Tagged articles
2149 articles
Page 3 of 22
Open Source Tech Hub
Open Source Tech Hub
Feb 8, 2026 · Artificial Intelligence

How Sub‑Agents Empower AI Code Review and Boost Security

This guide explains the Sub‑Agent concept used in AI coding tools, shows why it solves context‑loss problems, and walks through a concrete PHP security review example with Claude Code, including agent configuration, execution steps, and a detailed vulnerability report.

AICode reviewPHP
0 likes · 8 min read
How Sub‑Agents Empower AI Code Review and Boost Security
Architect
Architect
Feb 8, 2026 · Artificial Intelligence

How AI Agents Will Redefine Software Development by 2026: 8 Trends and a Practical Playbook

Anthropic's 2026 Agentic Coding Trends Report reveals that AI agents are moving from experimental tools to production systems, reshaping the software development lifecycle, engineer roles, collaboration models, long‑running agents, scalable supervision, cross‑functional tooling, economics, and security, with concrete priorities and actionable checklists for organizations.

AI agentsAgentic CodingAutomation
0 likes · 24 min read
How AI Agents Will Redefine Software Development by 2026: 8 Trends and a Practical Playbook
SpringMeng
SpringMeng
Feb 6, 2026 · Backend Development

Step‑by‑Step Guide to Deploy Clawbot with Video Tutorial

This free tutorial walks you through installing Clawbot on Windows, macOS or Linux, adding the Feishu plugin, configuring Feishu app credentials, and using Clawbot to generate documents, while highlighting security risks and providing a GitHub reference.

Bot DeploymentClawbotFeishu
0 likes · 5 min read
Step‑by‑Step Guide to Deploy Clawbot with Video Tutorial
AI Engineering
AI Engineering
Feb 4, 2026 · Artificial Intelligence

NanoClaw: A 500‑Line Minimal Claude Bot Running in Apple Containers

NanoClaw trims the bloated OpenClaw codebase to just 500 lines, runs inside an Apple container for security, adds Docker support for Linux, and discusses the trade‑offs between sandbox restrictions and AI assistant capabilities while warning of its fleeting popularity.

AI AssistantApple containerClaude
0 likes · 3 min read
NanoClaw: A 500‑Line Minimal Claude Bot Running in Apple Containers
Woodpecker Software Testing
Woodpecker Software Testing
Feb 3, 2026 · User Experience Design

How to Test UX in Education Software: Strategies, Challenges, and Best Practices

The article outlines essential UX testing dimensions for education software—including functional, usability, accessibility, emotional load, and security—while detailing challenges such as multi‑role scenarios, performance demands, and compliance, and proposes agile, AI‑enhanced, cross‑disciplinary approaches and concrete case studies to improve learning outcomes.

AI automationEducation softwarePerformance Testing
0 likes · 8 min read
How to Test UX in Education Software: Strategies, Challenges, and Best Practices
21CTO
21CTO
Feb 3, 2026 · Information Security

Critical PHPUnit CVE-2026-24765: How Unsafe Coverage Files Enable RCE in CI/CD Pipelines

A high‑severity CVE‑2026‑24765 in the widely used PHP unit‑testing framework PHPUnit allows attackers to inject malicious coverage files that trigger unsafe deserialization and remote code execution during CI/CD test runs, prompting immediate upgrades to patched releases across all active branches.

PHPRCESecurity
0 likes · 4 min read
Critical PHPUnit CVE-2026-24765: How Unsafe Coverage Files Enable RCE in CI/CD Pipelines
AI Tech Publishing
AI Tech Publishing
Feb 1, 2026 · Artificial Intelligence

What Makes Clawdbot’s Agent Architecture Worth Emulating?

The article dissects Clawdbot’s (also known as Moltbot or OpenClaw) agent architecture, covering its TypeScript‑based CLI core, channel adapters, gateway server with lane‑based command queues, agent runner logic, memory handling via JSONL transcripts and markdown files, tool execution options, security allowlist, and a semantic snapshot browser that reduces token costs.

Agent ArchitectureClawdbotSecurity
0 likes · 9 min read
What Makes Clawdbot’s Agent Architecture Worth Emulating?
Architect
Architect
Jan 30, 2026 · Interview Experience

From Burnout to AI Agent Stardom: Peter Steinberger’s Moltbot Journey

In a candid 35‑minute interview, Peter Steinberger recounts his post‑burnout comeback, the rapid rise of his AI‑powered personal‑assistant project Moltbot (formerly Clawdbot), the technical shortcuts that made it explode on GitHub, and his reflections on the future of AI agents, open‑source tooling, and the risks of prompt‑injection.

AI agentsCLI toolsPrompt engineering
0 likes · 18 min read
From Burnout to AI Agent Stardom: Peter Steinberger’s Moltbot Journey
Java Backend Technology
Java Backend Technology
Jan 29, 2026 · Databases

How to Securely Automate Database Backups with Databasus

Databasus is a free, open‑source, self‑hosted backup tool that supports PostgreSQL, MySQL, MariaDB and MongoDB, offers flexible scheduling, multiple storage backends, enterprise‑grade encryption, team collaboration features, and can be installed via a simple script or Docker.

DevOpsDockerSecurity
0 likes · 7 min read
How to Securely Automate Database Backups with Databasus
Tencent Technical Engineering
Tencent Technical Engineering
Jan 28, 2026 · Artificial Intelligence

Deploy Clawdbot: Turn Your Computer into a Local‑First AI Personal Assistant

This article introduces Clawdbot, a local‑first AI agent that runs on your machine, explains its architecture and unique product positioning, provides step‑by‑step deployment instructions (including environment setup, cloning, configuration, and launching), and discusses advanced skill integration, security risks, and broader implications for AI‑driven workflows.

AISecurityTelegram
0 likes · 8 min read
Deploy Clawdbot: Turn Your Computer into a Local‑First AI Personal Assistant
DevOps Coach
DevOps Coach
Jan 27, 2026 · Operations

Why ArgoCD v3.2.5 Is a Must‑Upgrade for Secure GitOps Pipelines

ArgoCD v3.2.5, released on January 14 2026, brings critical stability and security fixes—including a refreshed notifications engine, ApplicationSet reconciliation improvements, precise error messages, and dependency updates—making it essential for production GitOps deployments, especially for users still on the EOL 2.x series.

Argo CDGitOpsSecurity
0 likes · 12 min read
Why ArgoCD v3.2.5 Is a Must‑Upgrade for Secure GitOps Pipelines
21CTO
21CTO
Jan 27, 2026 · Artificial Intelligence

Build a 24/7 Open‑Source AI Assistant with Clawdbot – Full Install & Setup Guide

This guide walks you through the system requirements, step‑by‑step installation on macOS/Linux and Windows, onboarding configuration, gateway deployment, cloud‑VPS setup, core use‑cases, skill extensions, security best practices, cost analysis, and troubleshooting for the open‑source AI agent Clawdbot.

AI AgentClawdbotCost
0 likes · 10 min read
Build a 24/7 Open‑Source AI Assistant with Clawdbot – Full Install & Setup Guide
Architect
Architect
Jan 26, 2026 · Artificial Intelligence

Why Clawdbot Is the Next‑Gen Personal AI Agent and How to Secure It

Clawdbot is an open‑source personal AI assistant that runs on your own machine and can be controlled via chat apps, offering email handling, automation, and code generation while requiring careful security design to prevent dangerous actions and data loss.

AI AssistantClawdbotConfiguration
0 likes · 11 min read
Why Clawdbot Is the Next‑Gen Personal AI Agent and How to Secure It
Alibaba Cloud Infrastructure
Alibaba Cloud Infrastructure
Jan 26, 2026 · Cloud Native

How Kimi Scaled AI Agents with Alibaba Cloud’s Elastic Sandbox Architecture

Kimi built a high‑performance, low‑cost AI Agent infrastructure by combining Alibaba Cloud ACK node pools and the ACS Agent Sandbox, addressing challenges of instant sandbox response, state continuity, massive concurrency, cost efficiency, security isolation, and search‑memory integration for production‑grade agents.

AI AgentCloud NativeCost Optimization
0 likes · 18 min read
How Kimi Scaled AI Agents with Alibaba Cloud’s Elastic Sandbox Architecture
High Availability Architecture
High Availability Architecture
Jan 26, 2026 · Artificial Intelligence

Is Clawdbot the Dream AI Assistant? A Critical Review and Practical Guide

This article provides an in‑depth evaluation of the AI agent tool Clawdbot, highlighting its seamless integration, strong execution, and automation capabilities while exposing steep configuration hurdles, security concerns, and unpredictable behavior, and offers recommendations for both technical enthusiasts and everyday users.

AI AssistantClawdbotProduct Review
0 likes · 6 min read
Is Clawdbot the Dream AI Assistant? A Critical Review and Practical Guide
Xiao Liu Lab
Xiao Liu Lab
Jan 23, 2026 · Operations

How to Build Enterprise‑Ready Docker Images in 5 Minutes

This guide walks you through the four essential principles for production Docker images, demonstrates a complete multi‑stage Dockerfile for a Flask app, shows how to tag, build, verify, and deploy with docker‑compose, and warns against unsafe shortcuts like docker commit.

DevOpsDockerFlask
0 likes · 11 min read
How to Build Enterprise‑Ready Docker Images in 5 Minutes
Raymond Ops
Raymond Ops
Jan 20, 2026 · Information Security

How to Build a Complete Linux Enterprise Security Framework—from Intrusion Detection to Incident Response

This guide walks through a real-world DDoS and SSH brute‑force incident and shows how to design a layered Linux security architecture, configure firewalls, host hardening, OSSEC HIDS, Suricata IDS, ELK monitoring, automated response scripts, and continuous improvement metrics for enterprise environments.

AutomationIDSLinux
0 likes · 15 min read
How to Build a Complete Linux Enterprise Security Framework—from Intrusion Detection to Incident Response
Ray's Galactic Tech
Ray's Galactic Tech
Jan 17, 2026 · Operations

Mastering Enterprise Docker Compose: From Development to Production

This comprehensive guide walks you through Docker Compose fundamentals, file structure, advanced V2 syntax, security best practices, multi‑environment profiles, common commands, performance tuning, Kubernetes hand‑off, and a full set of enterprise‑grade recommendations for reliable production deployments.

DevOpsDocker ComposeSecurity
0 likes · 24 min read
Mastering Enterprise Docker Compose: From Development to Production
Raymond Ops
Raymond Ops
Jan 17, 2026 · Operations

Scaling Ansible: From Manual Deployments to Managing Thousands of Servers

This article walks through the challenges of manual server deployment, explains why Ansible is ideal for large‑scale environments, and provides a complete reference architecture, optimized configuration, dynamic inventory scripts, modular playbooks, performance tuning, monitoring, security hardening, rollback mechanisms, cost analysis, and practical lessons learned for automating deployments across thousands of machines.

AnsibleAutomationDeployment
0 likes · 20 min read
Scaling Ansible: From Manual Deployments to Managing Thousands of Servers
Architect
Architect
Jan 15, 2026 · Artificial Intelligence

Inside Claude’s Cowork Mode: How Anthropic Turns a Language Model into a Secure Digital Assistant

This article breaks down the extensive Claude Cowork system prompt, revealing its product positioning, model versions, core tools, safety boundaries, interaction philosophy, user‑wellbeing safeguards, political neutrality rules, file‑handling policies, and the technical workflow that lets Claude run inside a lightweight Linux VM while respecting strict security and ethical constraints.

AIAgentClaude
0 likes · 46 min read
Inside Claude’s Cowork Mode: How Anthropic Turns a Language Model into a Secure Digital Assistant
Raymond Ops
Raymond Ops
Jan 15, 2026 · Information Security

Master Linux Server Intrusion Detection & Response: A Complete Practical Guide

This guide walks Linux administrators through a full‑cycle intrusion detection and emergency response process, covering metric monitoring, log analysis, file integrity checks, attack confirmation, staged remediation, preventive hardening, and useful automation scripts to keep servers secure.

AutomationLinuxSecurity
0 likes · 16 min read
Master Linux Server Intrusion Detection & Response: A Complete Practical Guide
Wuming AI
Wuming AI
Jan 14, 2026 · Artificial Intelligence

What Limits Claude Skills? Deep Dive into Platform, Sync, and Security Issues

The article analyzes Claude Skills' shortcomings—including limited platform support, lack of synchronization, sparse skill libraries, high installation barriers, dependence on precise descriptions, skill conflicts, model capability variance, context‑window consumption, nested reference limits, strict formatting rules, script robustness, unsuitability for simple tasks, and security risks—offering concrete examples and practical guidance.

AI skillsClaudeSecurity
0 likes · 7 min read
What Limits Claude Skills? Deep Dive into Platform, Sync, and Security Issues
Ray's Galactic Tech
Ray's Galactic Tech
Jan 14, 2026 · Information Security

From Simple HTTPS to Enterprise‑Grade mTLS: Build a Secure Nginx Infrastructure

This guide explains why HTTPS only encrypts traffic while mTLS authenticates both parties, and provides a step‑by‑step solution—including environment setup, CA design, certificate generation, Nginx mutual‑TLS configuration, role‑based access, Kubernetes deployment, logging, and best‑practice recommendations—to create a production‑ready, enterprise‑level security infrastructure.

Certificate AuthorityDevOpsMutual TLS
0 likes · 8 min read
From Simple HTTPS to Enterprise‑Grade mTLS: Build a Secure Nginx Infrastructure
Design Hub
Design Hub
Jan 14, 2026 · Artificial Intelligence

What Are Agentic Skills and Why They’re Set to Explode

The article analyzes the shift from AI assistance to AI agency, explains the Skill (SKILL.md) architecture introduced by Anthropic, compares implementations in Claude Code, GitHub Copilot and Google AntiGravity, and details security risks, mitigation strategies, and best‑practice guidance for building and managing Agentic Skills.

AI agentsAgentic SkillsClaude Code
0 likes · 33 min read
What Are Agentic Skills and Why They’re Set to Explode
Ray's Galactic Tech
Ray's Galactic Tech
Jan 12, 2026 · Databases

Master MySQL: Production-Ready Database Design & Operations Handbook

An experienced MySQL practitioner shares a comprehensive production‑grade design and operations guide, covering primary key selection, normalization, indexing, data types, sharding, foreign key trade‑offs, naming conventions, transaction handling, NULL usage, type safety, read/write splitting, caching, triggers, logging, monitoring, partitioning, security, and a three‑layer summary.

Database designSecuritymysql
0 likes · 9 min read
Master MySQL: Production-Ready Database Design & Operations Handbook
Programmer's Advance
Programmer's Advance
Jan 12, 2026 · Artificial Intelligence

How Claude Code’s Hook System Transforms AI Programming Safety and Automation

This article explains the Claude Code Hook mechanism, detailing its event‑driven architecture, the ten lifecycle events, concrete security and code‑quality use cases, step‑by‑step script examples, performance and safety best practices, and future directions such as Prompt‑Based Hooks, showing how deterministic control turns AI assistants into reliable, automatable collaborators.

AIAutomationDevOps
0 likes · 25 min read
How Claude Code’s Hook System Transforms AI Programming Safety and Automation
JavaEdge
JavaEdge
Jan 10, 2026 · Artificial Intelligence

Unlocking Claude’s Agent Skills: A Deep Dive into Modular AI Extensions

This article explains what Claude Agent Skills are, why they’re useful, how they’re structured and loaded, the three content levels, security best practices, and how to use pre‑built or custom Skills across Claude API, Claude Code, the SDK, and Claude.ai.

AIAPIAgent Skills
0 likes · 17 min read
Unlocking Claude’s Agent Skills: A Deep Dive into Modular AI Extensions
Tech Verticals & Horizontals
Tech Verticals & Horizontals
Jan 8, 2026 · Artificial Intelligence

Google Agent Whitepaper: Building Production‑Ready AI Agents from Architecture to Ops

This whitepaper explains how modern AI agents evolve from simple language models to autonomous, multi‑step systems, detailing their core components, five‑step reasoning loop, classification levels, design patterns, deployment options, observability, security, and continuous learning with concrete examples.

AI agentsAgent ArchitectureDeployment
0 likes · 49 min read
Google Agent Whitepaper: Building Production‑Ready AI Agents from Architecture to Ops
Tech Verticals & Horizontals
Tech Verticals & Horizontals
Jan 8, 2026 · Artificial Intelligence

ByteDance Agent Practice Manual: Technical Guide and Deployment Strategies (2025)

This comprehensive manual outlines ByteDance's Agent platform, covering its technical foundations, architecture, development workflow, real‑world application scenarios, operational optimization, security compliance, future innovation paths, case studies, team collaboration, risk mitigation, tooling, and global adaptation.

AI PlatformAgentByteDance
0 likes · 4 min read
ByteDance Agent Practice Manual: Technical Guide and Deployment Strategies (2025)
Tech Minimalism
Tech Minimalism
Jan 8, 2026 · Artificial Intelligence

6 Must-Have Claude MCP Servers for Developers in 2025

This article evaluates the flood of Model Context Protocol (MCP) servers that have emerged since Anthropic released the protocol, defines clear criteria for selecting useful servers, and provides detailed installation steps, real‑world usage examples, and security best practices for six essential MCP servers that boost developer productivity.

AI assistantsAutomationClaude
0 likes · 15 min read
6 Must-Have Claude MCP Servers for Developers in 2025
Senior Tony
Senior Tony
Jan 7, 2026 · Information Security

How to Implement Seamless Token Auto‑Renewal: Frontend Refresh, Sliding Window, and Double‑Token Strategies

Token expiration can be handled with three main strategies—frontend‑driven periodic refresh, backend sliding‑window renewal, and the industry‑standard double‑token (access + refresh) scheme—each balancing implementation simplicity, user experience, and security, with the double‑token approach offering the most robust solution.

AuthenticationBackend DevelopmentRefresh token
0 likes · 7 min read
How to Implement Seamless Token Auto‑Renewal: Frontend Refresh, Sliding Window, and Double‑Token Strategies
Ops Community
Ops Community
Jan 6, 2026 · Information Security

Master Linux Permissions: From Basics to Advanced Security Practices

This comprehensive guide walks you through the evolution, fundamentals, and advanced techniques of Linux permission management, covering UGO models, special bits, ACLs, SELinux/AppArmor, best‑practice design principles, troubleshooting steps, audit configurations, and real‑world case studies for securing web, database, and SSH services.

ACLLinuxPermissions
0 likes · 39 min read
Master Linux Permissions: From Basics to Advanced Security Practices
Tech Musings
Tech Musings
Jan 2, 2026 · Information Security

Why MongoDB’s CVE‑2025‑14847 Lets Attackers Leak Secrets Like Heartbleed

The article explains the CVE‑2025‑14847 MongoDB vulnerability, detailing how crafted BSON with a falsified document length triggers memory over‑read, demonstrates a reproducible PoC, compares it to the SSL Heartbleed bug, and offers mitigation advice for affected deployments.

CVE-2025-14847HeartbleedMongoDB
0 likes · 8 min read
Why MongoDB’s CVE‑2025‑14847 Lets Attackers Leak Secrets Like Heartbleed
JavaScript
JavaScript
Jan 1, 2026 · Information Security

Why Storing JWT in localStorage Is No Longer Safe and What to Use Instead

Storing JWT tokens in localStorage has become a serious security risk because XSS attacks can steal them, so developers should adopt safer alternatives such as HttpOnly cookies, BFF‑backed sessions, or Service Worker‑based in‑memory storage, each with its own trade‑offs.

AuthenticationBFFCSRF
0 likes · 10 min read
Why Storing JWT in localStorage Is No Longer Safe and What to Use Instead
ITPUB
ITPUB
Dec 31, 2025 · Operations

Essential Advanced Linux Commands Every Sysadmin Should Master

This guide compiles 100 high‑impact Linux commands covering file systems, networking, monitoring, security, containers, log analysis, and automation, each chosen for its advanced utility, cross‑distribution compatibility, and real‑world relevance.

AutomationContainersLinux
0 likes · 17 min read
Essential Advanced Linux Commands Every Sysadmin Should Master
macrozheng
macrozheng
Dec 30, 2025 · Backend Development

Mastering Druid Connection Pool in Spring Boot: Advanced Optimization Guide

This comprehensive guide walks through preparing the environment, fine‑tuning core Druid pool parameters, building a robust monitoring system, strengthening security, detecting connection leaks, applying advanced runtime tweaks, and avoiding common pitfalls to achieve high performance and stability in production Spring Boot applications.

Connection PoolDruidSecurity
0 likes · 12 min read
Mastering Druid Connection Pool in Spring Boot: Advanced Optimization Guide
Raymond Ops
Raymond Ops
Dec 28, 2025 · Information Security

Master Docker Security: End‑to‑End Hardening from Image Build to Runtime

This practical guide walks operations engineers through a complete Docker security hardening workflow—covering trusted base‑image selection, vulnerability scanning, multi‑stage builds, image signing, runtime privilege reduction, network isolation, secret management, monitoring, and real‑world CI/CD integration—to build a resilient, enterprise‑grade container environment.

ContainerDockerHardening
0 likes · 18 min read
Master Docker Security: End‑to‑End Hardening from Image Build to Runtime
Raymond Ops
Raymond Ops
Dec 28, 2025 · Operations

From Zero to Production: Ansible Playbook Design Patterns & Best Practices

This guide walks you through building a production‑grade Ansible automation framework—from identifying common manual‑deployment pain points to defining layered architecture, directory conventions, reusable playbook patterns, high‑availability deployments, performance optimizations, monitoring, security hardening, CI/CD integration, and troubleshooting tips—empowering teams to achieve reliable, scalable operations.

AnsibleAutomationDevOps
0 likes · 14 min read
From Zero to Production: Ansible Playbook Design Patterns & Best Practices
Java Companion
Java Companion
Dec 28, 2025 · Backend Development

SpringBoot vs Nginx: Five Implementation Options vs One Directive – Which Is the True Anti‑Hotlinking Champion?

An in‑depth comparison of anti‑hotlinking techniques shows how Nginx can enforce protection with a single directive in milliseconds, while SpringBoot offers five approaches—Filter, Interceptor, Nginx config, signed URL, and hybrid strategy—each with different performance, security, and maintenance trade‑offs.

InterceptorNginxSecurity
0 likes · 14 min read
SpringBoot vs Nginx: Five Implementation Options vs One Directive – Which Is the True Anti‑Hotlinking Champion?
Java Architecture Diary
Java Architecture Diary
Dec 26, 2025 · Information Security

Secure Your Spring Boot 4 Apps with One Annotation: MFA Made Easy

This article explains how Spring Boot 4.0’s @EnableMultiFactorAuthentication annotation simplifies the implementation of password‑plus‑one‑time‑token multi‑factor authentication, providing step‑by‑step code examples, custom token services, endpoint‑level MFA configuration, and production‑grade considerations.

JavaMFAMulti-Factor Authentication
0 likes · 11 min read
Secure Your Spring Boot 4 Apps with One Annotation: MFA Made Easy
Java Web Project
Java Web Project
Dec 25, 2025 · Databases

How to Super‑Optimize Druid Connection Pool in Spring Boot for Production

This guide walks through preparing the environment, fine‑tuning core Druid parameters, managing connection lifecycles, building a monitoring stack, hardening security, detecting leaks, applying advanced runtime tweaks, and avoiding common pitfalls to achieve stable, high‑performance database pooling in Spring Boot.

Connection PoolDruidSecurity
0 likes · 12 min read
How to Super‑Optimize Druid Connection Pool in Spring Boot for Production
Architecture Digest
Architecture Digest
Dec 25, 2025 · Artificial Intelligence

MCP Explained: The Universal ‘Connector’ Turning AI Models into Extensible Agents

This article introduces the Model Context Protocol (MCP), a universal standard that lets large language models seamlessly connect to databases, APIs, local files, and third‑party services, explains its architecture, core primitives, practical Python implementation, trade‑offs, security considerations, and how it compares with other integration approaches.

AIModel Context ProtocolPython
0 likes · 13 min read
MCP Explained: The Universal ‘Connector’ Turning AI Models into Extensible Agents
Architect Chen
Architect Chen
Dec 25, 2025 · Information Security

Understanding Single Sign-On (SSO): Architecture, Components, and Workflow

This article explains the fundamentals of Single Sign-On (SSO), detailing its centralized authentication principle, the roles of CAS Server, CAS Client, and browser, and walks through the complete login flow with diagrams and code snippets for distributed systems.

AuthenticationCASDistributed Systems
0 likes · 4 min read
Understanding Single Sign-On (SSO): Architecture, Components, and Workflow
Java Companion
Java Companion
Dec 25, 2025 · Backend Development

Druid Crashed in Production? How to Optimize the Spring Boot Connection Pool

The article explains why Druid can fail in a live Spring Boot service and provides a comprehensive, step‑by‑step optimization guide covering core pool parameters, monitoring setup, security hardening, leak detection, dynamic tuning, and best‑practice pitfalls to achieve stable, high‑performance database connections.

Connection PoolDruidJava
0 likes · 12 min read
Druid Crashed in Production? How to Optimize the Spring Boot Connection Pool
Ray's Galactic Tech
Ray's Galactic Tech
Dec 24, 2025 · Backend Development

Master Production-Ready Nginx Server Configurations: Templates & Best Practices

This guide explains why most Nginx server setups fail, presents a core server template, walks through five real‑world scenarios with complete configuration snippets, and adds performance, security, and monitoring tips so you can copy a production‑grade Nginx configuration instantly.

Performance OptimizationSecurityServer Configuration
0 likes · 8 min read
Master Production-Ready Nginx Server Configurations: Templates & Best Practices
Architecture Digest
Architecture Digest
Dec 24, 2025 · Databases

Mastering Druid: Extreme Performance and Security Tuning in Spring Boot

This guide walks through step‑by‑step how to prepare the environment, fine‑tune core Druid connection‑pool parameters, set up comprehensive monitoring, harden security, detect leaks, and apply advanced runtime optimizations to achieve stable, high‑throughput database access in Spring Boot applications.

Connection PoolDruidSecurity
0 likes · 13 min read
Mastering Druid: Extreme Performance and Security Tuning in Spring Boot
Woodpecker Software Testing
Woodpecker Software Testing
Dec 23, 2025 · Information Security

ChatGPT‑Powered Code Review: Securing Front‑End and Back‑End Password Recovery

This article presents a comprehensive ChatGPT‑driven code review of a password‑recovery feature, analyzing twelve front‑end and back‑end files, highlighting structural strengths, security gaps such as CSRF and XSS, and offering concrete refactoring, validation, and resource‑management recommendations.

ChatGPTCode reviewJSP
0 likes · 44 min read
ChatGPT‑Powered Code Review: Securing Front‑End and Back‑End Password Recovery
Ray's Galactic Tech
Ray's Galactic Tech
Dec 23, 2025 · Operations

20 Essential Kubernetes Ops Tips to Keep Production Clusters Stable

This guide compiles twenty practical Kubernetes operations tips drawn from real‑world production experience, covering high availability, performance tuning, monitoring, automation, security, and advanced learning to help teams build and maintain reliable, resilient clusters.

OpsSecurityhigh availability
0 likes · 8 min read
20 Essential Kubernetes Ops Tips to Keep Production Clusters Stable
Node.js Tech Stack
Node.js Tech Stack
Dec 22, 2025 · Backend Development

Deno 2.6 Introduces dx: An npx‑Like Tool with Enhanced Security

Deno 2.6 adds the dx command as an npx‑compatible runner for npm and JSR binaries, tightens security with the new deno audit command and fine‑grained permission flags, speeds up TypeScript checking via the Go‑based tsgo, and improves Node.js compatibility with built‑in @types/node and a --require flag.

DenoNode.js compatibilitySecurity
0 likes · 6 min read
Deno 2.6 Introduces dx: An npx‑Like Tool with Enhanced Security
Java Tech Enthusiast
Java Tech Enthusiast
Dec 21, 2025 · Information Security

Ultimate Guide to Common Network Ports, Attack Vectors, and Defense Strategies

This article explains what network ports are, classifies well‑known, registered and dynamic ports, demonstrates scanning tools and commands, details common attack techniques such as buffer overflow, DoS and MITM, and provides practical hardening recommendations for the most frequently targeted ports.

SecurityVulnerabilityattack methods
0 likes · 29 min read
Ultimate Guide to Common Network Ports, Attack Vectors, and Defense Strategies
BirdNest Tech Talk
BirdNest Tech Talk
Dec 21, 2025 · Industry Insights

How Agent Skills and MCP Are Redefining Enterprise AI in 2025

The report analyzes the rapid emergence of Claude Skills and OpenAI's Agentic Commerce Protocol, detailing their technical architectures, benchmark performance, cross‑platform compatibility, enterprise adoption metrics, security challenges, and strategic implications for businesses entering the agentic AI era.

AI agentsAgentic AIClaude Skills
0 likes · 20 min read
How Agent Skills and MCP Are Redefining Enterprise AI in 2025
Ray's Galactic Tech
Ray's Galactic Tech
Dec 17, 2025 · Cloud Native

8 Proven Ways to Authenticate Private Images in Kubernetes

This guide explains why image pull authentication is essential in Kubernetes, describes common errors like ErrImagePull, and provides eight practical solutions—from creating Docker registry secrets with kubectl to leveraging cloud IAM integrations, Kustomize, Helm, External Secrets Operator, and CI/CD automation—plus troubleshooting tips and security best practices.

CloudNativeDockerRegistryImagePullSecrets
0 likes · 10 min read
8 Proven Ways to Authenticate Private Images in Kubernetes
Ray's Galactic Tech
Ray's Galactic Tech
Dec 15, 2025 · Databases

Mastering Database Design: From Core Principles to Modern Distributed Practices

This comprehensive guide walks you through fundamental database design goals, a step‑by‑step lifecycle, nine essential strategies—including normalization, indexing, and security—plus modern distributed and NoSQL considerations, performance tuning, high‑availability tactics, and practical tools for robust data governance.

Data GovernanceDatabase designNoSQL
0 likes · 11 min read
Mastering Database Design: From Core Principles to Modern Distributed Practices
ITPUB
ITPUB
Dec 14, 2025 · Cloud Native

What Can Replace MinIO? A Deep Dive into Ceph, SeaweedFS, Garage, and RustFS

With MinIO entering maintenance mode, this article evaluates open‑source S3‑compatible alternatives—Ceph, SeaweedFS, Garage, and RustFS—detailing their strengths, limitations, security concerns, and practical deployment tips, while concluding that none yet offers a perfect drop‑in replacement.

CephMinioRustFS
0 likes · 9 min read
What Can Replace MinIO? A Deep Dive into Ceph, SeaweedFS, Garage, and RustFS
Ray's Galactic Tech
Ray's Galactic Tech
Dec 12, 2025 · Cloud Native

Inside the Kubernetes Master: A Complete Breakdown of Core Components

Master nodes act as the brain of a Kubernetes cluster, hosting essential components such as kube‑apiserver, etcd, kube‑scheduler, kube‑controller‑manager and optionally cloud‑controller‑manager, each with distinct roles, high‑availability designs, security considerations, and operational workflows that together orchestrate and maintain cluster state.

Control PlaneMaster NodeScheduler
0 likes · 8 min read
Inside the Kubernetes Master: A Complete Breakdown of Core Components
Xiao Liu Lab
Xiao Liu Lab
Dec 11, 2025 · Operations

Master SSH: From Basic Connections to Secure, High‑Performance Remote Workflows

This guide explains how SSH evolved from simple remote login to a comprehensive tool for secure server access, efficient command execution, password‑less authentication, advanced configuration, port forwarding for deep‑learning tasks, large‑file transfer strategies, and enterprise‑grade hardening, empowering developers and ops engineers to build reliable, reproducible workflows.

Deep LearningLinuxRemote Development
0 likes · 10 min read
Master SSH: From Basic Connections to Secure, High‑Performance Remote Workflows
Raymond Ops
Raymond Ops
Dec 11, 2025 · Operations

Unlock the Full Power of Linux Permissions: A Complete 12‑Bit Guide for Sysadmins

This article explains why misconfigured Linux permissions cause security incidents, breaks down the 12‑bit permission model—including file type, owner/group/others bits and special SUID, SGID, and sticky bits—provides numeric examples, real‑world case studies, advanced techniques like umask, ACLs, batch changes, and offers best‑practice security recommendations and troubleshooting tips.

ACLLinuxPermissions
0 likes · 10 min read
Unlock the Full Power of Linux Permissions: A Complete 12‑Bit Guide for Sysadmins
DataFunSummit
DataFunSummit
Dec 11, 2025 · Artificial Intelligence

Beyond Assistance: How Code Agents Are Evolving Toward Full Autonomy

A round‑table of AI experts and industry leaders examines the current capabilities, limitations, and future trajectories of code agents, covering topics from capability boundaries and autonomous evolution to large‑scale codebase challenges, multi‑agent collaboration, hallucination mitigation, and security safeguards.

AIAutomationCode Agent
0 likes · 16 min read
Beyond Assistance: How Code Agents Are Evolving Toward Full Autonomy
Ray's Galactic Tech
Ray's Galactic Tech
Dec 9, 2025 · Information Security

Master Elasticsearch Security: Complete Network, Auth, TLS & Hardening Guide

This comprehensive guide walks you through securing Elasticsearch by isolating the network, enabling authentication and role‑based access, encrypting traffic with TLS, upgrading legacy versions, configuring audit logging, setting up reverse‑proxy protection, and applying enterprise‑grade best practices to prevent data leaks.

AuthenticationElasticsearchHardening
0 likes · 10 min read
Master Elasticsearch Security: Complete Network, Auth, TLS & Hardening Guide
Raymond Ops
Raymond Ops
Dec 8, 2025 · Operations

Mastering EFK: Complete Guide to Building a Scalable Log Management Solution

This comprehensive guide walks you through building a scalable EFK log management solution, covering architecture components, high‑availability design, environment preparation, detailed Elasticsearch, Fluentd and Kibana deployment steps, index optimization, monitoring, alerting, security hardening, troubleshooting and best‑practice recommendations for modern cloud‑native operations.

EFKElasticsearchFluentd
0 likes · 19 min read
Mastering EFK: Complete Guide to Building a Scalable Log Management Solution
DataFunSummit
DataFunSummit
Dec 6, 2025 · Artificial Intelligence

Unlocking Enterprise AI Coding: DHcoder’s Real‑World Practices and Strategic Insights

This article systematically presents the enterprise‑grade AI programming assistant DHcoder, examines the core question of AI as a replacement or augmentation, details its secure local‑vector + private‑model architecture, showcases management dashboards, developer‑friendly features, real‑world case studies, operational feedback loops, and provides expert Q&A on cost, safety, and ROI.

AICoding AssistantEnterprise
0 likes · 15 min read
Unlocking Enterprise AI Coding: DHcoder’s Real‑World Practices and Strategic Insights
php Courses
php Courses
Dec 5, 2025 · Backend Development

Master PHP’s setcookie: Create Secure, Custom Cookies in Minutes

This guide explains how to use PHP's setcookie function to create and manage browser cookies, covering syntax, each parameter's purpose, practical code examples, and security considerations for effective backend development.

SecurityWeb Developmentcookies
0 likes · 4 min read
Master PHP’s setcookie: Create Secure, Custom Cookies in Minutes
DevOps Coach
DevOps Coach
Dec 3, 2025 · Operations

Avoid the 5 Most Common Dockerfile Mistakes That Slow Down Your Deployments

This article outlines the five most frequent Dockerfile errors—including oversized base images, over‑installing packages, skipping multi‑stage builds, running as root, and misusing version tags—explains why they happen, the security and performance impacts, and provides concrete best‑practice fixes.

ContainerDockerfileSecurity
0 likes · 8 min read
Avoid the 5 Most Common Dockerfile Mistakes That Slow Down Your Deployments
Cloud Native Technology Community
Cloud Native Technology Community
Dec 3, 2025 · Operations

5 Hard‑Won Lessons for Managing Kubernetes at Scale

Drawing from years of real‑world Kubernetes deployments, this article outlines five practical lessons—covering operational overload, hidden security risks, scaling costs, talent shortages, and accelerating technical debt—plus extra guidance on workload suitability, policy enforcement, and building a reliable, cost‑effective cluster environment.

Cloud NativeCost ManagementKubernetes
0 likes · 10 min read
5 Hard‑Won Lessons for Managing Kubernetes at Scale
Java Tech Enthusiast
Java Tech Enthusiast
Dec 2, 2025 · Backend Development

Auto‑Encrypt Sensitive Fields in Spring Boot with MyBatis Annotations

This article explains how to eliminate repetitive manual encryption code in Java applications by using a custom @Encrypted annotation together with a MyBatis interceptor, enabling transparent AES‑GCM encryption and decryption of sensitive fields such as phone numbers, emails, and ID numbers.

Field EncryptionJavaMyBatis
0 likes · 11 min read
Auto‑Encrypt Sensitive Fields in Spring Boot with MyBatis Annotations
DataFunTalk
DataFunTalk
Dec 1, 2025 · Artificial Intelligence

Is MCP Losing Its Edge? A One‑Year Review and the Rise of A2A

Marking its one‑year anniversary, the Model Context Protocol (MCP) receives a critical update that adds experimental task primitives, a new client‑metadata registration, security hardening, and sampling tools, while the competing A2A protocol offers built‑in multi‑agent support, stronger security by default, and broader industry backing, highlighting a clear shift in agent communication standards.

A2AAgentic AIMCP
0 likes · 13 min read
Is MCP Losing Its Edge? A One‑Year Review and the Rise of A2A
Ray's Galactic Tech
Ray's Galactic Tech
Nov 30, 2025 · Cloud Native

Master Docker: Core Concepts, Best Practices & Hands‑On Guide

This comprehensive guide explains Docker’s essential use cases, underlying technologies, step‑by‑step setup, image‑building best practices, security hardening, networking models, and common production pitfalls, providing developers and ops engineers with a solid foundation for modern cloud‑native workflows.

Cloud NativeContainersDevOps
0 likes · 8 min read
Master Docker: Core Concepts, Best Practices & Hands‑On Guide
360 Zhihui Cloud Developer
360 Zhihui Cloud Developer
Nov 28, 2025 · Operations

How the GC Agent System Enables Intelligent, Scalable Cloud‑Native Monitoring

The article details the design, core components, and implementation of the GC Agent System—a modular, cloud‑native monitoring platform that uses natural‑language interaction, dual‑mode execution, intent recognition, and secure multi‑tenant authentication to provide real‑time observability and automated fault diagnosis for enterprise IT environments.

Agent ArchitectureLLM OrchestrationSecurity
0 likes · 19 min read
How the GC Agent System Enables Intelligent, Scalable Cloud‑Native Monitoring
Architect-Kip
Architect-Kip
Nov 25, 2025 · Backend Development

Mastering API Interface Design: Principles, Naming, Parameters, and Security

This guide outlines comprehensive API interface design best practices, covering design principles, naming conventions, parameter structures, return code standards, security measures, and a reusable documentation template to ensure flexible, efficient, and secure service development.

Interface DesignSecurityapi-design
0 likes · 16 min read
Mastering API Interface Design: Principles, Naming, Parameters, and Security
Continuous Delivery 2.0
Continuous Delivery 2.0
Nov 25, 2025 · Information Security

How SBOM and SLSA Transform Software Supply Chain Security and Boost ROI

This article examines the core applications of Software Bill of Materials (SBOM) and the SLSA framework across vulnerability response, license compliance, merger due‑diligence, and container image integrity, quantifies their return on investment, and showcases real‑world implementations by leading tech firms, highlighting how they enhance enterprise security, operational efficiency, and competitive advantage.

ROISBOMSLSA
0 likes · 17 min read
How SBOM and SLSA Transform Software Supply Chain Security and Boost ROI
Liangxu Linux
Liangxu Linux
Nov 20, 2025 · Operations

Avoid the ‘Delete‑Database‑and‑Run’ Nightmare: 10 Fatal Ops Pitfalls Revealed

A real 2018 incident where an ops engineer used rm ‑rf to wipe a production database sparked a deep dive into the high‑risk nature of operations, presenting Gartner statistics, psychological error factors, ten deadly pitfalls with concrete examples, and a comprehensive fault‑tolerance framework to prevent future catastrophes.

AutomationBackupDevOps
0 likes · 23 min read
Avoid the ‘Delete‑Database‑and‑Run’ Nightmare: 10 Fatal Ops Pitfalls Revealed
Ray's Galactic Tech
Ray's Galactic Tech
Nov 19, 2025 · Information Security

Mastering Modern Login Mechanisms: Cookies, Sessions, JWT, OAuth2 & SSO

This comprehensive guide explains why authentication is needed for stateless HTTP, walks through the workflows, advantages, and drawbacks of Cookies, Sessions, Tokens, JWTs, Refresh Tokens, blacklist strategies, and OAuth2/OAuth2.1, and provides practical security best‑practice recommendations for web, mobile, and micro‑service architectures.

AuthenticationJWTOAuth2
0 likes · 12 min read
Mastering Modern Login Mechanisms: Cookies, Sessions, JWT, OAuth2 & SSO
php Courses
php Courses
Nov 19, 2025 · Backend Development

How to Send Bulk Emails with PHP’s mail() Safely and Efficiently

Learn how to use PHP’s built-in mail() function to send emails to multiple recipients, covering basic syntax, two practical methods (comma-separated To and BCC/CC headers), essential security precautions, common pitfalls, and why professional libraries like PHPMailer are often a better choice.

BCCMailPHPMailer
0 likes · 8 min read
How to Send Bulk Emails with PHP’s mail() Safely and Efficiently
Data Thinking Notes
Data Thinking Notes
Nov 16, 2025 · Artificial Intelligence

How AI Agents Transform Automation: Architecture, Challenges & Future Trends

This comprehensive overview examines AI agents powered by large language models, detailing their definition, core components, architectural patterns, key technologies such as prompt engineering and retrieval‑augmented generation, diverse application domains, current challenges, security solutions, and emerging research directions.

Prompt engineeringRetrieval Augmented GenerationSecurity
0 likes · 81 min read
How AI Agents Transform Automation: Architecture, Challenges & Future Trends
Architect
Architect
Nov 10, 2025 · Backend Development

How to Build Secure, Idempotent APIs: Keys, Tokens, and Anti‑Replay Strategies

This article explains how to design secure and reliable APIs for third‑party integration by covering API key generation, AK/SK authentication, callback URLs, permission models, token mechanisms, signature creation, replay‑attack prevention, HTTPS encryption, rate limiting, logging, data masking, idempotency, versioning, standardized response formats and documentation tools.

AuthenticationIdempotencySecurity
0 likes · 28 min read
How to Build Secure, Idempotent APIs: Keys, Tokens, and Anti‑Replay Strategies
21CTO
21CTO
Nov 10, 2025 · Backend Development

cURL 8.17.0 Released: Key Security Fixes, New Features, and Dropped Support

The cURL 8.17.0 release introduces critical security patches for CVE‑2025‑10966, adds several new capabilities such as an expanded progress indicator and Apple SecTrust support, and removes legacy features like Heimdal and wolfSSH, marking a significant update for developers and system administrators.

LibraryNetworkingSecurity
0 likes · 3 min read
cURL 8.17.0 Released: Key Security Fixes, New Features, and Dropped Support
Xiao Liu Lab
Xiao Liu Lab
Nov 9, 2025 · Operations

Set Up DDNS‑GO in 3 Minutes for Seamless Dynamic IP Access

This guide shows how to quickly configure the open‑source DDNS‑GO tool with Docker, obtain API keys from DNS providers, and secure the web interface, enabling reliable remote access to home or office networks despite constantly changing public IP addresses.

Cloud ServicesDDNSDocker
0 likes · 5 min read
Set Up DDNS‑GO in 3 Minutes for Seamless Dynamic IP Access