Erlang/OTP concurrent programming practices
Basic Information
Original Title: Erlang and OTP in action
Author: (US) Logan, M.) Merritt (E.) (Sweden) Carlsson (R.) [Translator's profile]
Translator: Lian Cheng
Press: People's post and telecommunications Press
ISBN: 9787115285591
Mounting time:
Published on: February 1, July 2012
Start: 16
Page number: 1
Version: 1-1
Category: computer more about Erlang/
OTP includes a set of libraries and implementations that can build large-scale, fault-tolerant, and distributed applications, including many powerful tools to implement multiple protocols such as H248,SNMP, the core concept is OTP behavior, and can be seen as an application framework with callback functions as parameters, similar to a Java-EE container. Behavior is responsible for solving the non functional
[Erlang crisis] (1.3) OTP application, erlangotp1. OTP Applications
Figuring out OTP applications is usually rather simple. They usually all share a directory structure that looks like:
It is usually very simple for developers to figure out OTP applications. They are usually in the same directory and the target struc
Notes SeriesErlang Environment and sequential programmingErlang Concurrent ProgrammingErlang Distributed programmingYawsErlang/otpDate Change Description2014-12-21 A Outline, 1Agenda0 ScopeAround the OTP design principles, record behavioral patterns, supervisory tree concepts, applications, releases and deployments, and a product-level caching solution in [3].1 OTP Design PrinciplesErlang Doc:
Label: Erlang ?? 1. OTP applications
Figuring out OTP applications is usually rather simple. They usually all share a directory structure that looks like:
? It is usually very simple to understand OTP applications. They are usually in the same directory and the target structure is as follows:
DOC /;Ebin/Src/Test/License.txtReadme. mdRebar. config Th
OTP cognitionDynamic password (otp,one-time Password), also known as a one-time password, is the use of cryptography technology in the client and the server through the sharing of a secret authentication technology, is a strong authentication technology, is to enhance the current static password authentication of a very convenient technical means, is an important two-factor authentication technology, Dynami
Http://blog.sina.com.cn/s/blog_3fe961ae0101k4p6.htmlBehavior patterns are very similar to interfaces in object-oriented languages, at least as I understand them. The OTP behavior pattern divides some recurring patterns into two parts, the generic part and the implementation-specific part of the application, which is similar to the process of abstracting out an interface in object-oriented programming. This article gives an example of the most common b
Label:Magnus Ahltorp's MySQL driver introduces Emysql's flaws: 1. Isolation is not good enough, 2. Unable to stretch The MYSQL-OTP uses 1 processes with 1 MySQL connections, which are well isolated. Recommended use. Mysql-otp-poolboy uses Poolboy + ERLANG-OTP to form a thread pool, using Poolboy to avoid the lack or excessive number of threads. Reference: Which E
The dynamic password (OTP, one-time password), also known as the one-time password, is an authentication technology that uses the Password Technology to share secrets between clients and servers, it is a strong authentication technology, a very convenient technical means to enhance the current static password authentication, and an important two-factor authentication technology, the dynamic password authentication technology consists of a client used
To prevent parameters from being too long on the command line, or to play some advanced configuration, you can use the Inets configuration file, which already has an example of various configuration files for the OTP project:[Email protected] ~]# CD otp_src_17.5/lib/inets/[[email protected] inets]# find.-type F-name *. config./test/Inets.config./src/inets_app/Inets.config[[email protected] inets]# find.-type F-name *. conf./examples/server_root/conf/8
Tags: des style blog HTTP Io OS AR for strong
Previously, the following paper was mentioned in the Erlang paper we have read in [Erlang 0126:On preserving term sharing in the Erlang Virtual MachineAddress: http://user.it.uu.se /~ Kostis/papers/erlang12_sharing.pdfAbstract: In this paper we describe our experiences and argue through examples why? Attening terms during copying is not a good ideaA language like Erlang. More importantly, we propose a sharing preserving copying mechanic for Erlang/
NetScaler OTP Application ScenarioNetScaler OTP (one time password) is a two-factor ID card that uses the username password + 6-bit token authentication code to complete the identity authentication. In the previous two-factor solution, Netscalergateway needed to be integrated with a third-party RADIUS server for two-factor authentication. For customers, the cost of additional two factor authentication is re
= Lists:concat (["Mod:",? MODULE, "line:",? Line, "]"),STR1 + + FEnd)).-define (WARN (log, F, D), Log4erl:warn (log,? Addlineinfo (F), D)).This error occurs if WARN is used continuously* Many environment variables can be defined in Erlang:Erl_max_ets_tables set the maximum number of ETS by default 1400Erl_max_ports Erlang Maximum number of ports default 1024*. start_phases in app files, options can be used either as a synchronous start-up between include applications or as a distribution to a s
]).
This function is very simple, just a line of logic, calling the system function:Proc_lib: spawn_link/3, Erlang Doc address: http://www.erlang.org/doc/man/proc_lib.html?spawn_link-3,e. g:
This function is similar to the spawn_link function in the Erlang module. It initializes a process to execute the specified function in the specified module. What are the differences between processes created using proc_lib? I am not going to talk about it here. For details, refer to the article [Erlang 200
],[1,2,3,4,5,6,7,8,9,10],[1,2,3,4,5,6,7,8,9,10],[1,2,3,4,5,6,7,8,9,10],[1,2,3,4,5,6,7,8,9,10]]ok6> erts_debug:size(L2).327> erts_debug:flat_size(L2).132
When starting shell, the shell PID is
Eshell V6.0 (abort with ^G)1> self().
Why does it trigger data expansion (expand, flattening? See the following code. When the shell is started, the variable that has been bound previously will be used as the spawn_link parameter to start the new shell.
erl6.2\lib\stdlib-2.2\srcstart_eval(Bs, RT
Reprinted: http://cryolite.iteye.com/blog/1663436
Erlang/OTP organizes a group of modules that complete specific functions, called applications. This is not a good name. It has different meanings from the conventional application. For example, in the development of Jee, the entire application system is called an application; in iOS, an independent game and a small tool are called an application.The Application of Erlang/
A brief description of OTP in Erlang and a brief description of ErlangOTP
OTP contains a set of libraries and implementation methods to build large-scale, fault-tolerant, and distributed applications. It contains many powerful tools to implement H248, SNMP, and other protocols, the core concept is OTP behavior. It can be seen as an application framework that uses
Kerl has only one goal: let's switch between different versions of the OTP. He is a pure bash project. Simple and practical work tool!The use of the Readme has been explained very clearly. It is recommended to follow the process once.1. DownloadInstall (a bash script that doesn't have to be installed at all)Curl-o https://raw.githubusercontent.com/kerl/kerl/master/kerlchmod a+x Kerl2. Working principleGet all the release package information from offic
Erlang OTP is a complete and reliable large-scale library, is a great success of the predecessors; now try the application inets Web server httpd, write a code call Inets service:1 -module(INETS_HTTPD). 2 -export([start/0]). 3 4 Start ()5 inets:start (),6 Inets:start (httpd, [{bind_ Address, {192,168,178,130}}, {ipfamily, inet}, {port, 18080}, {service_admin, "[Email protected]"}, {server_name, " Whyang.yang.net "}, {server_root,". "}, {Server_
1> application: Start (log4erl ).
Let's start with this command line. After you press enter, you can start the log4erl application. the component that can complete a specific set of functions in Erlang/OTP is called application ., application is one of the forms of Erlang code and function Organization ([Erlang 0015] Erlang OTP design principles ). application is designed to run one or more processes to com
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.