in Chromium

Google's Chrome security team announced that Chromium will soon support third‑party Rust libraries, aiming to simplify development, reduce memory‑safety bugs, and enhance overall browser security by integrating safer Rust code into Chrome binaries.

ChromeChromiumMemory Safety
0 likes · 6 min read
Why Chrome is Adding Rust: Boosting Security and Simplicity in Chromium
DevOps
DevOps
Jan 12, 2023 · Information Security

Understanding DevSecOps: Integrating Security into DevOps Practices

DevSecOps integrates security into every stage of the DevOps lifecycle, addressing cultural, technical, and organizational challenges through practices such as early security integration, automated testing, skill training, tool integration, compliance, and continuous monitoring, ultimately enabling faster, safer software delivery.

DevOpsDevSecOpsautomation
0 likes · 15 min read
Understanding DevSecOps: Integrating Security into DevOps Practices
Efficient Ops
Efficient Ops
Jan 11, 2023 · Information Security

How HaiTong Securities Achieved Advanced DevSecOps Maturity: An Inside Look

This article details HaiTong Securities' journey through the DevSecOps assessment, showcasing their eHaiTongCai data service platform, interview insights from senior managers, the security challenges they faced, and the concrete steps they took to embed security across the entire software lifecycle.

Continuous DeliveryDevOpsDevSecOps
0 likes · 14 min read
How HaiTong Securities Achieved Advanced DevSecOps Maturity: An Inside Look
Efficient Ops
Efficient Ops
Jan 11, 2023 · Operations

How a Securities Firm Achieved DevSecOps Maturity to Boost Transformation

The article details how China’s CITIC Securities leveraged the national DevOps and DevSecOps maturity models, passed Level 2 security assessments, and integrated cultural, procedural, and technical practices to enhance its institutional business service platform, improve security, and accelerate its digital transformation.

DevOpsDevSecOpsDigital Transformation
0 likes · 11 min read
How a Securities Firm Achieved DevSecOps Maturity to Boost Transformation
Huolala Tech
Huolala Tech
Jan 10, 2023 · Information Security

Solving Android SSL Certificate Expiration: HuoLaLa’s Full Debugging Guide

This article explains the fundamentals of SSL certificates, details Android’s certificate verification process, walks through common pitfalls such as expired or mismatched certificates, and provides practical solutions—including custom TrustManager implementations, revocation checks, and debugging techniques—to ensure reliable secure communication in Android apps.

AndroidCertificateSSL
0 likes · 24 min read
Solving Android SSL Certificate Expiration: HuoLaLa’s Full Debugging Guide
Continuous Delivery 2.0
Continuous Delivery 2.0
Jan 10, 2023 · Information Security

Understanding Software Supply Chain Security and the SLSA Framework

The article explains why software supply chain security is increasingly critical, introduces the SLSA (Supply‑Chain Levels for Software Artifacts) framework and its three trust boundaries, outlines common risk points from code commit to package distribution, and discusses mitigation strategies such as mandatory code review, robot‑account controls, and automation.

Information SecuritySLSAci/cd
0 likes · 11 min read
Understanding Software Supply Chain Security and the SLSA Framework
Alibaba Cloud Native
Alibaba Cloud Native
Jan 9, 2023 · Cloud Native

CNStack 2.0: Cloud‑Native Design for Agile, Secure Multi‑Cluster Ops

CNStack 2.0 is a cloud‑native PaaS platform built on Kubernetes that unifies resource and workload management, offering agile, open, and secure multi‑cluster capabilities through modular cloud services, a unified API gateway, and integration with open‑source projects such as Sealer, Emissary‑Ingress, cert‑manager, Velero, and OCM.

KubernetesMulti-ClusterResource Management
0 likes · 24 min read
CNStack 2.0: Cloud‑Native Design for Agile, Secure Multi‑Cluster Ops
Top Architect
Top Architect
Jan 7, 2023 · Backend Development

Implementing a Spring Cloud Gateway with Rate Limiting, BCrypt Encryption, and JWT Authentication

This article provides a step‑by‑step guide to building a Spring Cloud Gateway for microservices, covering system setup, request routing, cross‑origin handling, token‑bucket rate limiting, password hashing with BCrypt, an overview of symmetric and asymmetric encryption, and JWT‑based authentication with code examples and configuration details.

JWTMicroservicesSpring Cloud Gateway
0 likes · 24 min read
Implementing a Spring Cloud Gateway with Rate Limiting, BCrypt Encryption, and JWT Authentication
Yunxuetang Frontend Team
Yunxuetang Frontend Team
Jan 6, 2023 · Frontend Development

Top Frontend Tech & Architecture Articles You Shouldn't Miss

A curated collection of recent frontend articles covering a code‑submission script, the Remesh DDD framework, CSRF security basics, GraphQL BFF implementation for cloud music, build‑time reduction tricks, and the Intl.Enumeration proposal reaching Stage 4, offering valuable insights for web developers.

Build OptimizationGraphQLJavaScript
0 likes · 3 min read
Top Frontend Tech & Architecture Articles You Shouldn't Miss
DataFunSummit
DataFunSummit
Dec 28, 2022 · Artificial Intelligence

Federated Learning in Advertising: Business Background, Conversion Flow, Algorithmic Techniques, Vertical & Horizontal FL, and Security

This article explains how federated learning is applied to the advertising industry, covering business background, conversion processes from user, client, and server perspectives, algorithmic components such as CTR and CVR models, vertical and horizontal federated learning architectures, compression techniques, and security challenges with corresponding defenses.

AdvertisingConversion TrackingHorizontal FL
0 likes · 22 min read
Federated Learning in Advertising: Business Background, Conversion Flow, Algorithmic Techniques, Vertical & Horizontal FL, and Security
Efficient Ops
Efficient Ops
Dec 28, 2022 · Information Security

How China Agricultural Bank Achieved Advanced DevSecOps Maturity

In a detailed interview, senior engineers from China Agricultural Bank explain how their mobile banking payment and micro‑loan platforms passed the CAICT DevSecOps Level‑2 assessment, outlining the cultural, process, and technical measures—such as integrated security testing tools and cross‑department collaboration—that boosted security, efficiency, and digital transformation.

BankingDevOpsDevSecOps
0 likes · 14 min read
How China Agricultural Bank Achieved Advanced DevSecOps Maturity
Architects Research Society
Architects Research Society
Dec 18, 2022 · Fundamentals

Comprehensive Overview of IoT Protocols and Standards by Functional Layer

This article provides a comprehensive overview of IoT protocols and standards, organized by functional layers such as infrastructure, identification, communication, discovery, data exchange, device management, semantics, multi‑layer frameworks, security, and industry verticals, and lists relevant alliances and organizations shaping the IoT ecosystem.

IoTNetworkingProtocols
0 likes · 20 min read
Comprehensive Overview of IoT Protocols and Standards by Functional Layer
Su San Talks Tech
Su San Talks Tech
Dec 17, 2022 · Information Security

Integrating Data Permissions into RBAC: A Practical Guide

This article explains how to extend the classic Role‑Based Access Control (RBAC) model with fine‑grained data permissions, detailing rule definition, database design, role‑rule binding, and AOP‑based enforcement, and offers optimization tips such as rule groups for complex scenarios.

Data PermissionRBACRole-Based Access
0 likes · 8 min read
Integrating Data Permissions into RBAC: A Practical Guide
Open Source Linux
Open Source Linux
Dec 15, 2022 · Cloud Native

Kubernetes 1.26 ‘Electrifying’: Key New Features, Deprecations, and Upgrades

Kubernetes 1.26, themed “Electrifying,” introduces 37 enhancements—including registry changes, storage upgrades, signed release artifacts, Windows high‑privilege containers, metric and scheduling improvements—while promoting 11 features to stable, deprecating 12 APIs, and emphasizing sustainability and carbon‑footprint awareness.

Cloud NativeKubernetesMetrics
0 likes · 10 min read
Kubernetes 1.26 ‘Electrifying’: Key New Features, Deprecations, and Upgrades