Return to index http://www.cnblogs.com/lovecindywang/archive/2012/12/23/2829828.html
Architecture:
Log set
The so-called log set refersProgramAll logs and exception information records are summarized together. When there is only one server, we do not have the largest problem of recording local files, however, if you record local logs in the Server Load balancer environment, the problem may occur. I don't know which machine to que
The second article of the grid site architecture case series. Mainly explain the website Architecture analysis, website architecture optimization, business split, application cluster architecture, multilevel cache, distributed session. Five, the website structure Analysis
Ba
The second article of the grid site architecture case series. Mainly explain the website Architecture analysis, website architecture optimization, business split, application cluster architecture, multilevel cache, distributed session.Five, the website structure analysisAcco
of the introduction, the work requires you to be based on the specific business scenarios for the architecture design.The above is the e-commerce website Architecture case sharing a total of three, from the e-commerce website needs, to the single-machine architecture, gradually evolved into a common, reference to the distributed
[MySQL major series] Mysql cluster architecture, mysql cluster architecture
Original article address (): [Technical Article] Mysql cluster architecture
Address: http://www.cnblogs.com/aiweixiao/p/7258444.html
Click follow public account
1. Main Content
1) mysql architecture
reduce the workload of developers , I think this is also the most practical application system, I believe that with hibernate have suffered its pain, and used mybatis will feel it is simple and easy. second, the overall structureThe following is an overall architecture diagram describing mybatis from the functional process hierarchyAnd the following is the MyBatis source package corresponding to the architecture
data and increase concurrency. To put it bluntly, we just need to clean up the pipeline to make the pipeline bigger, or add more pipelines, or try to reduce the water in the pipeline to make it smoother. The most professional UI front-end framework!
Performance Analysis
Currently, some tools can analyze the performance of JavaScript and even Dom parsing in detail, such as dynatrace Ajax edition, with this tool, we can analyze whether our script code and page layout are reasonable, and fully u
range to minimize the number of user domain name resolution, reduce the amount of data downloaded by users, increase concurrency and so on. In fact, we just clean up the pipes to make the pipes bigger, or add more pipes, or just try to keep the water inside the pipe a little less, so that it can be smoother. Resource examplesPerformance analysisThere are tools that can be used to perform detailed analysis of JavaScript performance and even DOM parsing, such as Dynatrace AJAX Edition, which allo
TDD, if you are writing a class library or framework, it is necessary, otherwise it is hard to imagine how high the stability of this set of code will be. In addition to the above mentioned XXX, there are still many things that need to be implemented as the basic framework. I have drawn a brain image for reference: http://www.iteye.com/topic/1134828. As a framework, I think there are some elements that need to be met:
It is very easy to keep the external interface of the framework as much as p
-installation of RABBITMQ3) "ZeroMQ"Known as the fastest message queue, it is actually similar to the socket of a series of interfaces, the difference between him and the socket is: the ordinary socket is end-to-end (1:1 of the relationship), and ZMQ is can be n:m relationship, people on the BSD socket understanding more is the point-to-point connection, A point-to-point connection requires an explicit connection, a destroy connection, a selection pro
the authentication mechanism, so that the API should be usedYou do not need to specify a specific SASL mechanism. This API facilitates client and server applications so that applications can be based on the required security featuresSelect the mechanism you want to use, such as whether you are susceptible to passive dictionary attacks and whether you accept anonymous authentication. The Java SASL API also allows developers to create custom SASL mechanisms. The SASL mechanism can be installed us
discovered. The wrong state may spread, if you think that the thread is only doing operations that are irrelevant to the important state, make sure that the thread does not encounter unhandled exceptions. The latest UI front-end framework! Trial with prize!
Code Generation
Code generation has many functions. For example, we can use code generation to reduce the amount of writing our code, or we can use code generation to implement cross-section operations such as AOP. Generally, there are
to determine whether the user has logged on, it is unreasonable to use the user name in the clear code, if you change the username of an administrator, does the system assume that the Administrator has logged on to the system? The solution is to save an encrypted user name, but this is also insecure, because once the encryption method is not cracked, it will still generate a huge vulnerability, therefore, the user name and password can be stored in the cookie at the same time, that is to say, t
Three, in-depth rddThe Rdd itself is an abstract class with many specific implementations of subclasses:
The RDD will be calculated based on partition:
The default partitioner is as follows:
The documentation for Hashpartitioner is described below:
Another common type of partitioner is Rangepartitioner:
The RDD needs to consider the memory policy in the persistence:
Spark offers many storagelevel to choose from:
At the same time,
providers, which are placed in front of the SUNJCE provider to use them.The default SUNJCE provider provides the following features:
Implement the SSL3.0 and TLS1.0 protocols.
Implements the ssl/i ' LS state machine (sslengine), which allows the processing of buffer data to generate ssl/i ' LS encoded data(J2SE 5.0 and later).
Implements the key factory and key generator used to support the RSA algorithm.
Implement the most common SSL and TLS cryptographic algorithm suite t
write request on one key of a library? It is easy to think of using caching when a write request occurs:(1) A key on a library to write, recorded in the cache, and set the "Experience master and Slave synchronization Time" cache time-out, such as 500ms(2) Modify the databaseAnd when the read request occurs:(1) First to the cache to see, corresponding to the library key has no relevant data(2) If the cache hit, there is the relevant data, indicating that a write operation has occurred on this ke
Guo JiaEmail: [Email protected]Blog: http://blog.csdn.net/allenwellsGithub:https://github.com/allenwellJCP (Java certpath) is a Java certificate path that integrates the functionality of certificate checking, verification, and validation for your application. Features include the following:
Interpreting and managing certificates
Certificate Revocation List
Certificate path
The JCP API implementation can be plugged into any J2SE environment because the JCA provider interface used is
processes, you can compare the threads that consume a lot of time and the threads that consume a lot of time. multithreading mainly focuses on the code to analyze CPU performance problems.
In addition to this internal analysis method, you can also analyze it externally. For example, you can use tools such as fiddler to check whether the slow speed is due to network or concurrency or the server. For example, you can use a database monitoring tool to monitor the execution time of each SQL statem
Return to index http://www.cnblogs.com/lovecindywang/archive/2012/12/23/2829828.html
Design Level:
Layered Architecture
Layered Architecture is an important part in project design. It aims to separate responsibilities. The most classic three-tier architecture, from four to five, six layers, some people joke that the 18-tier hierarchy can be
processing capability can be expanded. Server Load balancer is a typical high-scalability architecture. In addition, it can also split services by different servers to implement different services. Generally, load balancing is easier for Stateless web services, and horizontal scaling is difficult at the database level, especially for database write operations. Generally, you can use LVS or haproxy to achieve Load Balancing (of course, you can also us
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.