Skip to content
It technology security

It technology security

Second generation CDN architecture and ordinary CDN architecture

Recently, there is no thing to write, introduce a thing of our company a few births, may be a new thing for many people. . […]

Read more

Cuckoo Filter: Design and Implementation

March 8, 2022 admin

For massive data processing services, we usually need an index data structure to help queries, quickly determine if the data record exists, and this data […]

Read more
  • system architecture

Agent service and overload protection

March 8, 2022 admin

In the SkyNet, it is necessary to implement a pre-active agent service for a service. For example, you want the request to be initiated to […]

Read more
  • system architecture

Thoughts on TCP Reliability, Talking about Application Layer Agreement Design

March 8, 2022 admin

This article mainly discusses how to design a reliable RPC protocol. TCP is a reliable transmission protocol, no packet loss, will not be dilated, this […]

Read more
  • network system

Website Optimize smaller static resources

March 8, 2022 admin

Website optimization smaller static resources smaller static resources (JS, CSS, PNG, GIF) mean less network transmission time. During […]

Read more
  • system architecture

Use progressive JPEG to enhance user experience

March 7, 2022 admin

Today, I realized that there are two ways of saving in the original JPEG files. They are Baseline JPEG (standard) and Progressive JPEG (progressive). The […]

Read more
  • system architecture

Pinterest’s FEED architecture and algorithm

March 7, 2022 admin

The FEED message stream of the Pinterest Home is the earliest to sort according to the PIN (Similar Weibo) aggregation according to the user’s attention […]

Read more
  • system architecture

Certificate Transparency Those things

March 7, 2022 admin

There are two changes in HTTPS in this site: First, this site name (iMququ.com) joined Chrome’s HSTS Preload List, which took effect from Chrome 49; […]

Read more
  • website security

Nginx filter Hash DDOS attack

March 6, 2022 admin

This may all be airs, but it is still in the way I use it, and it can be used for reference. The language of […]

Read more
  • website security

Application of Online Status Service in Website System

March 6, 2022 admin

My previous blog article “Talk about Facebook’s chat system architecture”, analyzed Facebook’s chat system architecture. Some ideas and systems are divided, and they are also […]

Read more
  • system architecture

What is the social value of excavation vulnerabilities?

March 6, 2022 admin

Someone in Weibo asked a very fun question: @ : “Ask the safety circle friends a question: from the perspective of human social development, where […]

Read more
  • website security

Posts navigation

1 2 3 … 29 Next Posts»

Recent Posts

  • Second generation CDN architecture and ordinary CDN architecture
  • Cuckoo Filter: Design and Implementation
  • Agent service and overload protection
  • Thoughts on TCP Reliability, Talking about Application Layer Agreement Design
  • Website Optimize smaller static resources

Recent Comments

No comments to show.

Archives

  • March 2022
  • February 2022
  • January 2022
  • December 2021
  • November 2021
  • October 2021

Categories

  • network system
  • system architecture
  • website security