Skip to content
ITNotes ITNotes

From Terminal to Cloud

  • AI
  • DevOps
  • HomeLab
  • Linux
  • Networking
  • Programming
  • English
    • English
    • Tiếng Việt
    • 日本語
  • AI
  • DevOps
  • HomeLab
  • Linux
  • Networking
  • Programming
  • English
    • English
    • Tiếng Việt
    • 日本語
Home » Archives for admin » Page 4
About admin
Database tutorial - IT technology blog
Posted inDatabase

Mastering Database Branching with Neon: No More 2 AM Production Disasters

May 10, 2026
Tired of production migrations failing due to 'data gaps'? Discover how Neon's database branching lets you test against real production data in isolated, instant environments.
Read More
Networking tutorial - IT technology blog
Posted inNetworking

Bypass CGNAT: Use Reverse SSH Tunneling to Expose Local Services

May 10, 2026
Tired of CGNAT blocking your home server? Learn how to use a cheap VPS and Reverse SSH Tunneling to bypass ISP restrictions and access your local services from anywhere.
Read More
Programming tutorial - IT technology blog
Posted inProgramming

Mastering the Worker Pool Pattern in Go: Handling Millions of Tasks with Controlled Concurrency

May 10, 2026
A deep dive into the Worker Pool pattern in Go, based on six months of production experience. Learn how to balance throughput and resource safety while handling millions of tasks.
Read More
Networking tutorial - IT technology blog
Posted inNetworking

Bypassing the Bridge: Why We Switched to Macvlan and Ipvlan in Production

May 10, 2026
Is the Docker bridge slowing you down? See how we used Macvlan and Ipvlan to connect containers directly to our physical network, cutting CPU overhead and reducing latency in our VOIP and streaming clusters.
Read More
DevOps tutorial - IT technology blog
Posted inDevOps

Dapr in Practice: Decoupling Microservices on Kubernetes with State Management and Pub/Sub

May 10, 2026
Tired of infrastructure SDK bloat? Use Dapr to standardize microservices on Kubernetes. This guide covers State Management and Pub/Sub implementation using the Sidecar pattern.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Centralizing Vulnerability Management: A Practical Guide to DefectDojo, Trivy, and Semgrep

May 10, 2026
Streamline your security workflow by centralizing findings from Trivy, Nmap, and Semgrep. This guide walks you through setting up DefectDojo and automating your vulnerability management.
Read More
Database tutorial - IT technology blog
Posted inDatabase

PostgreSQL Disaster Recovery: Why You Need Barman When Your Database Dies at 2 AM

May 10, 2026
A professional guide to PostgreSQL Disaster Recovery. Learn why pg_dump is insufficient for production and how to implement Barman for sub-minute data recovery.
Read More
HomeLab tutorial - IT technology blog
Posted inHomeLab

How to Install CasaOS on Ubuntu: Give Your Old PC a Second Life as a Personal Cloud

May 10, 2026
Give your old PC a second life. Learn how to install and configure CasaOS on Ubuntu for a stable, user-friendly home server based on 6 months of testing.
Read More
Security tutorial - IT technology blog
Posted inSecurity

Masking PII in System Logs: A Fluent Bit Guide to Redacting Emails, IPs, and Passwords

May 10, 2026
Leaking PII in system logs is a major compliance risk. This guide shows you how to use Fluent Bit's modify and Lua filters to mask emails, IPs, and passwords at the source.
Read More
Networking tutorial - IT technology blog
Posted inNetworking

Kill the ksoftirqd Bottleneck: A Hands-on Guide to NIC Offloading and Interrupt Coalescing

May 10, 2026
Is ksoftirqd pinning your CPU? Learn how to use ethtool to enable TSO, GRO, and interrupt coalescing to eliminate network bottlenecks on high-traffic Linux servers.
Read More

Posts pagination

Previous page 1 2 3 4 5 6 … 61 Next page
Copyright 2026 — ITNotes. All rights reserved.
Privacy Policy | Terms of Service | Contact: [email protected] DMCA.com Protection Status
Scroll to Top