MongoDB 3.0.6 Start script, user management, import and export Libraries

Preface: Installation steps, please check This blog(https://blog.csdn.net/tingfengqianqu/article/details/101381150) 1. Import database 1) Modify configuration files Before importing data, you need to annotate the password authentication of mongodb.conf, and you cannot execute the mongodb service befor ...

Added by Jeyush on Mon, 30 Sep 2019 13:11:08 +0300

How to Deploy Application Management/Publishing System Spinnaker on Ali Cloud Container Service ACK

Spinnaker is an open source, multi-cloud, continuous delivery platform that helps you manage applications and deliver applications quickly. Spinnaker's two main functions are: Application management , Application delivery Applications, clusters, and server groups are very important concepts in Spinnaker. Load balancers and firewalls describe ...

Added by Miichael on Wed, 25 Sep 2019 12:04:30 +0300

Introduction to Spring Boot Vue Element: Practical Spring Boot+Mybatis+Redis+Swagger

This blog is originally created by the author. It is forbidden to reprint without permission. Please respect the originality! If you have any questions, please contact QQ509961766. (1) Modification of POM files Open the pom file First add spring boot dependencies to the top text <parent> & ...

Added by kevo1162 on Tue, 24 Sep 2019 09:44:56 +0300

CentOS Deployment Harbor Mirror Warehouse

About Harbor Harbor is a mirror warehouse service used to store and distribute Docker images. Compared to Docker Registry, Harbor enhances security, identity, management and is more suitable for enterprise use. Official website: https://goharbor.io/ Official open source: https://github.com/goharbor/harbor environmental information The Harbor ...

Added by potatoCode on Sun, 22 Sep 2019 04:41:36 +0300

Common Sorting Algorithms and Their Corresponding Time and Space Complexities

I organize Java advanced materials for free, covering Java, Redis, MongoDB, MySQL, Zookeeper, Spring Cloud, Dubbo, high concurrent and distributed tutorials, a total of 30G, need to collect. Portal: https://mp.weixin.qq.com/s/JzddfH-7yNudmkjT0IRL8Q   Sorting algorithms have evolved over a long period of time, resulting in many different ...

Added by pfchin on Fri, 20 Sep 2019 10:52:46 +0300

PHP Solves Oversell Problem with redis

Preface In commodity second killing activities, such as commodity inventory is only 100, but in the rush buying activities, there may be 200 people rushing to buy at the same time, so there is concurrence, 100 items of goods under order to complete the inventory of 0, and may continue to order successfully, there is oversold. To solve this prob ...

Added by selenin on Mon, 16 Sep 2019 09:11:38 +0300

Lifecycle of redis command execution

baiyan Introduce First, let's look at a very familiar redis command execution diagram:Think about it then, when we connect to the redis server, enter and execute a redis command, such as set key1 value1.How on earth was this command sent to the redis server, and how did the redis server parse, process, and return to its successful execution? Cl ...

Added by luuno on Sun, 15 Sep 2019 10:15:30 +0300

php implements redis message publishing subscription

Basic Introduction Pub/Sub function (means Publish, Subscribe) is the publishing and subscription function In event-based systems, Pub/Sub is a widely used communication model, which uses events as the basic communication mechanism to provide loosely coupled interaction modes required by large-scale systems: subscribers (such as clients) expre ...

Added by rheroux on Sun, 15 Sep 2019 05:02:13 +0300

Springboot&security Encrypted Login Process Based on Front-end and Back-end Separation of RSA Password

    Introduction to RSA Encryption RSA encryption is an asymmetric encryption. The decryption can be completed without directly transferring the key. This ensures the security of the information and avoids the risk of being cracked by transfer ...

Added by alkhatareykha on Fri, 13 Sep 2019 09:01:14 +0300

Implementation of Distributed Lock Based on Redis

Let's start by describing what problems would be caused to our cache in the case of high concurrency? 1. Cache Breakdown: In the case of high concurrency, when a hot key fails, a large number of requests will be made to access our data, such as when a commodity is killed in seconds. 2. Cache avalanche: refers to a time when a large number of ke ...

Added by belaraka on Mon, 09 Sep 2019 06:21:20 +0300