Exploring RocketMQ source code -- Series1: viewing transaction messages from the perspective of Producer

Introduction: explore RocketMQ source code - Series1: transaction messages from the perspective of Producer 1. Preface Apache RocketMQ, as a well-known open source messaging middleware, was born in Alibaba and donated to Apache in 2016. From RocketMQ 4.0 to the latest v4 7.1 Alibaba has won wide attention and praise both inside and outside th ...

Added by 00tank on Thu, 10 Feb 2022 09:35:33 +0200

Practical ways to write better JavaScript

catalogue   Use type script Type scripts enforce type safety Type descriptions make it possible to refactor larger applications Type scripts make team architecture communication easier Use modern features Synchronization and waiting Jean and conster Arrow = = function Propagation operator Template font (template string) Object const ...

Added by mastercjb on Thu, 10 Feb 2022 09:30:29 +0200

LVM logical volume management

1. Foundation 1. Basic knowledge LVM (Logical Volume Manager) logical volume management is a logical layer added between the disk partition and the file system to shield the lower disk partition layout for the file system, provide an abstract disk volume, and establish the file system on the disk volume. With LVM, the administrator can dyn ...

Added by jonsjava on Thu, 10 Feb 2022 09:26:48 +0200

Machine learning -- clustering algorithm DBSCAN26

Density based approach: DBSCAN Visual website: https://www.naftaliharris.com/blog/visualizing-dbscan-clustering/ DBSCAN = Density-Based Spatial Clustering of Applications with Noise This algorithm divides the region with high enough density into clusters, and can find clusters of any shape Several concepts 𝛆 neighborhood: the area w ...

Added by inosent1 on Thu, 10 Feb 2022 09:24:02 +0200

Five steps for Ajax requests

What is Ajax Ajax: asynchronous JavaScript and XML. AJAX is a technology used to create fast and dynamic web pages. Ajax can make web pages update asynchronously by exchanging a small amount of data with the server in the background. This means that a part of the web page can be updated without reloading the whole web page, while the tradition ...

Added by phpchamps on Thu, 10 Feb 2022 09:22:59 +0200

Article 18 Using std::unique_ptr manages resources with exclusive ownership

Using std::unique_ptr manages resources with exclusive ownership Whenever you need to use a smart pointer, std::unique_ptr is basically the most appropriate. You can think that by default, std::unique_ptr is equivalent to the original pointer, and for most operations (including dereference), they execute exactly the same instructions. This mea ...

Added by aviavi on Thu, 10 Feb 2022 09:20:31 +0200

Security framework shiro

1, What is shiro Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, password, and session management. With Shiro's easy to understand API, you can get any application quickly and easily, from the smallest mobile application to the largest network and enterprise application. Develop ...

Added by rokchik on Thu, 10 Feb 2022 09:09:58 +0200

High version mac phpize is the only feasible method in the whole network

Reprint address: https://l1905.github.io/php/2020/02/28/macos-pecl-xdebug-mongodb/ Error in installing php extension for macos higher version Published on February 28, 2020 | classified in php Install php extension xdebug, mongodb Analysis of error reporting in installing php extension on mac background Machine: mac os catalina Version: 10.15. ...

Added by hjunw on Thu, 10 Feb 2022 08:51:32 +0200

Detailed explanation and implementation of self encoder model (implemented by tensorflow2.x)

Learning latent variables using self encoder Because there are many redundancies in the high-dimensional input space, it can be compressed into some low-dimensional variables. The self encoder was first introduced by Geoffrey Hinton et al. In the 1980s. Similar to the technology used to reduce the input dimension in traditional machine lea ...

Added by tauchai83 on Thu, 10 Feb 2022 08:43:45 +0200

Day14 hashlib usage and file operation

summary hashilib digest encryption There are only two kinds of hash digest (encryption) algorithms: md5 and sha-x series Characteristics of hash encryption The digest generated by hash algorithm is irreversible. (the original text cannot be obtained through encrypted text)Only the same data can be summarized by the same algorithmNo matter h ...

Added by jen56456 on Thu, 10 Feb 2022 08:38:53 +0200