Exploring RocketMQ source code -- Series1: viewing transaction messages from the perspective of Producer
Introduction: explore RocketMQ source code - Series1: transaction messages from the perspective of Producer
1. Preface
Apache RocketMQ, as a well-known open source messaging middleware, was born in Alibaba and donated to Apache in 2016. From RocketMQ 4.0 to the latest v4 7.1 Alibaba has won wide attention and praise both inside and outside th ...
Added by 00tank on Thu, 10 Feb 2022 09:35:33 +0200
Practical ways to write better JavaScript
catalogue
Use type script
Type scripts enforce type safety
Type descriptions make it possible to refactor larger applications
Type scripts make team architecture communication easier
Use modern features
Synchronization and waiting
Jean and conster
Arrow = = function
Propagation operator
Template font (template string)
Object const ...
Added by mastercjb on Thu, 10 Feb 2022 09:30:29 +0200
LVM logical volume management
1. Foundation
1. Basic knowledge
LVM (Logical Volume Manager) logical volume management is a logical layer added between the disk partition and the file system to shield the lower disk partition layout for the file system, provide an abstract disk volume, and establish the file system on the disk volume. With LVM, the administrator can dyn ...
Added by jonsjava on Thu, 10 Feb 2022 09:26:48 +0200
Machine learning -- clustering algorithm DBSCAN26
Density based approach: DBSCAN Visual website: https://www.naftaliharris.com/blog/visualizing-dbscan-clustering/
DBSCAN = Density-Based Spatial Clustering of Applications with Noise This algorithm divides the region with high enough density into clusters, and can find clusters of any shape
Several concepts
𝛆 neighborhood: the area w ...
Added by inosent1 on Thu, 10 Feb 2022 09:24:02 +0200
Five steps for Ajax requests
What is Ajax
Ajax: asynchronous JavaScript and XML. AJAX is a technology used to create fast and dynamic web pages. Ajax can make web pages update asynchronously by exchanging a small amount of data with the server in the background. This means that a part of the web page can be updated without reloading the whole web page, while the tradition ...
Added by phpchamps on Thu, 10 Feb 2022 09:22:59 +0200
Article 18 Using std::unique_ptr manages resources with exclusive ownership
Using std::unique_ptr manages resources with exclusive ownership
Whenever you need to use a smart pointer, std::unique_ptr is basically the most appropriate. You can think that by default, std::unique_ptr is equivalent to the original pointer, and for most operations (including dereference), they execute exactly the same instructions. This mea ...
Added by aviavi on Thu, 10 Feb 2022 09:20:31 +0200
Security framework shiro
1, What is shiro
Apache Shiro is a powerful and easy-to-use Java security framework that performs authentication, authorization, password, and session management. With Shiro's easy to understand API, you can get any application quickly and easily, from the smallest mobile application to the largest network and enterprise application. Develop ...
Added by rokchik on Thu, 10 Feb 2022 09:09:58 +0200
High version mac phpize is the only feasible method in the whole network
Reprint address: https://l1905.github.io/php/2020/02/28/macos-pecl-xdebug-mongodb/
Error in installing php extension for macos higher version Published on February 28, 2020 | classified in php Install php extension xdebug, mongodb Analysis of error reporting in installing php extension on mac background Machine: mac os catalina Version: 10.15. ...
Added by hjunw on Thu, 10 Feb 2022 08:51:32 +0200
Detailed explanation and implementation of self encoder model (implemented by tensorflow2.x)
Learning latent variables using self encoder
Because there are many redundancies in the high-dimensional input space, it can be compressed into some low-dimensional variables. The self encoder was first introduced by Geoffrey Hinton et al. In the 1980s. Similar to the technology used to reduce the input dimension in traditional machine lea ...
Added by tauchai83 on Thu, 10 Feb 2022 08:43:45 +0200
Day14 hashlib usage and file operation
summary
hashilib digest encryption
There are only two kinds of hash digest (encryption) algorithms: md5 and sha-x series
Characteristics of hash encryption
The digest generated by hash algorithm is irreversible. (the original text cannot be obtained through encrypted text)Only the same data can be summarized by the same algorithmNo matter h ...
Added by jen56456 on Thu, 10 Feb 2022 08:38:53 +0200