ByteCookAn Overview of HTTP Performance OptimizationSince we aim to optimize performance, we first need to understand what performance is, what metrics it includes, how to measure it, and…Just nowJust now
ByteCookIs It Possible To Run Programs in Containers Without Using the Root User?In the previous article, we explored the concept of Linux capabilities and learned that for non-privileged containers, the capabilities of…2h ago2h ago
ByteCookinLevel Up CodingPowerful Decorators in PythonDecorators have always been a useful and classic feature in Python, widely applied in various engineering tasks such as logging and…21h ago21h ago
ByteCookAtomic Classes in Java: A Paradigm of Lock-Free Utility ClassesEarlier, we frequently mentioned an example of an accumulator. The sample code is as follows. In this example, the add10K() method is not…1d ago1d ago
ByteCookinDevOps.devDo Containers Really Need Privileged Permissions?Container security is a vast topic, and the security of containers is largely determined by their architectural features. For instance…1d ago1d ago
ByteCookinLevel Up CodingPass by Value, Pass by Reference, or Something Else: How Are Parameters Passed in Python?The so-called parameter passing involves sending some parameters from one function to another, enabling the latter to perform its task…3d ago3d ago
ByteCookPrecautions for Using Java Concurrent ContainersThe Java concurrency package contains a significant portion dedicated to concurrent containers, making it essential to understand and…3d ago3d ago
ByteCookinCodeXUsing Web Application Firewall(WAF) to Protect Our Network ServicesIn previous articles, I discussed HTTPS, which uses the SSL/TLS protocol to encrypt the entire communication process, preventing malicious…3d ago3d ago
ByteCookinDevOps.devTroubleshooting Packet Reordering Issues in ContainersThis issue arises from practical work experience. Our users noticed that after migrating their applications from physical machines to…3d ago3d ago