Skip to content

Crack SDE

Most of the content are generated by AI, with human being reviewed, edited, and revised

Menu
  • Home
  • Daily English Story
  • Tech Interviews
  • Cloud Native
  • DevOps
  • Artificial Intelligence
Menu

Month: December 2023

Context-switching/cgroup in Linux

Posted on 12/10/202312/12/2023 by user

context-switching Context switching in Linux refers to the process of storing and restoring the execution context or state of a CPU so that it can resume execution of a different process. control-groups…

System Design – A Distributed High-throughput Counter

Posted on 12/09/202312/12/2023 by user

Designing a high-throughput, scalable counter system with a focus on write-heavy operations involves several key components and considerations. Now, the system needs to handle a large volume of write operations (1M writes/sec)…

System Design for Task Scheduling with Dependencies

Posted on 12/09/202312/12/2023 by user

Overview Designing a task scheduler involves handling tasks with varying frequencies and dependencies. The system must ensure tasks are executed on schedule, dependencies are respected, and long-running tasks are managed effectively. High-Level…

Linux Commands Examples

Posted on 12/08/202312/10/2023 by user

nslookup nslookup is a cross-platform command-line tool for querying the Domain Name System (DNS). Purpose Command Basic DNS Lookup nslookup example.com Find Mail Servers for a Domain nslookup -type=mx example.com Query Specific…

How SSH works

Posted on 12/06/202312/08/2023 by user

SSH (Secure Shell) is a protocol used for securely accessing one computer from another over an insecure network. It provides strong authentication and encrypted data communications between two computers connecting over an…

How does mount works

Posted on 12/05/202312/08/2023 by user

Mount The mount command in Unix and Unix-like operating systems is used to attach a filesystem (from a disk, partition, or storage device) to the file system hierarchy at a specific point,…

How traceroute works

Posted on 12/05/202312/07/2023 by user

traceroute is a network diagnostic tool used to track the path that an IP packet takes to reach a destination. It provides information about each point (or “hop”) along the route, including…

HTTP GET/POST/POST

Posted on 12/05/202312/07/2023 by user

GET, POST, and PUT are HTTP methods used in the context of web requests. Each method indicates a different type of action and is chosen based on the operation being performed. Here…

Hard link and Soft link

Posted on 12/05/202312/07/2023 by user

In Unix-like operating systems, hard links and soft links (also known as symbolic links) are two types of links that can be created to reference files. They serve different purposes and have…

Zombie Process

Posted on 12/05/202312/07/2023 by user

In Linux and other Unix-like operating systems, a “zombie” process, or defunct process, is a process that has completed execution but still has an entry in the process table. This occurs when…

Posts pagination

Previous 1 2 3 4 Next

Recent Posts

  • LC#622 Design Circular Queue
  • Started with OpenTelemetry in Go
  • How Prometheus scrap works, and how to find the target node and get the metrics files
  • How to collect metrics of container, pods, node and cluster in k8s?
  • LC#200 island problem

Recent Comments

  1. another user on A Journey of Resilience

Archives

  • May 2025
  • April 2025
  • February 2025
  • July 2024
  • April 2024
  • January 2024
  • December 2023
  • November 2023
  • October 2023
  • September 2023
  • August 2023
  • June 2023
  • May 2023

Categories

  • Artificial Intelligence
  • Cloud Computing
  • Cloud Native
  • Daily English Story
  • Database
  • DevOps
  • Golang
  • Java
  • Leetcode
  • Startups
  • Tech Interviews
©2025 Crack SDE | Design: Newspaperly WordPress Theme
Manage Cookie Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
Manage options Manage services Manage {vendor_count} vendors Read more about these purposes
View preferences
{title} {title} {title}