In Linux, you need to add
Mod_proxy Module, which can be configured as follows.
The configuration steps are as follows:1. First, go to the proxy directory of Apache source code.# Cd/root/desktop/httpd-2.2.4 # cd modules/Proxy/2. Compile the
BTree,B-Tree,B +Tree,B *What are trees? BTree That is, the binary search tree: 1.All non-leaf nodes have at most two sons (LeftAndRight); 2.A keyword is stored on all nodes; 3.The left pointer of a non-leaf node points to the subtree
Martin Fowler wrote an article long ago.ArticleThe title is "anemia model ". In this article, the domain model criticizing anemia is not elegant enough or oo enough. We advocate the use of the domain model of congestion. In the Java World, this has
Install
WebLogic It is relatively easy. I will not talk about it here. You can refer to the relevant documents. Now let's focus on
WebLogic Because the configuration is later
Myeclipse The configuration information here will be used.
① Start
Consider whether it can be added to a single class before using reflection. Class stranger { Public stranger (final string name ){This. Name = Name;} Private final string greet (final string Hello ){Return Hello + name;} Private string name = "";
Related settings This section describesLabel to specify different transaction settings. DefaultThe settings are as follows:
The transaction propagation setting isRequired
Isolation level isDefault
Transaction is read/write
In the Struts + hibernate structure, the PO generated by hibernate should not be directly transmitted to JSP. Whether it is iterator or list, this is a design error.
Let's talk about the data representation at each layer in the J2EE architecture:
What is the meaning of the ipvs command output? I have to enter the following information. activeconn and inactconn are both high. What's the problem? I use Linux as3.0, heartbeat + ldirector + LVS. The total number of concurrent jobs in the cluster
Software Version: Maven 2.2 Tomcat 6.0, eclipse 3.4
The first step is to build the environment. tomcat, Maven, and m2eclipse are not mentioned. This is not a good choice, and you will not have to watch the rest. Everything is ready, so let's start
When we recommend Ruby on Rails to our friends who are engaged in enterprise applications, the common problems are: "Is there a good open-source workflow engine for Ruby? "Building a workflow engine based on a finite state machine (Finite State
I often see this problem, so that the iddebugenabled attribute is not used. This issue is often controversial, and the focus is on performance.
The answer is simple. Since this property is available, it is of course used. However, you need to pay
Definition of Missing Update:When two or more transactions select the same row and update the row based on the originally selected value, the update will be lost. Every transaction does not know the existence of other transactions. The final update
I set up a dial-up access platform in CERNET, developed it on the front-end platform of the load search engine in yahoo3721, and processed a large scale in the maopu Community The architecture upgrade and other work of the maopu hodgedge, as well as
Locking)
During the implementation of business logic, data access needs to be exclusive. For example, in the daily final computing process of the financial system, we want to process the data at a cut-off time point instead of the settlement process
I. Software introduction (APACHE Lighttpd nginx)
1. Lighttpd
Lighttpd features low memory overhead, low CPU usage, good performance, and rich modules. Lighttpd is one of the many opensource lightweight Web servers. Supports important functions
This is the famous
Liskov replacement principle (LSP ), Also known
Rys replacement principle .
The general understanding of this principle is that the methods of the parent class must be implemented or overwritten in the subclass, and the methods
35.1 mini edition Transaction System
Everyone may be excited about the bank's transaction system. Once they hear IT, they say IT is a bank's IT staff. They take IT for granted that this is a very powerful character, now we will make a preliminary
An appropriate index can accelerate the query speed. There are four types: primary key, unique index, full-text index, and common index.
Primary Key: Unique and null value.
Create table pk_test (f1 int not null,
Primary key(F1 ));
Alter table
Article Reprinted from: http://www.opsers.org/2010_03_886.html
Iptables related concepts
Match: meets the specified conditions, such as the specified IP address and port.Drop: When a packet arrives, it is simply discarded without any other
Copy from: http://cs.nyu.edu/courses/fall98/G22.2262-001/class11.txt
The IP packet format: -------------------------------------------------------------------------| 4-bit | 4-bit header |8-bit "type | 16-bit total length (in bytes) || version |
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service