Tony HuangCaching StrategiesCache is everywhere: processor core cache, memory page and disk cache, DNS cache, HTTP cache like CDN, database cache, browser cache. We…Nov 26, 2022Nov 26, 2022
Tony HuangPython Dependency Management ToolsDeveloping a software without using third party dependencies is nearly impossible. We always leverage others’ work to to save our efforts…Oct 17, 20221Oct 17, 20221
Tony HuanggRPC + Protocol Buffer + GoIn the previous two posts, we discussed about gRPC and protocol buffer, and all the examples I wrote is in Go. So, in this post, I will…Oct 9, 2022Oct 9, 2022
Tony HuangProtocol BufferIn the previous post, we discuss about gRPC. It is not complete without mentioning its IDL — Protocol Buffer. Let’s go through protobol…Oct 9, 2022Oct 9, 2022
Tony HuanggRPCRemote procedure call (RPC) is a mechanism allowing computers communicate with each other. A node can ask another node to do something and…Oct 5, 2022Oct 5, 2022
Tony HuangSQL InjectionSQL injection is a most common web hacking, code injection attack technique that manipulates and accesses to your database. We will go…Oct 4, 2022Oct 4, 2022