Deep understanding of redis -- bloom filter
1. What is the bloom filter2. Characteristics of Bloom filter3. Usage scenario of Bloom filter4. Principle of Bloom filter5. Advantages and disadvantages of Bloom filter6. Application of Bloom filter7. Summary 1. What is the bloom filterThe bloom filter of redis is actually a bit like the hyperlog we learned before In depth understanding of red ...
Added by forum on Mon, 14 Feb 2022 11:19:17 +0200
openGauss database backup and recovery guide
brief introduction
This instruction is applicable to openGauss database. Through this instruction, you can understand the two backup and recovery types and various backup and recovery schemes supported by openGauss database, and provide data reliability guarantee mechanism in the process of backup and recovery.
Content description
Data backu ...
Added by mband2000 on Mon, 14 Feb 2022 11:16:09 +0200
Write network programming in Python
Go back to the previous textThe first chapter only starts with data structures and some transmission examples. The second chapter will talk about how to use the network transmission protocol under the Python programming scenario.According to the above reply, we will talk about Tcp first in order, and then get to the main topic.Review lessons: W ...
Added by TheTitans on Mon, 14 Feb 2022 11:13:07 +0200
Python 3 calls and encapsulates and calls c program
Python 3 calls and encapsulates and calls c program
First, let's look at an example: Import c program implementation:
import time
from ctypes import *
def main():
num = int(input("Please enter an integer value:"))
result = 0
start_time = time.time()
result = cdll.LoadLibrary("./add.so")
result.my_add(num)
end_tim ...
Added by cainscripter on Mon, 14 Feb 2022 11:07:49 +0200
Annotations and custom annotations
Annotation related
Common JDk annotations include:
@Override is overridden to identify the method that overrides its parent class@SuppressWarnings suppress warnings, suppress warnings @ SuppressWarnings({"rawtypes", "unused", "degradation"})@Deprecated deprecated@PostConstruct@Functional interface (introd ...
Added by gkwhitworth on Mon, 14 Feb 2022 11:04:45 +0200
Intelligent deodorizer -- embedded development
1, Product creation
1. Functional requirements
APP end functiondescribeMode selectionPreservation mode and deodorization modeDeodorization timeYou can define the deodorization working time of the equipmentDeodorization gear adjustmentStrong, medium and weak grades are supportedLow power alarmLow battery report, APP end alarm
Device end funct ...
Added by mits on Mon, 14 Feb 2022 10:59:42 +0200
Detailed explanation of event cycle
catalogueEvent cycle mechanismBrowser event loop
What are the macro and micro tasks in the browsersetImmediate/setTimeoutMessageChannelthen method of promiseMutationObserverDetailed explanation of interview questionsEvent loop of Node
Detailed explanation of interview questionsEvent cycle mechanismFirst understand the task queueAll synchronizat ...
Added by fris on Mon, 14 Feb 2022 10:59:12 +0200
gorilla/mux framework (RK boot): add tracing Middleware
introduceThrough a complete example, based on gorilla/mux Add tracing middleware to microservices.What is tracing middleware?The Tracing middleware will record the Tracing data for each API request, which can be viewed by users using tools like Jaeger.We will use rk-boot To start gorilla/mux Microservices.rk-boot Is a framework that can start a ...
Added by graham on Mon, 14 Feb 2022 10:42:41 +0200
Index operation of ElasticSearch Java API
Background: ElasticSearch Java client connection ElasticSearch Based on this blog
ElasticSearch: brief introduction and deployment of ElasticSearch and Kibana using Docker This blog simply deploys ElasticSearch
Brief introduction to index concept
Generally speaking, the index has two parts of speech, name and verb.
Verb indexing, indexing a ...
Added by jscofield on Mon, 14 Feb 2022 10:30:57 +0200
Mysql database log management, backup and recovery
catalogue
I Log management of MySQL
(1) Log classification of MySQL
(2)MySQL log on
(3) enter the database to check whether the corresponding log is enabled
II MySQL full backup and recovery
(1) Importance of data backup
(2) Causes of data loss
(3) Classification of database backup
(4) Common backup methods
① Physical cold standby
② ...
Added by morpheus.100 on Mon, 14 Feb 2022 10:25:10 +0200