Alibabacloud.com offers a wide variety of articles about mdm architecture principles, easily find your mdm architecture principles information here online.
1. Overview
Dr. Roy Fielding (see Personal homepage) is the main designer of the HTTP and URI protocol issued by the IETF. HTTP and Uri are the two most important web infrastructure protocols, so Dr. Fielding is one of the founders of the Web architecture.
In addition to academic excellence, Dr. Fielding has been involved in the design and development of many Open-source software. He was the developer of Libwww-perl, one of the world's earliest HTTP
: Interface high cohesion is internally highly dependent and isolated as much as possible. That is, the method of internal declaration of an interface is related to a sub-module, and is required by this submodule.
Interface design is limited: If you fully follow the principle of interface separation, there will be a problem, that is, the design of the interface will be less and less, so that the number of interface increases, the complexity of the system increased suddenly, rather than the
Recently just finished reading Hae's "large Web site technology architecture-core Principles and case analysis", the key content of each chapter made some notes, in order to deepen the impression and future review.First, the characteristics of large-scale website software systemhigh concurrency, large flow: need to face high concurrent users, large traffic access. High Availability: system 7x24 Hour service
This series of articles focuses on learning and researching OpenStack Swift, including environment building, principles, architecture, monitoring, and performance.(1) OpenStack + Three-node Swift cluster + HAProxy + UCARP installation and configuration(2) principle, architecture and performance(3) Monitoring1. Architecture
, the most common is the business sub-Library, the different business databases deployed on different physical servers.(8) The architecture of level eight Web sites: using NoSQL and search engines to provide better support for scalable distributed features, the application server accesses a variety of data through a unified data access module, alleviating the hassle of application management of many data sources.(9) Level nine Web site
the same result, that is, the service is idempotent.
Service idempotent is sometimes natural, such as setting the user's gender as a male, regardless of how many times it is set, the result is the same, but for operations such as transfer transactions, the problem becomes complex and requires information such as transaction numbers.
For service invocation validation, only valid actions can continue.
Study Note 6: The core Principles and
statement resource file, you can set the HTTP header Cache-control and expired properties, slow the presence of the browser1.3.1.3 Enable compression: Compression can have a certain amount of pressure on the server and the browser1.3.1.4 CSS on the top of the page, JS placed at the bottom of the page1.3.1.5 reduce cookie transmission, consider using a separate domain name for static resources1.3.2 CDN Acceleration1.3.3 Reverse Proxy1.3.4 Application Server Performance optimization1.3.4.1 Distri
Opening and closing principle OCP (Open for extension,closed for modification). The core idea of open and close principle is that an object is opened to expansion and closed to modification.
In fact, the opening and closing principle means that changes to the class are made by adding code rather than altering the existing code. In other words, once the software developer writes out the code that can be run, it should not change it, but to ensure that it can continue to run, how to do this? Th
the compilation phase,
Complete the code implantation before compilation, and ensure that the embedded code can be compiled.
For more information about piab, see the piab series enterlib piab deep analysis by artech. Vi. Summary in this Chapter
This chapter describes in detail how to implement the specifications and principles of software design. The focus is separated by object-oriented and object-oriented programming, and the
statement
At last
ObjectiveOracle architecture, which describes the underlying implementation principles of Oracle RDBMS, is the basic theory of Oracle dba** tuning and debugging. An in-depth understanding of Oracle architecture allows us to go farther on Oracle's path. Understanding the architecture of
background. Furthermore, if customers can discover and BIND available services, the IT systems behind these services can provide greater flexibility.However, to achieve a strong and flexible architecture, a new method is required, which is a daunting task. Enterprise Architecture designers must be "Service-Oriented Architecture designers", not only understanding
MySQL performance tuning and Architecture Design-Chapter 1 Basic Principles of scalable design, mysql Tuning
Chapter 1 Basic Principles of scalable design Preface: With the rapid increase of information, the development of hardware equipment has gradually become unable to keep up with the application system's requirements for processing capabilities. How can we s
12th principles of extensible designPreface:With the rapid increase of information, the development of hardware equipment has been slowly unable to keep up with the application system to the processing capacity requirements. At this point, how can we solve the performance requirements of the system? There is only one way to improve the system's scalability by transforming the architecture of the system, by
Document directory
General Service-oriented principle --- from Chapter 8 of SOA concepts, technologies and Design
WCF programming-service-oriented overview
Architecture Principles
Practical principles
SOA new business language new system architecture-SOA principles
software quality.
Security as a requirement
Security is a much more complex process than you think. If engineers do not understand basic security principles, common security defects, and basic security design or security testing, they are absolutely impossible to write secure software. Security must be carefully grasped from the very beginning. Security design begins with the architecture, rather than some
background. Furthermore, if customers can discover and BIND available services, the IT systems behind these services can provide greater flexibility.However, to achieve a strong and flexible architecture, a new method is required, which is a daunting task. Enterprise Architecture designers must be "Service-Oriented Architecture designers", not only understanding
server, where the static resources of the site are cached, without the need to continue to forward the request to the application server, directly back to the user
Local cache. The hotspot data is cached locally on the application server, and the application can be accessed directly in local memory without having to access the data tier
Distributed cache. The data is stored in a dedicated distributed cache cluster, and the application server accesses the cached data over network traffic
The building code stipulates that the bedroom window should be at least 30 inches high, 20 inches long, so that in the event of a fire, the person can pass; The yellow seat on the bus is for the old and the sick, and the child is often said to be free, but it must intervene for safety. These are the principles of life that need to be obeyed. When it comes to architecture, does it need to follow some
Basic information of hadoop technology Insider: in-depth analysis of mapreduce architecture design and implementation principles by: Dong Xicheng series name: Big Data Technology series Publishing House: Machinery Industry Press ISBN: 9787111422266 Release Date: 318-5-8 published on: July 6,: 16 webpage:: Computer> Software and program design> distributed system design more about "hadoop technology Insider:
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.