Container Technology Explained
Containers use Linux namespaces for isolated processes and cgroups for resource limits. Lightweight virtualization with separate filesystems and networks.
Welcome to the complete index of every article in our Terms Explained collection on When Notes Fly. This page lists all 10 articles in the section, organized alphabetically for easy reference. Each piece is researched, written by hand, and grounded in academic sources, professional practice, or empirical data. Whether you are diving into Terms Explained for the first time or returning to find a specific article, the index below gives you direct access to the full collection within Explainers.
If you are new to Terms Explained, we recommend starting with the foundational explainers and definitions before moving on to specific case studies, applied frameworks, and deeper analytical pieces. Articles are written for thoughtful readers who want substance over summary, with clear explanations of how ideas connect, where they come from, and why they matter. Use this index as a navigational map: skim the titles, read the short summaries, and click through to the pieces that draw your interest. Each article also links to related material so you can follow a thread of ideas across our entire Explainers library.
Containers use Linux namespaces for isolated processes and cgroups for resource limits. Lightweight virtualization with separate filesystems and networks.
Database indexes use B-tree structures maintaining sorted pointers to rows. Like book indexes, they enable fast lookups without scanning entire tables.
Transactions treat operations as single units—all succeed or all fail. ACID properties: Atomicity (all-or-nothing), Consistency, Isolation, Durability.
APIs define software communication contracts. REST APIs use endpoints like /users and HTTP methods like GET for read and POST for create operations.
DNS resolution: Browser checks cache, queries recursive resolver like Google DNS, resolver checks cache, then queries root nameservers to find IP addresses.
Encryption transforms plaintext into ciphertext using algorithms and keys. Intercepted data is useless without the key. Symmetric and asymmetric types exist.
Load balancers distribute incoming requests across servers using algorithms like round robin for fairness and least connections for optimal routing.
Search engines crawl pages by following links, index content by extracting text and metadata, then rank results using algorithms and relevance signals.
Git stores snapshots as commits with complete file trees and metadata. Objects include blobs for content, trees for directories, commits for history.
ML training: Initialize model with random weights, forward pass makes predictions, calculate loss measuring error, backpropagation updates weights, repeat.