All Terms Explained Articles

Welcome to the complete index of every article in our Terms Explained collection on When Notes Fly. This page lists all 10 articles in the section, organized alphabetically for easy reference. Each piece is researched, written by hand, and grounded in academic sources, professional practice, or empirical data. Whether you are diving into Terms Explained for the first time or returning to find a specific article, the index below gives you direct access to the full collection within Explainers.

If you are new to Terms Explained, we recommend starting with the foundational explainers and definitions before moving on to specific case studies, applied frameworks, and deeper analytical pieces. Articles are written for thoughtful readers who want substance over summary, with clear explanations of how ideas connect, where they come from, and why they matter. Use this index as a navigational map: skim the titles, read the short summaries, and click through to the pieces that draw your interest. Each article also links to related material so you can follow a thread of ideas across our entire Explainers library.

Browse All Terms Explained Articles

Container Technology Explained

Containers use Linux namespaces for isolated processes and cgroups for resource limits. Lightweight virtualization with separate filesystems and networks.

Database Indexing Explained

Database indexes use B-tree structures maintaining sorted pointers to rows. Like book indexes, they enable fast lookups without scanning entire tables.

How APIs Work: Technical Deep Dive

APIs define software communication contracts. REST APIs use endpoints like /users and HTTP methods like GET for read and POST for create operations.

How DNS Resolution Works

DNS resolution: Browser checks cache, queries recursive resolver like Google DNS, resolver checks cache, then queries root nameservers to find IP addresses.

How Encryption Protects Data

Encryption transforms plaintext into ciphertext using algorithms and keys. Intercepted data is useless without the key. Symmetric and asymmetric types exist.

How Load Balancers Distribute Traffic

Load balancers distribute incoming requests across servers using algorithms like round robin for fairness and least connections for optimal routing.

How Version Control Systems Work

Git stores snapshots as commits with complete file trees and metadata. Objects include blobs for content, trees for directories, commits for history.

« Back to Terms Explained · All Explainers Articles · Home