dubbo Source Reading Cluster (Fault Handling Strategy)

Overview of dubbo cluster The entry point of dubbo cluster function is in ReferenceConfig.createProxy method and Protocol.refer method. In the ReferenceConfig.createProxy method, if a user specifies multiple provider URLs or registry url s, multiple Invokers are created, then the Invokers are encapsulated in Static Directory, and then the stati ...

Added by tjhilder on Tue, 14 May 2019 22:13:18 +0300

Common Anti-Reptilian Measures and Solutions

At the end of the last blog, it was said that the port number of the whole network proxy IP was confused by encryption, and this blog will tell you how to crack it! If you find it useful, you might as well make a recommendation.~   1. JS confusion of whole network proxy IP First entry Network-wide proxy IP Open the developer's tool and click ...

Added by fmpros on Tue, 14 May 2019 20:29:13 +0300

netty Learning Summary

netty Learning Summary (I) What is netty? netty is an asynchronous, event-driven network programming framework. Technical Foundation of netty netty is an encapsulation of Java NIO and Java thread pool technology What problems did netty solve Using Java IO for network programming, usually one user and one thread, can not deal with a large number ...

Added by MidOhioIT on Tue, 14 May 2019 19:19:56 +0300

Linux_Enterprise DNS Configuration

Authoritative Name Server Store and provide the actual data of an area (whole DNS domain or part of DNS domain). The types of authoritative name servers include: Master: Contains raw area data. Sometimes referred to as the "main" name server Slave: Backup server that transfers area data from Master server through ...

Added by djs1 on Tue, 14 May 2019 18:54:42 +0300

Android System Performance Optimization (52) - - Mobile Performance Monitoring Scheme Hertz

Mobile Performance Monitoring Scheme Hertz Performance issues are one of the main causes of App user churn. App's performance problems include crashes, network request errors or timeouts, slow response, list scrolling cartons, high traffic, power consumption, and so on. There are many reasons for the poor performance ...

Added by swizenfeld on Sun, 12 May 2019 14:54:53 +0300

Linux-ftp Virtual User Configuration

Cloud server ESC deploys vsftpd virtual users Description: Cloud server deployment and local server deployment need to open the specified port, but the cloud server needs to open the corresponding port in the security group rules to allow passage. Environmental description: The corresponding user corresponds to different passwords and differ ...

Added by agret on Sun, 12 May 2019 12:52:35 +0300

tfrecord processing for numpy

Original Link: https://blog.csdn.net/songbinxu/article/details/80136836 Tensorflow data read-write: Numpy stored as TFRecord file and read With the Tensorflow training model, there are three ways to read data: Each epoch/batch feeds in-memory Numpy data into a placeholder, only for small datasets, which can be quite memory ...

Added by unlishema.wolf on Sun, 12 May 2019 09:01:39 +0300