architecture series

Learn about architecture series, we have the largest and most updated architecture series information on alibabacloud.com

Related Tags:

My Architecture Experience series-backend architecture-architecture Layer

Return to index http://www.cnblogs.com/lovecindywang/archive/2012/12/23/2829828.html Architecture: Log set The so-called log set refersProgramAll logs and exception information records are summarized together. When there is only one server, we do not have the largest problem of recording local files, however, if you record local logs in the Server Load balancer environment, the problem may occur. I don't know which machine to que

Large Web site Architecture series: E-commerce website Architecture case (2)

The second article of the grid site architecture case series. Mainly explain the website Architecture analysis, website architecture optimization, business split, application cluster architecture, multilevel cache, distributed session. Five, the website structure Analysis Ba

Large Web site Architecture series: E-commerce website Architecture case (2)

The second article of the grid site architecture case series. Mainly explain the website Architecture analysis, website architecture optimization, business split, application cluster architecture, multilevel cache, distributed session.Five, the website structure analysisAcco

Large Web site Architecture series: E-commerce website Architecture case (3)

of the introduction, the work requires you to be based on the specific business scenarios for the architecture design.The above is the e-commerce website Architecture case sharing a total of three, from the e-commerce website needs, to the single-machine architecture, gradually evolved into a common, reference to the distributed

[MySQL major series] Mysql cluster architecture, mysql cluster architecture

[MySQL major series] Mysql cluster architecture, mysql cluster architecture Original article address (): [Technical Article] Mysql cluster architecture Address: http://www.cnblogs.com/aiweixiao/p/7258444.html Click follow public account 1. Main Content 1) mysql architecture

MyBatis Architecture design and source Code Analysis Series (i): MyBatis architecture

reduce the workload of developers , I think this is also the most practical application system, I believe that with hibernate have suffered its pain, and used mybatis will feel it is simple and easy. second, the overall structureThe following is an overall architecture diagram describing mybatis from the functional process hierarchyAnd the following is the MyBatis source package corresponding to the architecture

My Architecture Experience series-front-end architecture

data and increase concurrency. To put it bluntly, we just need to clean up the pipeline to make the pipeline bigger, or add more pipelines, or try to reduce the water in the pipeline to make it smoother. The most professional UI front-end framework! Performance Analysis Currently, some tools can analyze the performance of JavaScript and even Dom parsing in detail, such as dynatrace Ajax edition, with this tool, we can analyze whether our script code and page layout are reasonable, and fully u

My Architecture Experience series-Front end architecture

range to minimize the number of user domain name resolution, reduce the amount of data downloaded by users, increase concurrency and so on. In fact, we just clean up the pipes to make the pipes bigger, or add more pipes, or just try to keep the water inside the pipe a little less, so that it can be smoother. Resource examplesPerformance analysisThere are tools that can be used to perform detailed analysis of JavaScript performance and even DOM parsing, such as Dynatrace AJAX Edition, which allo

My Architecture Experience series-backend architecture-framework layer

TDD, if you are writing a class library or framework, it is necessary, otherwise it is hard to imagine how high the stability of this set of code will be. In addition to the above mentioned XXX, there are still many things that need to be implemented as the basic framework. I have drawn a brain image for reference: http://www.iteye.com/topic/1134828. As a framework, I think there are some elements that need to be met: It is very easy to keep the external interface of the framework as much as p

"System Architecture" reads "Large Web site Architecture series: Distributed Message Queuing" collation

-installation of RABBITMQ3) "ZeroMQ"Known as the fastest message queue, it is actually similar to the socket of a series of interfaces, the difference between him and the socket is: the ordinary socket is end-to-end (1:1 of the relationship), and ZMQ is can be n:m relationship, people on the BSD socket understanding more is the point-to-point connection, A point-to-point connection requires an explicit connection, a destroy connection, a selection pro

"Java Security Technology Exploration Path series: Java Extensible Security Architecture" of 20: SASL (a): SASL architecture Introduction. MD

the authentication mechanism, so that the API should be usedYou do not need to specify a specific SASL mechanism. This API facilitates client and server applications so that applications can be based on the required security featuresSelect the mechanism you want to use, such as whether you are susceptible to passive dictionary attacks and whether you accept anonymous authentication. The Java SASL API also allows developers to create custom SASL mechanisms. The SASL mechanism can be installed us

My Architecture Experience series-backend architecture-language Layer

discovered. The wrong state may spread, if you think that the thread is only doing operations that are irrelevant to the important state, make sure that the thread does not encounter unhandled exceptions. The latest UI front-end framework! Trial with prize! Code Generation Code generation has many functions. For example, we can use code generation to reduce the amount of writing our code, or we can use code generation to implement cross-section operations such as AOP. Generally, there are

My Architecture Experience series-backend architecture-Security Layer

to determine whether the user has logged on, it is unreasonable to use the user name in the clear code, if you change the username of an administrator, does the system assume that the Administrator has logged on to the system? The solution is to save an encrypted user name, but this is also insecure, because once the encryption method is not cracked, it will still generate a huge vulnerability, therefore, the user name and password can be stored in the cookie at the same time, that is to say, t

Spark Asia-Pacific Research series "Spark Combat Master Road"-3rd Chapter Spark Architecture design and Programming Model Section 3rd: Spark Architecture Design (2)

Three, in-depth rddThe Rdd itself is an abstract class with many specific implementations of subclasses: The RDD will be calculated based on partition: The default partitioner is as follows: The documentation for Hashpartitioner is described below: Another common type of partitioner is Rangepartitioner: The RDD needs to consider the memory policy in the persistence: Spark offers many storagelevel to choose from: At the same time,

"Java Security Technology Exploration Path series: Java Extensible Security Architecture" XI.: JSSE (a): JSSE architecture Introduction

providers, which are placed in front of the SUNJCE provider to use them.The default SUNJCE provider provides the following features: Implement the SSL3.0 and TLS1.0 protocols. Implements the ssl/i ' LS state machine (sslengine), which allows the processing of buffer data to generate ssl/i ' LS encoded data(J2SE 5.0 and later). Implements the key factory and key generator used to support the RSA algorithm. Implement the most common SSL and TLS cryptographic algorithm suite t

"58 Shen Jian Architecture Series" DB master-Slave Conformance architecture Optimization 4 ways

write request on one key of a library? It is easy to think of using caching when a write request occurs:(1) A key on a library to write, recorded in the cache, and set the "Experience master and Slave synchronization Time" cache time-out, such as 500ms(2) Modify the databaseAnd when the read request occurs:(1) First to the cache to see, corresponding to the library key has no relevant data(2) If the cache hit, there is the relevant data, indicating that a write operation has occurred on this ke

"Java Security Technology Exploration Road Series: Java Extensible Security Architecture" eight: JCP (a): JCP architecture Introduction

Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellJCP (Java certpath) is a Java certificate path that integrates the functionality of certificate checking, verification, and validation for your application. Features include the following: Interpreting and managing certificates Certificate Revocation List Certificate path The JCP API implementation can be plugged into any J2SE environment because the JCA provider interface used is

My Architecture Experience series-backend architecture-performance level

processes, you can compare the threads that consume a lot of time and the threads that consume a lot of time. multithreading mainly focuses on the code to analyze CPU performance problems. In addition to this internal analysis method, you can also analyze it externally. For example, you can use tools such as fiddler to check whether the slow speed is due to network or concurrency or the server. For example, you can use a database monitoring tool to monitor the execution time of each SQL statem

My Architecture Experience series-backend architecture-Design Level

Return to index http://www.cnblogs.com/lovecindywang/archive/2012/12/23/2829828.html Design Level: Layered Architecture Layered Architecture is an important part in project design. It aims to separate responsibilities. The most classic three-tier architecture, from four to five, six layers, some people joke that the 18-tier hierarchy can be

My Architecture Experience series-backend architecture-system layer

processing capability can be expanded. Server Load balancer is a typical high-scalability architecture. In addition, it can also split services by different servers to implement different services. Generally, load balancing is easier for Stateless web services, and horizontal scaling is difficult at the database level, especially for database write operations. Generally, you can use LVS or haproxy to achieve Load Balancing (of course, you can also us

Total Pages: 15 1 2 3 4 5 .... 15 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.