K8S implementation of gray-scale publishing based on ingress nginx

Previously introduced Gray publishing with ambassador , how to use the implementation of ingre nginx. introduce Ingress nginx is a K8S ingress tool, which supports the configuration of Ingress Annotations to achieve gray-scale publishing and testing in different scenarios.   Nginx Annotations Four Canary rules are supported: nginx.in ...

Added by 1042 on Wed, 13 May 2020 09:58:48 +0300

fork function and vfork function

fork function In many applications, creating multiple processes is an effective method for task decomposition. For example, a network server process can create a new subprocess to process each request while listening for client requests. At the same time, the server process will continue to listen for more client connection requests. Decomposin ...

Added by vinny69 on Wed, 13 May 2020 07:56:54 +0300

C++ Implementation of DotCode Scavenging

Dynamsoft Barcode SDK v7.4 supports the DotCode type.I wrote a simple example in C++. DotCode Desktop Scavenger Two types of interfaces are provided in Dynamsoft SDK: One is a direct sweep interface, such as decodeFile, decodeBuffer. One is the interface StartFrameDecoding(), StopFrameDecoding(), and AppendFrame(), designed for video streaming ...

Added by lisa3711 on Tue, 12 May 2020 10:01:48 +0300

What about Java Concurrent Programming Actual 04 Deadlock?

Series of Java Concurrent Programming Articles Java Concurrent Programming Actual 01 Bug Source for Concurrent ProgrammingJava Concurrent Programming Practice 02 How Java Solves Visibility and Orderliness ProblemsJava Concurrent Programming Actual 03 Mutual Exclusion Lock Solves Atomic Problems premise In the final example of the third article, ...

Added by Thikho on Tue, 12 May 2020 06:08:58 +0300

Illustrate IO models and related technologies for Linux

Blocking IO Model (Blocking I/O) The Linux kernel initially provides read and write blocking operations. When a client connects, a corresponding file descriptor (0 standard input, 1 standard output, 2 standard error output) is generated in the file descriptor directory of the corresponding process (/proc/process number/fd), such as FD 8, FD 9 ...

Added by eulalyn09 on Sun, 10 May 2020 11:54:46 +0300

A wave of coquettish operations, no more fear of recursive stack overflow

1. Background In the daily development process, it is inevitable to use recursive operation sometimes. But we all know that in recursive functions, we will call ourselves. If the level is large enough to exceed the depth of the stack, it will lead to stack overflow. Therefore, many companies have an iron rule to avoid using recursive functions ...

Added by nickcwj on Sat, 09 May 2020 07:58:20 +0300

Python co programming practice

On Synergetic process   a collaboration is simply a more lightweight thread that is not managed by the operating system kernel and is completely controlled by the program (executed in user mode). A co program is interruptible within a subroutine, and then switches to other subroutines, returning when appropriate to continue execution. Ad ...

Added by Justin L H on Fri, 08 May 2020 20:28:18 +0300

Using Java to realize Joseph problem

Using Java to realize Joseph problem Introduction: Joseph problem (sometimes called Josephus replacement) is a problem in computer science and mathematics. In the algorithm of computer programming, the similar problem is also called Josephus ring. Also known as "the problem of losing handkerchief." example: len makes a circle an ...

Added by premracer on Thu, 07 May 2020 18:56:50 +0300

C ා basic knowledge series - 17 practical writing a small tool

0. Preface This is a summary of the C ා Foundation Series. Now we use the knowledge we learned before to make a small tool for us to use. If you have read the IO article, you should have an impression. At that time, I mentioned a scenario description. When we use the system, we often worry about finding the location of a file. Now let's try to ...

Added by bampot on Thu, 07 May 2020 08:46:29 +0300

Spring Security automatically kicks off the previous logged-in user, a configuration is complete!

After successful login, automatically kick off the previous login user. Songge first saw this feature inside the button. It was fun at that time. Once you've done your own development, you've met the same requirements. Just as the recent Spring Security series is being serialized, you can use Spring Security to talk about how this function work ...

Added by bl00dshooter on Thu, 07 May 2020 04:01:23 +0300