Geek Columns #
Geek Articles #
Here are some of our latest geek articles:
-
- 00 Introduction Most Problems Solved by Programmers Are Not Programming Problems.
- 01 10x Programmers How They Think
- 02 Starting With the End in Mind How to Make Your Efforts Worthwhile
- 03 Do D's Value Why Are They Still Not Satisfied With Your Work
- 04 What Should You Do First When Receiving a Required Task
- 05 Continuous Integration Integration Itself Is a Part of Coding
- 06 Lean Startup Product Manager What Should You Do if It's Unreliable
- 07 Solved a Lot of Technical Problems, Why Are You Still Stuck in the Pit
- 08 Why Is It Said That Deduction Should Be Done Before Doing Things
- 09 Can Your Work Be Measured by Numbers
- 10 Iteration 0 What Should You Prepare Before Starting Development
- 11 Learn Task Decomposition From Elon Musk
- 12. Is Testing Also the Job of a Programmer
- 13. First Write Test, Is It Test Driven Development
- 14 Master Programmer's Job Secrets
- 15 Work Together to Practice, Step by Step Guide You in Breaking Down Tasks
- 16 Why Is Your Test Not Good Enough
- 17 Can Programmers Also Cut Requirements
- 18 How to Deal With Too Many People Assigning You Tasks in Demand Management
- 19 How to Produce a Product With Minimal Cost
- 20 Why Is the World Different From Your Understanding
- 21 Your Code Is Written for Whom
- 22 Lightweight Communication Are You Always in Meetings
- 23 Visualization a More Intuitive Way of Communication
- 24 Quick Feedback Why Is Your Company Always Unable to Do Continuous Integration Well
- 25. What Should Be Done When Development Issues Keep Arising Note the Translation Is a Question, So There Should Be a Question Mark at the End
- 26 as a Programmer, You Should Also Listen to the Voice of the Users
- 27 Expose Problems as Soon as Possible. Why Are You Always the One Being Blamed
- 28 Structured Writing Documentation Is Also a Way of Learning
- 29 Laziness Should Be the Pride of All Programmers
- 30 What Should a Good Project Automation Look Like
- 31 How Do Programmers Learn About Operations and Maintenance Knowledge
- 32 Continuous Delivery Is Enough With Continuous Integration
- 33 How to Perform Acceptance Testing Well
- 34 How Did Your Code Become So Messy
- 35 Always Talking About Mvc Layered Architecture, but Do You Really Understand the Layers
- 36 Why Do People Always Think That 50,000 Rmb Can Start a Taobao Business
- 37 First Focus on Ddd Before Discussing Microservices, as It Is Just a Deployment Form
- 38 How to Quickly Enter a Working State After Joining a New Company
- 39 the Way to Deal With Legacy Systems
- 40 How Can We Maintain Competitiveness
- Key Points Comprehensive Recall of the Integrated Application of Theme Content
- Highlighting the Recap of Key Content on the Theme of Automation
- Highlight a Review of the Theme and Content of Communication Feedback
- Important Points 9 Phrases to Remember About Starting With the End in Mind
- Highlighting the Key Points What Aspects Do You Need to Focus on Regarding Task Breakdown
- Extra Meal. Do You Really Understand Refactoring
- Overall Review of Best Practices
- Overall Review, Re Read the Book
- Answering Questions and Solving Confusion How to Decompose a Technical Task That You Are Unfamiliar With
- Answer Questions and Clarify Doubts How to Promote New Concepts in Practical Work
- Answering Questions and Clearing Up Confusion How to Manage Your Superiors
- Q& a Clarifications Continuous Integration, Continuous Delivery, and Whats Next
- Faqs Continuous Integration, a Common Thread Running Through Many Practices
- Conclusion Working More Efficiently by Doing Less
-
- 00 Introductory Words Deciphering Interview Hidden Rules and Stand Out From the Ocean's Selection
- 01 Design a Resume That Attracts Interviewers
- 02 Understand Job Description ( Jd) Accurately Apply With a Resume
- 03 Grasp the Golden Time Slot for Submitting Resumes
- 04 Prepare Adequately for the Interview
- 05 Master the Key Points During an Interview
- 06 Capture Hr's Micro Expressions to Respond Strategically
- 07 Skillfully Promote Your 3 Key Skills
- 08 Understand Your Own Abilities and Determine the Job Seeking Direction Clearly
- 09 Judge the Company's Background to Make a Reasonable Choice
- 10 Understand the Industry Salary Transparently for Precise Positioning
- 11 Clear Goals and Channels for Aspirations
- 12 Work Handover Process and Benefit From Onboarding
-
- 00 Preface Upgrading to Dispersed Format Databases to Enhance Competitive Ability in the Workplace
- 01 Introduction What Is a Dispersed Format Database and Its Past Life and Incarnations
- 02 SQL vs No SQL a Clear Understanding of SQL Through the Conflicting SQL Paradigm
- 03 Data Sharding How to Store Massive Datasets
- 04 Data Replication How to Ensure High Availability of Data in Distributed Scenarios
- 05 Consistency and the Cap Model Why We Need Distributed Consistency
- 06 Practical Design Designing the Simplest Distributed Database
- 07 What Is a Storage Engine and Why We Need to Understand It
- 08 Distributed Indexing How to Quickly Locate Data in a Cluster
- 09 Log Structured Storage Why Choose It as a Foundational Storage Layer
- 10 Transaction Processing and Recovery How to Ensure Data Integrity After Database Collapses
- 11 Transaction Processing and Control How to Manage Concurrent Transactions
- 12 Engine Extension Reading Current Trends in Distributed Storage Engines
- 13 Overview What Issues Does a Distributed System Need to Solve
- 14 Error Diagnosis How to Ensure Stability in a Distributed System
- 15 Leader Election How to Safely Coordinate Operations in a Distributed System
- 16 Revisiting Consistency – Consistency Models Beyond Cap
- 17 Reliable Data Transmission How Antithesis Theory Helps Ensure Database Reliability
- 18 Distributed Transactions Besides Xa, What Are Some Other Atomic Commit Algorithms?
- 19 Distributed Transactions the Ultimate Showdown Between Spanner and Calvin
- 20 Common Algorithms Explained Clarifying Differences Among Algorithms Like Paxos and Raft
- 21 Knowledge Series How to Balance Performance and Scalability
- 22 Development and Limitations Exploring Traditional Databases in the Distributed Domain
- 23 Database Middleware the Transition From Traditional Databases to Distributed Databases
- 24 Current Situation Understanding the Latest Developments in Distributed Databases
- Addendum01 Concept Analysis Native Htap Graph and in Memory Databases
- Addendum02 Database Selection What Kind of Distributed Database Should We Use
-
- 00 Preface Do You Really Use Pre Commit Hooks Properly
- 01 How to Deal With Low Performance in Business Data Access
- 02 How to Choose Caching Patterns and Components Based on Business
- 03 Factors to Consider When Designing Cache Architecture
- 04 How to Handle Cache Invalidation, Penetration and Avalanche Problems
- 05 How to Deal With Cache Data Inconsistency and Race Conditions
- 06 How to Address Problems Triggered by Hot Keys and Big Keys
- 07 Why MC Is the Most Widely Used Caching Component
- 08 How Is the MC System Architecture Laid Out
- 09 How Does MC Use Multi Threading and State Machines to Handle Request Commands
- 10 How Does MC Determine the Key
- 11 How to Eliminate Cold Keys and Expired Keys in MC
- 12 Why MC Can Maintain High Performance in Long Term Read and Write Operations
- 13 How to Thoroughly Learn the MC Protocol and Optimize Client Access
- 14 How MC Responds to Common Issues in the Era of Big Data
- 15 How to Deeply Understand and Extend Twemproxy
- 16 How Does the Commonly Used Caching Component Redis Operate
- 17 How to Understand and Choose Core Data Types When Using Redis
- 18 What Are the Request and Response Patterns Available in the Redis Protocol
- 19 What Does Each Processing Module Do in Redis System Architecture
- 20 How Does Redis Handle File Events and Time Events
- 21 How Does Redis Proceed With Protocol Parsing and Processing After Reading Request Data
- 22 How to Recognize and Apply Redis Internal Data Structures
- 23 How Does Redis Eliminate Keys
- 24 How to Perform Data Recovery After Redis Collapse
- 25 How Does Redis Handle Time Consuming System Calls
- 26 How to Significantly Improve Redis Processing Performance
- 27 How Does Redis Perform Master Slave Replication
- 28 How to Build a High Performance and Easily Scalable Redis Cluster
- 29 What Is Still Missing When Redis Faces Billion Level Qps Access
- 30 Why Can’t We Design a Perfect Distributed Caching System for Massive Data
- 31 How to Design a Reliable Distributed Caching System to Satisfy the Needs of Large and Medium Sized Mobile Internet Systems
- 32 What Does a Typical Distributed Caching System Look Like
- 33 How to Design a Caching System for Instant Killing Systems
- 34 How to Design a Caching System for High Volume Computing Scenarios
- 35 How to Design a Caching System for Social Feed Scenarios
-
- 00 Preface Use Good Ab Testing to Master This Learning
- 01 Statistical Fundamentals Understanding Statistical Properties of System Control Indicators
- 02 Statistical Fundamentals Deep Understanding of Hypothesis Testing in Ab Tests
- 04 Determination of Indicators How to Choose From So Many Indicators
- 05 Selection of Experimental Units What Kind of Experimental Units Are Appropriate
- 06 Selection of Sample Size Is More Samples Always Better?
- 07 Analysis of Test Results Is Your Test Result Truly Reliable?
- 08 Case Series Building a Standard Ab Test Framework From Scratch
- 09 if Test Results Are Not Significant How to Improve
- 10 Common Mistakes and Solutions Multiple Verifications Issues and Learning Effectiveness
- 11 Common Mistakes and Solutions Independence of Control Groups in Simpson's Paradox and Experimental Comparison Groups
- 12 Situations Where Ab Testing Is Inappropriate
- 13 Integration of Winning Through Ab Testing Interview Essentials Part 1
- 14 Reflect on Three Points for Ab Testing Interview Essentials Part 2
- 15 Use Rshiny to Teach You How to Make a Sample Size Calculator
- Extra Trial Consciousness Change Strategy to Promote Business Growth
- Guide What Does a Scientifically Rigorous Ab Testing Process Look Like?
- Conclusion Practice Is the Only Criterion to Test Truth
-
- 00 Preface Word Serverless Is an Inevitable Choice in the Wave of Cost Reduction and Efficiency Increase
- 00 Thought Construction How to Improve Serverless Capabilities Under the New Track
- 01 Life Cycle the Basic Flow of How Functions Are Executed
- 02 Triggers How to Build Event Sources and Function Computation Throughput
- 03 Advanced Properties How to Handle Production Level Applications Skills You Need to Master
- 04 Cold Start How to Accelerate the First Invocation Process of a Function
- 05 Scalability How to Respond to Traffic Peaks and Valleys
- 06 Traffic Shifting Functions How Do They Execute Under Different Scenarios
- 07 Runtime How Do Functions Execute in Containers Under Different Programming Language Conditions
- 08 Runtime How Do Functions Execute in Containers Under Different Programming Language Conditions
- 09 Small Trials and Bold Moves I How to Use Function Invocation to Solve Business Problems
- 10 Small Trials and Bold Moves Ii How to Break Through the Speed Limit of Vpc Networks
- 11 Web ID E How to Make Functions Distant From the Complexity of Local Development Mode
- 12 Scheduling How to Coordinate the Execution of Multiple Tasks
- 13 Observable Metrics How to Construct a Multi Dimensional Monitoring System for Serverless
- 14 Observable Metrics How to Construct a Multi Dimensional Monitoring System for Serverless
- 15 Selection Different Stages of Data Storage How Should It Be Stored
- 16 Hands on Experience I How to Realize High Efficiency Business Development and Go Online
- 17 Hands on Experience Ii How to Implement a Stateful Service Under a Cloud Function Scenario
- 18 Practical Guide Experience From a Serverless Sandbox Veteran
- 19 Advanced Practical I How Powerful Exactly Is the Serverless Connector
- 20 Advanced Practical Ii How to Develop a Bot Skill Based on a Smart Speaker
- 21 Advanced Practical Iii How Traditional Services Migrate to the Serverless Platform
- 22 Private Cloud Era the Core Engine of Serverless Who Can Win
- 23 Advanced Practical Iv How to Progress From 0 to 1 in Upgrading an Open Source Engine
- 24 Advanced Practical v How to Transform From a Serverless Engine to a Serverless Platform
- End Word in Practice, Continually Innovate to Grasp the Essence of Things
-
- 000 Prologue Words a 360 Degree Assistant for Artificial Intelligence Information
- 001 Chat About the Temporal Validation Award at Kdd 2017
- 002 Fine Reading of the Best Research Paper at Kdd 2017
- 003 Fine Reading of the Best Application Data Science Paper at Kdd 2017
- 004 Fine Reading of One of the Best Long Papers at Emnlp 2017
- 005 Fine Reading of the Second Best Long Paper at Emnlp 2017
- 006 Fine Reading of the Best Short Paper at Emnlp 2017
- 007 Fine Reading of the Best Research Paper at Iccv 2017
- 008 Fine Reading of the Best Student Paper at Iccv 2017
- 009 How to Apply Deep Reinforcement Learning to Visual Question Answering Systems
- 010 Fine Reading of the Best Research Paper at Nips 2017 Part One How to Solve Non Convex Optimization Problems
- 011 Fine Reading of the Best Research Paper at Nips 2017 Part Two Ksd Test on How to Check the Difference Between Two Distributions
- 012 Fine Reading of the Best Research Paper at Nips 2017 Part Three How to Solve Imperfect Information Games
- 013 Wsdm 2018 Paper Review How Google Team Estimates Location Bias
- 014 Wsdm 2018 Paper Review How Jd.com Team Mines for Substitute and Complementary Product Information
- 015 Wsdm 2018 Paper Review How to Use Contextual Information in Deep Learning Models
- 016 the Web 2018 Paper Review How to Model the Aesthetics of Product Images
- 017 the Web 2018 Paper Review How to Improve the Classic Recommendation Algorithm Bpr
- 018 the Web 2018 Paper Review How to Extract Higher Order Relations From Text
- 019 Sigir 2018 Paper Review the Relationship Between Bias and Popularity
- 020 Sigir 2018 Paper Review How to Enhance the Generality of Ranking Models With Adversarial Learning
- 021 Sigir 2018 Paper Review How to Model Click Behaviors on Search Pages as a Sequence
- 022 Cvpr 2018 Paper Review How to Study Relationships Between Computer Vision Tasks
- 023 Cvpr 2018 Paper Review How to Perform 3 D Modeling of the Human Body on an Aggregate Level
- 024 Cvpr 2018 Paper Review How to Address the Problem of High Computational Complexity in Ranking Learning
- 025 Icml 2018 Paper Review Model Being Susceptible to Adversarial Samples Might Just Be a Misconception
- 026 Icml 2018 Paper Review a Discussion on the Fairness Issues of Machine Learning Algorithms
- 027 Icml 2018 Paper Review Optimization of Objective Functions Might Amplify Unfairness
- 028 ACL 2018 Paper Review How to Pose Good Questions in Question Answering Systems
- 029 ACL 2018 Paper Review What Is Presupposition Triggering in Dialogue and How to Detect It
- 030 ACL 2018 Paper Review What Is End to End Semantic Hashing
- 030 Repetition 7 Let's Read International Top Ai Conference Papers Together
- 032 Classic Search Core Algorithm Bm25 and Its Variants With Full Year Directory
- 033 Classic Search Core Algorithms Language Models and Their Variants
- 034 Machine Learning Ranking Algorithms Single Factor Method for Rank Learning
- 035 Machine Learning Ranking Algorithms Pairwise Method for Rank Learning
- 036 Machine Learning Ranking Algorithms Listwise Method for Rank Learning
- 037 Query Keyword Understanding Part One Classification
- 038 Query Keyword Understanding Part Two Analysis
- 039 Query Keyword Understanding Part Three Expansion
- 040 What Are the Fundamental Indicators for Search System Evaluation
- 041 What Are the Advanced Indicators for Search System Evaluation
- 042 How to Evaluate the Online Performance of Search Systems
- 043 Document Understanding Step One Document Classification
- 044 Key Steps in Document Understanding Document Clustering
- 045 Important Cases in Document Understanding Multimodal Document Modeling
- 046 Macro Perspective on the Development of Large Scale Search Frameworks Features and Trends
- 047 Overview of Multistage Ranking Systems
- 048 Overview of Search Indexing and Related Technologies
- 049 What Is the Core Idea of the Page Rank Algorithm
- 050 Classical Graph Algorithms Hits
- 031 Classic Search Core Algorithm Tf ID F and Its Variants
-
- 00 Guide How to Build High Quality Applications
- 00 Preface What Should Concerned Mobile Developers Do to Break Through
- 01 Crash Optimization Part1 About Crash Matters
- 02 Crash Optimization Part2 How to Analyze Application Crashes
- 03 Memory Optimization Part1 Discussing Memory Optimization in the Era of 4 Gb RAM
- 04 Memory Optimization Part2 Where to Start With Memory Optimization
- 05 Stutter Optimization Part1 Stutter Analysis Methods You Need to Master
- 06 Stutter Optimization Part2 How to Monitor Application Stutter
- Supplementary Article on Stutter Optimization Stutter Scene and Stutter Analysis
- 07 Launch Optimization Part1 Looking at Launch Speed Optimization Through the Launch Process
- 08 Launch Optimization Part2 Progressive Methods for Optimizing Launch Speed
- 09 Io Optimization Part1 Essential Io Optimization Knowledge for Developers
- 10 Io Optimization Part2 Different Io Usage Scenarios
- 11 Io Optimization Part3 How to Monitor Online Io Operations
- 12 Storage Optimization Part1 Common Data Storage Methods
- 13 Storage Optimization Part2 How to Optimize Data Storage
- 14 Storage Optimization Part3 Use and Optimization of the Sqlite Database
- 15 Network Optimization Part1 Essential Network Optimization Knowledge for Mobile Developers
- 16 Network Optimization Part2 How to Optimize Complex and Changing Mobile Networks
- 17 Network Optimization Part3 How to Monitor Networks With Large Data
- 18 Power Consumption Optimization Part1 Analyzing Power Consumption Through Progression of Power Optimization
- 19 Power Consumption Optimization Part2 Methods and Online Monitoring for Power Optimization
- 20 Ui Optimization Part1 Several Key Concepts of Ui Rendering
- 21 Ui Optimization Part2 How to Optimize Ui Rendering
- 22 Package Size Optimization Part1 How to Reduce the Size of Installation Packages
- 23 Package Size Optimization Part2 Progressive Practices in Resource Optimization
- 24 to Become an Android Expert First Address These Three Issues
- 25 How to Improve the R& D Efficiency of Organizations and Individuals
- 26 Compilation What You Need to Understand
- 27 Three Methods of Compilation Plug Ins Aspect J, Asm, Re Dex
- 28 Big Data and Ai How to Test Efficiently
- 29 From Monthly to Daily How to Speed Up Version Releases
- 30 Data Reporting Part1 How to Implement Highly Available Reporting Components
- 31 Data Reporting Part2 What Is a Big Data Platform
- 32 Online Troubleshooting How to Investigate and Track Issues
- 33 Becoming a Highly Skilled Mobile Developer
- 34 Let's Talk About the Progressively Evolved Architecture of Refactoring Excellence
- 35 Native Hook Technology Angel or Demon
- 36 the Current State and Application of Cross Platform Development
- 37 New Horizon in Mobile Development Halfway Through Three Years of Transformation From Mobile Development to Mobile Game Development
- 38 New Horizon in Mobile Development Android Audio and Video Development
- 39 New Horizon in Mobile Development the Trend of Intelligent Computing
- 40 Dynamic Implementation How to Choose the Right Solution for Yourself
- 41 Let's Talk Flutter the Continuously Evolving New Technologies in the Ui Layer
- 42 Android Advanced Development Course Learning Takeaways
- Android Jvm Ti Mechanics Detailed Explanation Including Benefits and Easter Eggs
- The Interview Guide for Android Engineers
- Native How to Get the Call Stack
- Column Hard Earned Learning Maybe You Still Need a Learning Syllabus
- Column Hard Earned Learning Maybe the Method Wasn't Right
- Programmer's Path to Cultivation Improving Design Skills
- Practice Sample to Run Asm Plugin Enhancement Practice
- Practice Sample to Run a Peers' Practice Notebook 1st Issue
- Practice Sample to Run a Peers' Practice Notebook 2nd Issue
- Practice Sample to Run a Peers' Practice Notebook 3rd Issue
- Practice Sample to Run Hot Issue Q& a 1st Phase
- Practice Sample to Run Hot Issue Q& a 2nd Phase
- Practice Sample to Run Hot Issue Q& a 3rd Phase
- Practice Sample to Run Hot Issue Q& a 4th Phase
- Conclusion Mobile Development of Today and Tomorrow
- Let's Talk About the Study Methods of Framework
-
- 01 First Lecture on Cloud Native Course
- 02 Basic Concepts of Containers
- 03 Kubernetes Core Concepts
- 04 Understanding Pod and Container Design Patterns
- 05 Application Deployment and Management Core Principles
- 06 Application Deployment and Management
- 07 Application Deployment and Management Job Daemon Set
- 08 Application Configuration Management
- 09 Application Storage and Persistence Data Volumes Core Knowledge
- 10 Application Storage and Persistent Data Volumes Snapshot and Extension Scheduling to Heaven
- 11 Observability Is Your Application Healthy Moriyuan
- 12 Observability Monitoring and Logs Moriyuan
- 13 Kubernetes Network Concepts and Strategy Control Collapse
- 14 Kubernetes Service Current
- 15 Starting From 0 to Create Cloud Native Applications Morida
- 16 in Depth Analysis of Linux Container Technology
-
- 00 Introductory Words Let's Truly Implement Ddd Ideas
- 01 Ddd Magic Weapon for Stopping Software Degeneration
- 02 Practice Ddd With the Example of E Commerce Payment Function
- 03 How Ddd Is Implemented in Database Design
- 04 How Domain Models Guide Software Design
- 05 the Confusion Between Aggregate Repository and Factory Idioms
- 06 Advantages of Breaking Microservice Design Dilemmas With Bounded Context
- 07 How to Initiate Event Storming Sessions in the Context of Online Food Ordering Scenarios
- 08 How Ddd Resolves Microservices Split Difficulties
- 09 How Ddd Is Implemented in Microservices Design and Realization
- 10 Technical Practices for Microservices Implementation
- 11 Key Architecture Clean Up for Resolving Technical Refactoring Dilemmas
- 12 How to Design a Technical Backend Strategy to Support Fast Payments
- 13 How to Realize a Technical Backend Design That Supports Fast Payments
- 14 How to Design a Technical Backend That Supports Ddd
- 15 How to Design a Technical Backend That Supports Microservices
- 16 Demo of Code Design Based on Ddd Including Ddd Technical Backend Design
- 17 Demo of Microservices Design Based on Ddd Including a Ddd Technical Backend That Supports Microservices
- 18 Development Based on Event Sourcing Design
-
- 00 Preface Mastering Ddd What Can You Do
- 01 Domain Driven Design Why Choose Ddd for Microservices Design
- 02 Domains, Subdomains, Core Domains, Generic Domains and Supporting Domains a Confused Separation
- 03 Bounded Contexts Defining Domain Boundaries as Levers
- 04 Entities and Value Objects System Design Fundamentals From the Perspective of Domain Models
- 05 Aggregates and Aggregate Roots How to Design Aggregates
- 06 Domain Events the Key to Decoupling Microservices
- 07 Ddd Layered Architecture Effectively Reducing Dependencies Between Layers
- 08 Microservice Architectural Models a Comparison and Analysis of Common Models
- 09 Middleware What Exactly to Share After Digital Transformation
- 10 Ddd Middleware and Microservices How They Collaborate
- 11 Ddd Practice How to Reconstruct Middleware Business Models With Ddd
- 12 Domain Modeling How to Use Event Storming to Construct Domain Models
- 13 Code Model on How to Use Ddd to Design Microservice Code Models
- 14 Code Model Below How to Ensure the Consistency of Domain Models and Code Models
- 15 Boundary Microservices the Roles of Various Boundaries in Architectural Advancement
- 16 Views How to Implement Cooperation of Services and Data in Various Layers of Microservices
- 17 From Backend to Frontend How to Design Microservices for Backend and Frontend
- 18 Knowledge Point Series Based on Ddd Microservice Design Examples
- 19 Summary One Microservice Design and Decomposition Principles to Adhere To
- 20 Summary Two 10 Key Questions of Distributed Architectural Design
- Answering 3 Classic Questions
- Conclusion the So Called Experts Are Those Who Have Crossed the Trench and the Ocean
-
- 00 Preface Why You Should Learn High Concurrency Distributed System Design
- 01 High Concurrency Distributed System What Are Its Common Design Methods
- 02 Architecture Layers Why We Must Do It This Way
- 03 System Design Goals I How to Improve System Performance
- 04 System Design Goals Ii How to Achieve High Availability in the System
- 05 System Design Goals Iii How to Make the System Easy to Expand
- 06 Interview on Site Phase I How Does the Interviewer Test You When Asked About Component Implementation Principles
- 07 Pooling Techniques How to Reduce the Performance Loss of Frequently Creating Database Connections
- 08 Database Optimization Solution I How to Do Master Slave Separation When Query Requests Increase
- 09 Database Optimization Solution Ii How to Realize Database Sharding When Data Writing Increases
- 10 How Does an ID Generator Ensure Global Uniqueness After Database Sharding
- 11 No SQL in High Concurrency Scenarios How Databases and No SQL Complement Each Other
- 12 Caching Database Has Become a Bottleneck How to Accelerate Queries of Dynamic Data
- 13 the Use of Cache Scenario I How to Choose the Caching Read Write Strategy
- 14 the Use of Cache Scenario Ii How to Achieve High Availability of Cache
- 15 the Use of Cache Scenario Iii What to Do When Cache Penetration Occurs
- 16 How to Speed Up Cdn Static Resources
- 17 How to Handle Thousands of Order Requests per Second in a Message Queue
- 18 Message Delivery How to Ensure That Messages Are Consumed Only Once
- 19 How to Reduce Message Delay in a Message Queuing System
- 20 Interview on Site Phase Ii What Exactly Is the Interviewer Trying to Understand About Your Project Experience
- 21 System Architecture Should a System That Handles 100,000 Requests per Day Be Service Oriented and Decoupled
- 22 Microservice Architecture How to Transform the System Architecture After Microservice
- 23 Rpc Framework Under 100,000 Qps How to Realize Microsecond Level Service Invocation
- 24 How Does a Distributed System With a Registry Discover Services
- 25 Distributed Trace How to Trace Slow Requests Across Dozens of Distributed Components
- 26 Load Balancing How to Increase the System's Horizontal Scaling Capability
- 27 How Should the API Gateway System Gateway Be Done
- 28 How to Deploy Distributed System Across Regions in Multiple Data Centers
- 29 Service Mesh How to Shield the Service Management Details of a Service Oriented System
- 30 How to Implement Eye Opening Client Side Monitoring in the System
- 31 Application Performance Management How to Monitor the User Experience
- 32 Pressure Testing How to Design a Full Path Pressure Testing Platform
- 33 Configuration Management With Millions of Configuration Items How to Manage It
- 34 Degradation Fuse How to Shield the Impact of Non Core System Failures
- 35 Traffic Control How Do We Manipulate Traffic in a High Concurrency System
- 36 Interview on Site Phase Iii How Should You Prepare for a Technical Interview
- 37 Accounting System Design I How to Handle Calculation of Massive Data
- 38 Accounting System Design Ii How to Design the Unread System Below 50,000 Qps
- 39 Information Stream Design I How to Do the Push Model in a General Information Stream System
- 40 Information Stream Design Ii How to Do the Pull Model in a General Information Stream System
- Extra Meal How Should Data Migration Be Done
- Midterm Test 10 High Concurrency Distributed System Design Project Self Tests
- User Story Endless Possibilities From the Heart
- Closing Words Learning Never Ends
-
- 01 Understand the Basic Concepts of Elastic Search
- 02 Understand the Elastic Stack Ecosystem and Scenario Solutions
- 03 Installation of Elastic Search and Kibana
- 04 Basic Usage of Introductory Queries and Aggregations
- 05 Detailed Explanation of Index Management
- 06 Detailed Explanation of Index Templates ( Index Template)
- 07 Detailed Explanation of Query DSL Compound Queries
- 08 Detailed Explanation of Query DSL Full Text Search
- 09 Detailed Explanation of Query DSL Term Queries
- 10 Detailed Explanation of Aggregation Bucket Aggregations
- 11 Detailed Explanation of Aggregation Metric Aggregations
- 12 Detailed Explanation of Aggregation Pipline Aggregations
- 13 the Principles of Understanding the Architecture of Es From Graphical Constructions
- 14 Supplementary Knowledge Points of Es Principles and Overall Structure
- 15 Detailed Explanation of Es Principles Indexing Document Process
- 16 Detailed Explanation of Es Principles Document Read Process
- 17 Optimization Detailed Explanation of Elastic Search Performance Optimization
- 18 Industrial Practice Tencent's Billion Level Elasticsearch Technical Practice
- 19 Resources Awesome Elasticsearch
- 20 Wrapper Query
- 21 Backup and Migration
-
- 00 Preface From Obscurity to Being a Global Dev Ops Phenomenon, What Magic Does It Hold
- 01 Definition of Dev Ops, What Issues Exactly Does Dev Ops Aim to Solve
- 02 the Value of Dev Ops, Digital Transformation Era, Dev Ops as an Essential Option
- 03 Dev Ops Implementation, Is It Tools First or Culture First
- 04 the Balance of Dev Ops, Have You Found the Implementation Roadmap for Dev Ops
- 05 Value Stream Analysis, Regarding Dev Ops Transformation, Where Should We Start
- 06 the Road to Transformation, Common Paths and Problems in Enterprise Implementation of Dev Ops
- 07 Business Agility, the Driving Force Behind Rapid Dev Ops Implementation
- 08 Lean Thinking Board, Lean Driven Agile Development Methods ( Above)
- 09 Lean Thinking Board, Lean Driven Agile Development Methods ( Below)
- 10 Configuration Management, the Often Overlooked Dev Ops Engineering Practice Foundation
- 11 Branching Strategies, the Key Element for Efficient Development Cooperation
- 12 Continuous Integration, Is Your Ci and My Ci the Same Thing
- 13 Automated Testing, the Achilles Heel of Dev Ops
- 14 Built in Quality Wheat Field and the Lessons From Amazon
- 15 Technical Debt, Those Negligible Latent Issues
- 16 Environment Management, Is All Code a Kind of Experience
- 17 Deployment Management, Low Risk Deployment Strategies
- 18 Mixed Project, the Vulnerability of the Software Domain
- 19 Directional Metrics, How to Establish a Complete Dev Ops Metrics System
- 20 Continuous Improvement Pdca Cycle and the Significance of Continuous Improvement
- 21 Open Source or Self Developed, Three Phases of Corporate Dev Ops Platform Construction
- 22 the Way of Product Design, Five Levels of Dev Ops Product Design
- 23 Continuous Delivery Platform, Ten Essential Features for the Modern Pipeline ( Above)
- 24 Continuous Delivery Platform, Ten Essential Features for the Modern Pipeline ( Below)
- 25 Let the Data Speak, How to Establish an Enterprise Level Data Metric Platform
- 26 Platform Product Development, How to Achieve a Thousand Scale Product in Three Months
- 27 the Giant's Shoulders, Those Open Source Tools You Cannot Ignore
- 28 Toward the Cloud, the Platform Thinking in the Era of Cloud Native Applications
- 29 Taking a Step Forward, Case Studies of Dev Ops Practical Transformation in Large Scale Enterprises ( Above)
- 30 Taking a Step Forward, Case Studies of Dev Ops Practical Transformation in Large Scale Enterprises ( Below)
- Mid Term Summary, Answers to 3 Typical Questions and How to Study Efficiently 1
- Mid Term Summary, Answers to 3 Typical Questions and How to Study Efficiently
- Final Summary, How to Choose a Suitable Workflow Tool in the Cloud Era
- Special Delivery One, the Essential Skills to Become a Dev Ops Engineer ( Above)
- Special Delivery Three, the Classic Resources You Must Understand to Learn Dev Ops
- Special Delivery Two, the Essential Skills to Become a Dev Ops Engineer ( Below)
- Special Delivery Five, Those Interesting Stories About Dev Ops Organizations and Culture
- Special Delivery Four, How the Jenkins Product Manager Designs the Product
- Closing Remarks, Continuous Improvement Is No Trivial Achievement
-
- 00 Introduction Why Every Senior Front End Developer Should Learn Flutter
- 01 Pre Study Chapter Starting From Zero Setting Up Flutter Development Environment
- 02 Pre Study Chapter Overview of Dart Language
- 03 Deep Understanding of the Historical Development of Cross Platform Solutions
- 04 What Are the Key Technical Differences Between Flutter and Other Solutions
- 05 Experiencing Flutter Code Using Standard Templates on Native Systems
- 06 Basic Syntax & Type Variables How Dart Represents Information
- 07 Functions, Classes & Operators How Dart Processes Information
- 08 Comprehensive Case Study Grasping Dart's Core Features
- 09 Widget the Foundation of Building Flutter Interfaces
- 10 What Exactly Is the State in a Widget
- 11 Speaking of Life Cycles, What Are We Talking About
- 12 Classic Controls How to Use Text, Images and Buttons in Flutter
- 13 Classic Controls Ii How Uitable View List View Are Used in Flutter
- 14 Classic Layout How to Define Child Controls Placement in Container
- 15 Composition and Custom Painting Which Method Should I Use to Customize Widgets
- 16 From Dark Mode on How to Customize Different Styles of App Themes
- 17 Dependency Management I How to Use Image Configuration and Fonts in Flutter
- 18 Dependency Management Ii How to Manage Third Party Component Libraries in Flutter
- 19 How Should User Interaction Events Be Handled
- 20 for Component Intercommunication Data Transfer You Only Need to Remember These Three Tricks
- 21 Route and Navigation Flutter Implements Page Switching Like This
- 22 How to Construct Stunning Animation Effects
- 23 Single Thread Model How to Ensure Ui Runs Smoothly
- 24 HTTP Networking and JSON Parsing
- 25 Local Storage and Database Usage and Optimization
- 26 How to Account for Platform Specific Implementations in Dart for Android I Os I
- 27 How to Account for Platform Specific Implementations in Dart for Android I Os Ii
- 28 How to Integrate Flutter Into Native Applications
- 29 Mixed Development Which Solution Should Be Used to Manage Navigation Stacks
- 30 Why We Need State Management and How to Do It
- 31 How to Realize Native Push Capabilities
- 32 Adapting Internationalization Beyond Multiple Languages, What Else Should We Pay Attention To
- 33 How to Adapt to Different Mobile Screen Resolutions
- 34 How to Understand Flutter's Compilation Mode
- 35 How Is Hot Reload Achieved
- 36 How to Optimize Development and Debugging Efficiency Through Toolchains
- 37 How to Detect and Optimize the Overall Performance of Flutter Apps
- 38 How to Improve Delivery Quality Through Automated Testing
- 39 How to Handle Exception Catching and Information Collection When Issues Arise Online
- 40 Balancing Online Quality of Flutter Apps We Need to Focus on These Three Metrics
- 41 Componentization and Platformization How to Organize a Reasonably Stable Flutter Project Structure
- 42 How to Construct an Efficient Flutter App Packaging and Distribution Environment
- 43 How to Build Your Own Flutter Hybrid Development Framework I
- 44 How to Build Your Own Flutter Hybrid Development Framework Ii
- Special Delivery Warmer Knowledge Renewal and Discussion of Thoughts With You on Columns
- End Sayings Do Not Treat Lightly
-
- 00 Preface Written for Beginners of Go Language Learning
- 00 Preface Correct Posture for Learning Columns
- 00 Opening Words Follow and Learn to Become a Go Language Expert
- 01 Workspace and Gopath
- 02 Command Source Files
- 03 Library Source Files
- 04 Things About the Executable Programs Part 1
- 05 Things About the Executable Programs Part 2
- 06 Things About the Executable Programs Part 3
- 07 Arrays and Slices
- 08 Containers in the Package Container
- 09 Operations and Contracts of Maps
- 10 Basic Operations of Channels
- 11 Advanced Tricks With Channels
- 12 Correct Posture for Using Functions
- 13 Usage Demystified of Structs and Their Methods
- 14 Rational Use of Interface Types
- 15 Limited Operations on Pointers
- 16 Go Statements and Their Execution Rules Part 1
- 17 Go Statements and Their Execution Rules Part 2
- 18 if Statements, for Loops, and Switch Statements
- 19 Error Handling Part 1
- 20 Error Handling Part 2
- 21 the Panic Function, the Recover Function and the Defer Statement Part 1
- 22 the Panic Function, the Recover Function and the Defer Statement Part 2
- 23 Basic Rules and Processes of Testing Part 1
- 24 Basic Rules and Processes of Testing Part 2
- 25 More Testing Techniques
- 26 Sync. Mutex and Sync. Rwmutex
- 27 Conditional Variables Sync. Cond Part 1
- 28 Conditional Variables Sync. Cond Part 2
- 29 Atomic Operations Part 1
- 30 Atomic Operations Part 2
- 31 Sync. Wait Group and Sync. Once
- 32 Context. Context Types
- 33 Temporary Object Pool Sync. Pool
- 34 Concurrent Safe Dictionary Sync. Map Part 1
- 35 Concurrent Safe Dictionary Sync. Map Part 2
- 36 Unicode and Character Encoding
- 37 Strings Package and String Operations
- 38 Bytes Package and Byte Slice Operations Part 1
- 39 Bytes Package and Byte Slice Operations Part 2
- 40 Interfaces and Tools in the Io Package Part 1
- 41 Interfaces and Tools in the Io Package Part 2
- 42 Data Types in the Bufio Package Part 1
- 43 Data Types in the Bufio Package Part 2
- 44 Using Apis in the Os Package Part 1
- 45 Using Apis in the Os Package Part 2
- 46 Access to Network Services
- 47 Network Services Based on the HTTP Protocol
- 48 Program Performance Analysis Basics Part 1
- 49 Program Performance Analysis Basics Part 2
- Epilogue Wishing You a Thornless Path Ahead
- New Year's Colorful Egg Complete Version Thought Questions and Answers
-
- 00 Preface Starting From 0 to Building an Enterprise Level Go Application
- 01 Iam System Overview What We Need to Implement in Go Project
- 02 Environment Preparation How to Install and Configure a Basic Go Development Environment
- 03 Project Deployment How to Quickly Deploy the Iam System
- 04 Norm Design How to Standardize Project Development Amidst Chaos
- 05 Norm Design How to Standardize Commit Message Styles That Are Odd and Hard to Read
- 06 Directory Structure Design How to Organize a Maintainable and Extensible Code Directory
- 07 Workflow Design How to Design a Reasonable Multi Developer Workflow
- 08 Research and Development Process Design How to Design a Go Project Development Process
- 09 Research and Development Process Design How to Manage the Lifecycle of an Application
- 10 Design Methodology How to Write Elegant Go Projects
- 11 Design Patterns Overview of Commonly Used Go Design Patterns
- 12 API Style How to Design Restful Apis
- 13 API Style Introduction to Rpc Apis
- 14 Project Management How to Write High Quality Makefile
- 15 Development Process Practice How the Iam Project Manages the Development Process
- 16 Code Review How to Conduct Static Code Analysis
- 17 API Documentation How to Generate Swagger API Documentation
- 18 Error Handling How to Design a Scientific Set of Error Codes
- 19 Error Handling How to Design Error Wrappers
- 20 Log Processing How to Design Logging Packages and Record Logs
- 21 Log Processing Detail Hand Hold Tutorial From 0 to Writing a Logging Package
- 22 Application Building Three Musketeers Pflag Viper Cobra Core Functionality Introduction
- 23 Application Building Practice How to Construct an Outstanding Enterprise Application Framework
- 24 Web Service Web Service Core Functionality and Implementation
- 25 Authentication Mechanism How Applications Perform Access Authentication
- 26 Iam Project How to Design and Implement Access Authentication Functionality
- 27 Permission Model How the Five Major Permission Models Grant Resource Permissions
- 28 Control Flow Designing Iamapiserver and Looking at the Construction of Web Services
- 29 Control Flow Implementing Core Functionality of Iamapiserver Service and Discussion
- 30 Ormcurd Orm Tool Gorm Package Introduction and Practice
- 31 Data Flow Designing Iamauthzserver and Looking at Data Flow Service Design
- 32 Data Processing How to Efficiently Process Data Generated by Applications
- 33 Sdk Design How to Design an Excellent Go Sdk
- 34 Sdk Design Iam Project Go Sdk Design and Implementation
- 35 Efficiency Tools How to Design and Implement a Command Line Client Tool
- 36 Code Testing How to Write Go Language Unit Tests and Performance Test Cases
- 38 Performance Analysis How to Analyze Performance of Go Code
- 37 Code Testing Other Types of Testing in Go and Iam Testing Introduction
- 39 Performance Analysis API Server Performance Testing and Optimizations in Practice
- 40 Software Deployment Practice Introduction to Deployment Solutions and High Availability Components
- 41 Software Deployment Practice Deployment in the Iam System Production Environment
- 42 Software Deployment Practice Iam System Security Reinforcement and Horizontal Scaling Practices
- 43 Technical Progress Virtualization Technology Progress
- 44 Technical Progress Software Architecture and Application Lifecycle Technical Progress
- 45 Cloud Native Architecture Design Based on Kubernetes
- 46 How to Make Docker Images
- 47 How to Write Kubernetes Resource Definition Files
- 48 Iam Containerized Deployment Practice
- 49 Service Orchestration Understanding the Basics of Helm Service Orchestration
- 50 Service Orchestration Deployment Practices Based on Helm
- 51 Ci Practices Based on Git Hub Actions
- Special Delivery Go Modules Dependency Package Management Overview
- Special Delivery Go Modules Practice
- Special Delivery Iam Troubleshooting Guide
- Special Delivery Design and Implementation of Distributed Task Systems
- Special Delivery a Core Makefile for Go Project Common Usage
- Special Delivery a Clear Go Coding Standard Ready to Apply
- Live Extra How to Advance From a Beginner to a Go Language Expert
- Conclusion How to Take Your Go Development Journey Further
-
- 00 Preface the Technical Power of High Concurrency Systems
- 01 Structural Hazards Your Database Tables May Become a Performance Bottleneck
- 02 Cache Consistency How to Deal With Data Update Cache Inconsistencies in Read Heavy Write Light Situations
- 03 Token How to Reduce the Traffic Pressure of User Identity Verification
- 04 Intra City Dual Active How to Realize Data Synchronization Between Computer Rooms
- 05 Common Knowledge of Raft How to Ensure Data Consistency Across Multiple Data Centers
- 06 Domain Decomposition How to Reasonably Decompose Systems
- 07 Strong Consistency Lock How to Solve the Contention Issues in High Concurrency Systems
- 08 System Isolation How to Deal With High Concurrency Traffic Surges
- 09 Distributed Transactions How Are 2 PC and Tcc Implemented in Multi Services
- 10 Sparse Index Why High Concurrency Writes Do Not Recommend Relational Databases
- 11 Blockchain Tracing How to Formulate a Distributed Blockchain Tracing System
- 12 Sharding Engines Elasticsearch How to Implement Large Data Searches
- 13 Real Time Statistical Tracing Practical Algorithms in Real Time Calculation Tracing
- 14 Skip List Index a New Start With Click House
- 15 Practical Solutions How to Implement Tracing With C
- 16 Local Cache What Pitfalls Might Local Caching Encounter When Used as a Service
- 17 Business Scripts Why Programmable Subscription Based Caching Services Are More Useful
- 18 Traffic Splitting How to Relieve Traffic Pressure Through Architectural Design
- 19 Traffic Dispatch DNS Full Site Acceleration and Machine Room Load Balancing
- 20 Data Engines Unified Caching Data Platforms
- 21 Business Caching Metadata Services How to Implement
- 23 Gateway Programming How to Reduce Development Costs Through User Gateways and Caching
- 24 Performance Pressure Testing Incomplete Pressure Testing Cuts Results in Half
- Q& a Forum Thinking Questions and Answers One
- Closing Words Authors Often Succeed, Executors Often Reach
- 22 Storage Costs How to Calculate the Implementation Costs in Log Centers
-
- 00 Preface in Depth Mastery Dubbo Principles and Implementation to Enhance Your Competitive Edge in the Workplace
- 01 Dubbo Source Code Environment Setup the Journey of a Thousand Miles Begins With a Single Step
- 02 Dubbo Configuration Mainline Understanding Half of Dubbo by Grasping URL
- 03 Dubbo Spi Analysis Interface Implementation Polar Turnaround Above
- 04 Dubbo Spi Analysis Interface Implementation Polar Turnaround Below
- 05 Massive Scheduled Tasks One Time Wheel to Set
- 06 Zoo Keeper and Curator Request You Stop Using Zk Client Above
- 07 Zoo Keeper and Curator Request You Stop Using Zk Client Below
- 08 Proxy Pattern and Common Implementations
- 09 Netty Primer Using It for Network Programming Is Good Above
- 10 Netty Primer Using It for Network Programming Is Good Below
- 11 Simple Rpc Framework Implementation Above
- 12 Simple Rpc Framework Implementation Below
- 13 Local Caching to Reduce Zoo Keeper Pressure a Common Technique
- 14 Retry Mechanism Is the Basic Guarantee of Network Operations
- 15 Zoo Keeper Registration Center Implementation Official Recommendation
- 16 Dubbo Serialize Layer Multiple Serialization Algorithms There Is Always One for You
- 17 Dubbo Remoting Layer Core Interface Analysis This Turns Out to Be a Design Compatible With All Nio Frameworks
- 18 Buffer Buffer Area We Don’t Produce Data We Only Transport Data
- 19 Transporter Layer Core Implementation Codec and Thread Model One Article to Sum Up Above
- 20 Transporter Layer Core Implementation Codec and Thread Model One Article to Sum Up Below
- 21 Exchange Layer Deep Analysis Fully Understanding Request Response Model Above
- 22 Exchange Layer Deep Analysis Fully Understanding Request Response Model Below
- 23 Core Interface Introduction Rpc Layer Skeleton Decapsulation
- 24 Starting From Protocol Overview of Service Exposure and Service Invocation Full Process Above
- 25 Starting From Protocol Overview of Service Exposure and Service Invocation Full Process Below
- 26 Add Meal Direct Hit Dubbo Heart With You to Explore the Mysteries of Invoker Above
- 27 Add Meal Direct Hit Dubbo Heart With You to Explore the Mysteries of Invoker Below
- 28 Simplifying Complex Problems Proxy Hides Many Underlying Details for You
- 29 Add Meal HTTP Protocol JSON Rpcdubbo Cross Language Is So Simple
- 30 Filter Interface Expansion Dubbo Framework's Common Techniques Guiding North
- 31 Add Meal in Depth Directory Implementation Exploring the Mysteries of Service Discovery Mechanism
- 32 Routing Mechanism How Requests Actually Flow That's Figured Out Above
- 33 Routing Mechanism How Requests Actually Flow That's Figured Out Below
- 34 Add Meal Initial Probe Into Dubbo Dynamic Configuration
- 35 Load Balancing Fair and Proper Use of Load Balancing Strategies Available Here Above
- 36 Load Balancing Fair and Proper Use of Load Balancing Strategies Available Here Below
- 37 Cluster Fault Tolerance One Good Man Three Groups Above
- 38 Cluster Fault Tolerance One Good Man Three Groups Below
- 39 Add Meal Multiple Return Values No Need to Fear Merger Combiners to the Rescue
- 40 Add Meal Simulate Remote Invocation Mock Mechanism to Help You
- 41 Add Meal One Key Through Train Service Deployment Full Process
- 42 Add Meal Service Invocation Process Full Analysis
- 43 Service Downgrading Design New Versions New Solutions
- 44 Metadata Solution in Depth Analysis How to Avoid Registration Center Data Bloat
- 45 Add Meal Deep Into Service Downgrading in the Service Publish Subscribe Above
- 46 Add Meal Deep Into Service Downgrading in the Service Publish Subscribe Below
- 47 Configuration Center Design and Implementation Centralized Configuration and I Want Localization Too Above
- 48 Configuration Center Design and Implementation Centralized Configuration and I Want Localization Too Below
- 49 End Remark Study Diligently to Narrow the Gap
-
- 00 Guide Building Kafka Projects and Source Code Reading Environment Warmup in Scala Language
- 00 Opening Words Gradual Progression Through Source Code Reading Becomes a Necessary Step on the Professional Ladder
- 00 Heavy Meal Quick Start Into Scala Language
- 01 How Is the Object That Saves Log Segment Messages Implemented
- 02 Logs How Exactly Are Log Segments Loaded
- 03 Logs a Thorough Understanding of Common Operations of Log Objects
- 04 on Indexes the Application of Improved Binary Search Algorithms in Kafka Indexes
- 05 on Indexes the Differences Between Offset Index and Timestamp Index
- 06 Request Channels How Kafka Request Queues Are Implemented
- 07 on Socket Server How Kafka Applies Nio to Implement Network Communication
- 08 in Socket Server Requests Also Need to Distinguish Priority Levels
- 09 Under Socket Server Full Process Source Code Analysis of Request Handling
- 10 Kafka Apis the Most Important Source Code Entry Point of Kafka
- 11 Controller Metadata What Kind of Data Does the Controller Store and Its Various States
- 12 Controller Channel Manager How the Controller Manages Request Sending
- 13 Controller Event Manager How the Controller Handles Events After Transforming Into a Single Thread
- 14 Controller Election How It's Implemented
- 15 Understanding the Role of Controller in a Kafka Cluster
- 16 Topic Deletion Manager How Topics Are Deleted
- 17 Replica State Machine Uncovering the Principles Behind Replica State Machines
- 18 Partition State Machine How Partition State Transitions Are Implemented
- 19 Timing Wheel Exploring the Efficient Timing Wheel Algorithm Behind Kafka's Timer
- 20 Delayed Operation How Is a Broker's Delayed Processing of Requests Implemented
- 21 Abstract Fetcher Thread How Message Fetching Is Divided Into Several Steps
- 22 Replica Fetcher Thread How the Follower Pulls Messages From Leader
- 23 Replica Manager Understanding the Definitions and Core Fields of the Replica Management Class
- 24 Replica Manager How the Replica Manager Reads and Writes Copies
- 25 Replica Manager How the Replica Manager Manages Replicas
- 26 Metadata Cache Broker How Is the Metadata Cache Updated Asynchronously
- 27 Consumer Group Metadata What Metadata Exists in a Consumer Group
- 28 Consumer Group Metadata How Kafka Manages These Metadata
- 29 Group Metadata Manager What Is the Group Metadata Manager
- 30 Group Metadata Manager Is the Topic Migration Only About Moving Offsets
- 31 Group Metadata Manager Querying Offsets Without Reading the Offset Topic
- 32 Group Coordinator How the Coordinator Handles Member Joining During Rebalance
- 33 Group Coordinator How to Perform Group Synchronization During Rebalance
- Special Release One Classic Kafka Learning Materials Available
- Special Release Three How I Spend a Typical Day
- Special Release Two an Article to Help You Understand the Entire Process of Participating in an Open Source Community
- Special Release Five Kafka Community's Key Functionality Removing Zoo Keeper Dependency
- Special Release Four Detailed Explanations of 20 Classic Kafka Interview Questions
- Concluding Words We Have Just Started on the Road of Source Code Learning
-
- 00 Preface Welcoming Challenges and Embracing the Cloud Native Era
- 00 Pre Lesson Preparation Practicing Is the Best Way to Learn
- 01 Introduction to Containers Beginning Is the Hardest Part
- 02 Isolated Processes Let's Look at the Nature of Containers
- 03 Containerized Apps Once You Know These, You Are a Docker Expert
- 04 Creating Container Images How to Write an Effective Dockerfile
- 05 Image Repositories How to Use Docker Hub Well
- 06 Breaking Through the Container Wall How to Interact With the Outside World
- 07 Practical Exercises With Docker Play and Learn
- 08 Video Tutorial for Beginners Summary of Operations
- 09 Approaching Cloud Native How to Set Up a Neat Kubernetes Environment Locally
- 10 Automated Operations Exploring the Secrets of Kubernetes Work Mechanisms
- 11 Yaml the Universal Language in the World of Kubernetes
- 12 Pod How to Understand This Core Concept in Kubernetes
- 13 Jobs and Cron Jobs Why Not Use Pods Directly for Business Processes
- 14 Config Map and Secret How to Configure and Customize My Application
- 15 Practical Exercises With Kubernetes 1
- 16 Video Tutorial for Beginners Summary of Operations
- 17 a More Realistic Cloud Native Practice Building a Multi Node Kubernetes Cluster
- 18 Deployment Make Your Applications Never Go Down
- 19 Daemonset the Loyal and Reliable Watchdog
- 20 Service the Corresponding Route in Microservice Architecture
- 21 Ingress Managing Ingress and Egress Traffic of the Cluster
- 22 Practical Exercises With Kubernetes 2
- 23 Video Tutorial for Intermediate Level Summary of Operations
- 24 Persistent Volume How to Solve the Problem of Data Persistence
- 25 Persistent Volume and Nfs How to Use Network Shared Storage
- 26 Stateful Set How to Manage Stateful Applications
- 27 Rolling Updates How to Perform Smooth Application Upgrades and Downgrades
- 28 Application Protection How to Keep Pods Running Healthily
- 29 Cluster Management How to Separate System Resources With Namespaces
- 30 System Monitoring How to Use Metrics Server and Prometheus
- 31 Network Communication Cni What's the Deal and How It Works
- 32 Practical Exercises With Kubernetes 3
- 33 Video Tutorial for Advanced Level Summary of Operations
- Bonus Docker Compose Container Orchestration Tool for Single Host Environments
- Bonus Discussion on Kong Ingress Controller
- Epilogue Is It an End or a New Beginning
-
- 00 Introductory Words Entering the World of Spark in Three Steps
- 01 Spark Begins With Big Data's Hello World
- 02 Rdd and Programming Model What Is Lazy Evaluation
- 03 Common Rdd Operators Data Transformations Within Rdds
- 04 Execution Models and Distributed Deployment How Distributed Computing Works
- 05 Scheduling Systems How to Master the Essence of Distributed Computing
- 06 Shuffle Management Why Shuffle Is a Performance Bottleneck
- 07 Common Rdd Operators Ii How Spark Achieves Data Aggregation
- 08 Memory Management How Spark Uses Memory
- 09 Common Rdd Operators Iii Data Checkpointing and Repartitioning Persistency
- 10 Broadcast Variables Accumulators, Shared Variables for What Purpose
- 11 Storage Systems Where Is the Data Actually Stored
- 12 Fundamental Configuration Explained Which Parameters Affect Application Stability
- 13 Spark SQL Starting With Analysis of Minor Vehicle License Plates
- 14 Foreground and Background the Origins of Data Frame and Spark SQL
- 15 Data Sources and Format Where Data Frames Come From
- 16 Data Transformation How to Perform Data Processing on Data Frames
- 17 Data Association Different Join Types and Implementation Mechanisms to Choose
- 18 Data Association Optimization What Join Strategies Are There and How Should Developers Choose
- 19 Configuration Item Explanation Which Parameters Affect the Performance of Application Execution
- 20 Hive Spark's Strong Alliance, the Unparalleled Choice for Distributed Data Warehouses
- 21 Spark Ui How to Efficiently Locate Performance Issues
- 22 Spark Ui How to Efficiently Locate Performance Issues (Continued)
- 23 Spark Mllib Starting With Housing Price Prediction
- 24 Feature Engineering I What Common Feature Processing Functions Are There
- 25 Feature Engineering Ii What Common Feature Processing Functions Are There (Continued)
- 26 Model Training I Detailed Explanation of Decision Tree Algorithms
- 27 Model Training Ii Detailed Explanation of Regression, Classification, and Clustering Algorithms
- 28 Model Training Iii Detailed Explanation of Collaborative Filtering and Frequent Itemset Algorithms
- 29 Spark Mllib Pipeline Efficient Development of Machine Learning Applications
- 30 Structured Streaming Starting With the Streaming Word Count
- 31 the New Generation of Stream Processing Frameworks Which Is Stronger, Batch Mode or Continuous Mode?
- 32 Window Operations and Watermark What Outstanding Mechanisms Does the Streaming Engine Provide?
- 33 Data Association in Stream Computing Stream to Stream and Stream to Batch
- 34 Spark and Kafka in Stream Computing the Panacea
- Final Words Entering the Time Rift to Continue Learning
- User Story Little Prince Maintaining a Beginner's Mind and Not Becoming a Frog at the Bottom of the Well
-
- 00 Preface Business Code Will There Be So Many Pits
- 01 by Using Concurrency Libraries Is Thread Safety Guaranteed
- 02 Code Locking Don't Let Lock Issues Become a Worry
- 03 Thread Pool the Most Common Yet Error Prone Component in Business Code
- 04 Connection Pool Don't Let the Connection Pool Backfire
- 05 HTTP Invocation Did You Consider Timeout Retry and Concurrency
- 06 20% of Business Code's Spring Declarative Transactions May Not Be Handled Correctly
- 07 Database Indexes an Index Is Not a Panacea
- 08 Equality Issues How to Ensure You Are You in the Program
- 09 Numeric Calculation Precision Loss and Overflow Issues
- 10 Collection Types the Pitfall Ridden List Operation
- 11 Null Handling the Unclear Null and Frustrating Null Pointer Exception
- 12 Exception Handling Don't Let Yourself Become Confused When Problems Arise
- 13 Logging Logging Is Not as Simple as You Think
- 14 File Io Implement Effective and Correct File Read Write Is Not Easy
- 15 Serialization Once Gone and Back Are You Still the Original You
- 16 Use Java 8's Date and Time Classes to Avoid Some Old Pitfalls
- 17 Don't Assume That Automatic Garbage Collection Won't Cause Oom
- 18 What Pitfalls Arise When Reflection Annotations and Generics Meet Oop
- 19 Spring Framework Io C and Aop Are the Core of Extension
- 20 Spring Framework the Framework Does a Lot of Work but Also Brings Complexity
- 21 Code Duplication the Three Ultimate Moves to Tackle Code Repetition
- 22 Interface Design the Language of System Interaction Must Be Unified
- 23 Cache Design a Cache Can Either Add Luster or Bring Disaster
- 24 Business Code Completion Doesn't Mean Production Is Ready
- 25 Asynchronous Processing Useful but Very Easy to Misuse
- 26 Data Storage No SQL vs Rdbms How to Complement Shortcomings With Advantages
- 27 Data Source Never Trust Anything From Any Client
- 28 Security Always Consider Anti Scraping Limitation Measures When Dealing With Money
- 29 Data and Code Data Is Data and Code Is Code
- 30 How to Correctly Store and Transmit Sensitive Data
- 31 Plus Lesson 1 Take You Through Some Important Concepts of Java 8 Course Part One
- 32 Plus Lesson 2 Take You Through Some Important Concepts of Java 8 Course Part Two
- 33 Plus Lesson 3 Locating Application Issues Debugging Paths Are Very Important
- 34 Plus Lesson 4 Analyzing Java Issues Must Use These Tools Part One
- 35 Plus Lesson 5 Analyzing Java Issues Must Use These Tools Part Two
- 36 Plus Lesson 6 How I Learned Tech and English at Work Over 15 Years
- 37 Plus Lesson 7 a Programmer's Growth Plan for 28
- 38 Plus Lesson 8 Some Pitfalls When Java Programs Migrate From Vm to Kubernetes
- Answer Compilation Code Compilation Thoughts Collection One
- Answer Compilation Code Compilation Thoughts Collection Three
- Answer Compilation Code Compilation Thoughts Collection Two
- Answer Compilation Plus Meal Compilation Thoughts Answer Collection
- Answer Compilation Security Compilation Thoughts Answer Collection
- Answer Compilation Design Compilation Thoughts Answer Collection
- Conclusion How to Write Code to Avoid Pits as Much as Possible
-
- 00 Preface the Reasons Why You Need to Learn and Practice Programming
- 01 How to Establish Performance Tuning Standards
- 02 How to Formulate Performance Tuning Strategies
- 03 String Performance Optimization It's Easy to Store Tens of Gb Data in Memory With Only a Hundred Mb Capacity
- 04 Use Regular Expressions With Caution
- 05 Array List or Linked List Using the Wrong One Could Mean Performance a Thousand Times Worse
- 06 How Stream Can Improve the Efficiency of Traversing Collections
- 07 Dive Into the Design and Optimization of Hash Map
- 08 Network Communication Optimization How the Io Model Resolves Bottlenecks Under High Concurrency
- 09 Network Communication Optimization Serialization Avoid Using Java's Serialization
- 10 Network Communication Optimization How to Optimize Rpc Network Communication Protocol
- 11 Q& a Session Deep Dive Into the Optimization Principles of Nio
- 12 Multithreading Lock Optimization Dive Deeper Into the Optimization Methods of the Synchronized Synchronization Lock
- 13 Multithreading Lock Optimization Dive Deeper Into the Optimization Methods of Lock Synchronization Locks
- 14 Multithreading Lock Optimization Using Optimistic Locks to Optimize Concurrent Operations
- 15 Multithreading Adjustable Operations That Lead to Context Switches
- 16 Multithreading Adjustable How to Optimize Context Switching in Multithreading
- 17 Use of Concurrent Containers to Distinguish the Most Optimal Containers in Different Scenarios
- 18 How to Set Thread Pool Size
- 19 How to Use Coroutines to Optimize Multithreaded Businesses
- 20 to Know Jvm Optimization, Start by Understanding Jvm's Memory Model
- 21 Dive Into Jvm's Just in Time Compiler Jit Optimization of Java Compilation
- 22 How to Optimize Garbage Collection Mechanism
- 23 How to Optimize Jvm Memory Allocation
- 24 Continued Memory Increase How Should I Troubleshoot the Issue
- 25 Q& a Session Module Four Hot Questions Answered
- 26 Singleton Pattern How to Create a Single Object to Optimize System Performance
- 27 Prototype Pattern and Flyweight Pattern Use These Tools to Elevate System Performance
- 28 How to Use Design Patterns to Optimize Concurrent Programming
- 29 Producer Consumer Pattern E Commerce Inventory Design Optimization
- 30 Decorator Pattern How to Optimize Sophisticated Product Pricing Strategies in E Commerce Systems
- 31 Q& a Session Module Five Critical Thinking Problems Collection
- 32 My SQL Tuning How to Write High Performance SQL Statements
- 33 My SQL Tuning Transaction Optimization in High Concurrency Scenarios
- 34 My SQL Tuning Index the Inefficacy and Optimization of Indexes
- 35 Remember an Online SQL Deadlock Incident How to Avoid Deadlocks
- 36 When to Consider Table Splitting and Database Sharding
- 37 E Commerce System Table Design Optimization Case Analysis
- 38 Database Parameter Setting Optimization the Difference Between the Slightest Negligence and a Thousand Miles
- 39 Q& a Session My SQL Inno Db Knowledge Points Lecture
- 41 How to Design a More Optimized Distributed Lock
- 42 E Commerce System Distributed Transaction Adjustment
- 43 How to Use Cache to Optimize System Performance
- 44 Remember a Double Eleven Shopping Event Performance Bottleneck Adjustment
- Extra Meal What Is Data's Strong and Weak Consistency
- Extra Meal Recommend Several Commonly Used Performance Testing Tools
- Ending Words Brave the Wind and the Rain, Advance Despite Difficulties
- Q& a Session Module Three Hot Questions Answered
-
- 00 Build Your Java and Knowledge Network From Points to Planes
- 01 Why Is There Only One Way to Implement Threads
- 02 How to Properly Stop a Thread and Why the Volatile Flag Stop Method Is Wrong
- 03 How Threads Transition Between Six States
- 04 Usage Notes for Wait, Notify, Notify All Methods
- 05 How Many Ways to Implement Producer Consumer Patterns
- 06 What Are the Three Types of Thread Safety Issues
- 07 Which Scenarios Require Extra Attention to Thread Safety Issues
- 08 Why Multithreading Can Lead to Performance Problems
- 09 Where Is It Better to Use Thread Pools Over Manually Creating Threads
- 10 Definitions of Each Parameter in the Thread Pool
- 11 What Are the Four Rejection Policies of Thread Pools
- 12 What Are the Six Types of Common Thread Pools What Is Java8's Fork Join Pool
- 13 What Blocking Queues Are Commonly Used in Thread Pools
- 14 Why You Shouldn't Automatically Create Thread Pools
- 15 How Many Cpus Core Number and Thread Count Are Appropriate
- 16 How to Customize Your Own Thread Pool Based on Actual Needs
- 17 How to Properly Close Thread Pool Shutdown vs Shutdown Now Differences
- 18 Principles of Thread Reuse in Thread Pool Implementation
- 19 Do You Know the Different Types of Locks and Their Characteristics
- 20 What Is the Nature of Pessimistic Locks and Optimistic Locks
- 21 How to See the Monitor Lock Behind Synchronized
- 22 How to Choose Between Synchronized and Lock Advantages and Disadvantages
- 23 What Are the Common Methods of Lock and Their Uses
- 24 Why Choose Non Fair Locks Over Fair Locks
- 25 Rules for Acquiring Locks With Read Write Lock
- 26 Should Read Locks Be Allowed to Queue What Is the Promotion and Demotion of Read Write Locks
- 27 What Is the Spin Lock What Are the Benefits and Consequences of Self Spinning
- 28 What Optimizations Has the Jvm Made for Locks
- 29 Why Is Hash Map Not Thread Safe
- 30 What Are the Differences in Concurrent Hash Map Between Java7 and 8
- 31 Why Convert to Red Black Trees When More Than 8 Items in a Map Bucket
- 32 Differences Between Thread Safe Concurrent Hash Map and Hashtable
- 33 What Are the Features of Copy on Write Array List
- 34 What Is a Blocking Queue
- 35 Differences of Blocking Queue Common Methods Add, Offer, Put, Etc
- 36 What Are the Common Types of Blocking Queues
- 37 Principles of Concurrency Safety for Blocking and Non Blocking Queues
- 38 How to Choose the Right Blocking Queue for Yourself
- 39 How Do Atomic Classes Utilize Cas to Ensure Thread Safety
- 40 How to Resolve the Poor Performance of Atomic Integer in High Concurrency
- 41 Differences Between Atomic Classes and Volatile
- 42 Differences Between Atomic Integer and Synchronized
- 43 Differences Between Adder and Accumulator in Java 8
- 44 in Which Practical Production Scenarios Is Thread Local Suitable
- 45 Is Thread Local Used to Solve the Problem of Multi Threaded Access to Shared Resources
- 46 How Are Multiple Thread Locals Stored Within Thread's Threadlocals
- 47 Why Is It Necessary to Call Remove After Using Thread Local to Prevent Memory Leaks
- 48 Differences Between Callable and Runnable
- 49 What Are the Main Functions of Future
- 50 What to Be Cautious About When Using Future Does Future Generate New Threads
- 51 How to Use Completable Future to Solve Travel Platform Problems
- 52 Can Semaphore Be Replaced by Fixed Thread Pool
- 53 How Count Down Latch Arranges Thread Execution Order
- 54 Differences Between Cyclic Barrier and Countdown Latch
- 55 Relationship Between Condition, Object.wait, and Notify
- 56 Let's Talk About the Java Memory Model
- 57 What Is Instruction Reordering and Why Is Reordering Necessary
- 58 Attention Points of Atomic Operations in Java
- 59 What Is the Memory Visibility Issue
- 60 Relationship Between Main Memory and Working Memory
- 61 What Is the Happens Before Principle
- 62 the Role of Volatile and How It Differs From Synchronized
- 63 Why Must We Add Volatile to Double Checked Locking Singleton Pattern
- 64 Do You Know What Cas Is
- 65 Relationship Between Cas and Optimistic Lock When Will Cas Be Used
- 66 What Are the Drawbacks of Cas
- 67 How to Write an Example of an Inevitable Deadlock
- 68 What Are the Four Conditions That Must Be Met for a Deadlock to Occur
- 69 How to Locate Deadlocks With Command Line and Code
- 70 Strategies for Solving Deadlock Issues
- 71 Let's Talk About the Classic Philosophers' Dinner Problem
- 72 What Are the Three Uses of Final
- 73 Why Is Final Added but Still Cannot Guarantee Immutability
- 74 Why Is String Designed to Be Immutable
- 75 What Is the Role and Importance of Aqsaqs
- 76 What Are the Internal Principles of Aqs
- 77 the Application Principles of Aqs in Count Down Latch, Etc
- 78 an Exclusive Diagram of Java Concurrency Tools
-
- 00 Preface Use Tests as Entry Points to Effectively Boost Your Java Skills
- 01 Discussing Your Understanding of the Java Platform
- 02 What's the Difference Between Exception and Error
- 03 Discussing the Differences Between Final, Finally, and Finalize
- 04 What's the Difference Between Strong, Soft, Weak and Phantom References
- 05 What's the Difference Between String, String Buffer and String Builder
- 06 What Principle Is Dynamic Proxy Based On
- 07 What's the Difference Between Int and Integer
- 08 Comparing the Differences Between Vector, Array List, and Linked List
- 09 Comparing the Differences Between Hashtable, Hash Map, and Tree Map
- 10 How to Ensure Collections Are Thread Safe and How Concurrent Hash Map Achieves High Efficiency Thread Safety
- 11 Which Io Methods Are Provided by Java and How Does Nio Implement Multiplexing
- 12 How Many File Copy Methods Does Java Have and Which Is the Most Efficient
- 13 Discuss the Differences Between Interfaces and Abstract Classes
- 14 Discuss the Design Patterns You Know
- 15 What's the Difference Between Synchronized and Reentrant Lock
- 16 How Is Synchronized Implemented at the Bottom Level and What Is Lock Promotion and Demotion
- 17 What Happens When a Thread Calls the Start Method Twice
- 18 Under What Circumstances Does a Java Program Generate Deadlock and How Do You Locate and Fix It
- 19 Which Concurrent Utilities Are Provided by the Java Concurrency Package
- 20 What's the Difference Between Concurrent Linked Queue and Linked Blocking Queue in the Concurrency Package
- 21 What Kinds of Thread Pools Are Provided by the Java Concurrency Libraries and Their Characteristics
- 22 What's the Underlying Principle of Atomic Integer and How to Apply Cas Operations in Your Own Product Code
- 23 Please Introduce the Class Loading Process and What Is the Double Parent Delegation Model
- 24 What Methods Are There to Dynamically Generate a Java Class at Runtime
- 25 Discuss the Jvm Memory Area Allocation and Which Areas Might Trigger an Out of Memory Error
- 26 How to Monitor and Diagnose Jvm Heap and Non Heap Memory Usage
- 27 What Are the Common Garbage Collectors in Java
- 28 Discuss Your Gc Tuning Thoughts
- 29 What Is 'Happen Before' in the Java Memory Model
- 30 What Are the New Issues When Java Programs Run in Container Environments Like Docker
- 31 Do You Understand Injection Attacks in Java Application Development
- 32 How to Write Secure Java Code
- 33 When the Backend Service Becomes Noticeably Slower, Discuss Your Diagnostic Approach
- 34 Some Say Lambda Can Make Java Programs 30 Times Faster, What's Your View
- 35 What Does Jvm Do When Optimizing Java Code
- 36 Discuss My SQL Supported Transaction Isolation Levels and the Principles and Application Scenarios of Pessimistic and Optimistic Locking
- 37 Discuss the Lifecycle and Scopes of Spring Beans
- 38 Compare Java Standard Nio Libraries, Do You Know How Netty Achieves Higher Performance
- 39 Discuss the Common Distributed ID Design Solutions, Does the Snowflake ID Get Affected by the Leap Second Transition
- Weekend Benefit a Must Read Book List for Java Engineers
- Weekend Benefit Discussing My View on Java Learning and Interviewing
- Closing Technology Has No Endpoint
-
- 00 Java Performance Optimization Is the Alchemist's Stone for Senior Architects
- 01 Theoretical Analysis What Balance Indicators to Pay Attention to in Performance Optimization
- 02 Theoretical Analysis Discussing Common Entry Points in Performance Optimization
- 03 in Depth Analysis of Which Resources Are Prone to Becoming Bottlenecks
- 04 Tool Implementation How to Obtain Code Performance Data
- 05 Tool Implementation Precision Testing Methodology for Performance With Jmh
- 06 Case Analysis How Buffering Can Speed Up Code
- 07 Case Analysis the Treasures of Omnipresent Caching in High Concurrency Systems
- 08 Case Analysis How Redis Helps Achieve Lightning Fast Business Transactions
- 09 Case Analysis Application Scenarios of Pooling Objects
- 10 Case Analysis Objectives and Precautions for Reuse of Large Objects
- 11 Case Analysis How to Optimize Performance With Design Patterns
- 12 Case Analysis Parallel Computation to Make Code Take Off
- 13 Case Analysis Optimization of Multi Threaded Locking
- 14 Case Analysis the Optimistic Lock and Lock Free
- 15 Case Analysis From Bio to Nio and Then to Aio
- 16 Case Analysis Common Java Code Optimization Rules
- 17 Advanced Progressive Jvm How to Complete Garbage Collection
- 18 Advanced Progressive Jit How It Affects Jvm Performance
- 19 Advanced Progressive Jvm Common Optimization Parameters
- 20 Spring Boot Service Performance Optimization
- 21 the Process Methodology of Performance Optimization and Summary of Job Interview Experiences
- 22 Final Words Practice to Gain Real Knowledge
-
- 00 Introduction to Java Script Advanced Path
- 01 Functional vs Object Oriented Response to Unknown and Uncertain
- 02 How to Manage Program State Changes Through Closures
- 03 How to Objectify Functions Through Partial Application and Currying
- 04 How to Abstract Functions Through Composing Pipeline and Reducer
- 05 How Map Reduce and Monad Operate Around Values
- 06 How to Achieve Dynamic Loading Through Modular Asynchronous and Observers
- 07 Deep Understanding of Object's Private and Static Properties
- 08 Deep Understanding of Inheritance Delegation and Composition
- 09 Object Oriented Understanding of Scope and Binding Points of This Binding Through Lexicon
- 10 What Are the Eight Data Types in Js and What to Pay Attention To
- 11 Understand Closure Principles Through Js Engine's Heap and Stack
- 12 Should Js Semantic Parsing Use Iteration or Recursion
- 13 How Js Engine Implements Stable Sorting of Arrays
- 14 Deep Understanding of the Call Stack Through Spark Plug
- 15 How to Find the Memory Address of Js Objects Through Hash Lookup
- 16 Why Circular Queues Are Suitable for Node Data Stream Caching
- 17 How to Implement Lru Lfu Cache Through Linked Lists
- 18 How Turbo Fan Optimizes Js Compilation With Graphs
- 19 Through Trees and Graphs See How to Find Paths and Order in Disorder
- 20 Algorithm Ideas in Js Divide and Conquer, Greedy, Backtracking and Dynamic Planning
- 21 Why They Say Redux Can Replace Singleton State Management
- 22 Structural Vue.js How to Implement Reactive Programming Through Proxy
- 23 Structural Through J Query Look at the Structural Design Pattern
- 24 Behavioral Through Observer Iterator Patterns Look at Js Async Callbacks
- 25 Behavioral Differences Between Template Strategy and State Patterns
- 26 Special Types Frontend Special Processing Loading and Rendering Patterns
- 27 Performance How to Understand Parallelism and Concurrency in Java Script Part 1
- 28 Performance How to Understand Parallelism and Concurrency in Java Script Part 2
- 29 Performance Understanding Garbage Collection Through Orinoco Jank Busters
- 30 Network From Http1 to Http3 What You Need to Understand
- 31 Security What Security Issues Should Js Code and Programs Pay Attention To
- 32 Testing From Development to Refactoring Testing
- 33 Testing Functional Testing
- 34 Testing Non Functional Testing
- 35 Static Type Checking Eslint Syntax Rules and Code Style Checks
- 36 Flow Type Checking in Js Through Flow
- 37 Package Management and Distribution Through Npm for Package Management and Sharing
- 38 Compilation and Packaging Through Webpack Babel for Compilation and Packaging
- 39 Syntax Expansion Through Jsx for Syntax Expansion
- 40 Polyfill Using Polyfill to Provide Native Browser Support
- 41 Micro Frontend From Mvc Anemic Model to Ddd Rich Domain Model
- 42 Big Frontend Building Cross PC Mobile Platform Applications Through One Cloud and Many Ends
- 43 Metaprogramming Empowering Metaprogramming Through Proxies and Reflect
- End Statement the Future of Java Script Originates From an End as a Beginning
-
- 01 Installation, Configuration and Routine Maintenance of Jenkins
- 02 Powerful Plugin Functions of Jenkins
- 03 Devops Toolchain
- 04 Exploring Jenkins Cd Practices
- 05 Common Jenkins Project Configuration Parameters
- 06 Deployment With Docker in Jenkins Key Points
- 07 Integration of Jenkins With Ansible Key Points
- 08 Continuous Deployment of Services to Docker Containers With Jenkins Integrated With Ansible
- 09 Implementing Automation Engine With Jenkins Pipeline Declarative Syntax
- 10 Implementing Automation Engine With Jenkins Pipeline Scripted Syntax
- 11 Pipeline Syntax for Continuous Delivery and Basic Practices
- 12 Jenkins Docker Pipeline Plugin Dynamic Generation of Slave Nodes Syntax Analysis
- 13 Practice of Dynamically Generating Jenkins Slave Using Docker Pipeline Plugin
- 14 Setting Up Jenkins Connections to Kubernetes Clusters in Different Environments
- 15 Introduction and Detailed Syntax of Jenkins Kubernetes Plugin
- 16 Using Kubernetes to Compile Jenkins Slave Nodes for Continuous Delivery Projects
- 17 Using Kubernetes Plugin for Continuous Deployment of Services to Kubernetes Clusters
- 18 Detailed Syntax of Ansible Plugin and Continuous Deployment Services to Kubernetes Clusters
-
- 01 Understand the Correct Posture of Reading This Column
- 02 Environmental Preparation a Journey of a Thousand Miles Begins With a Single Step
- 03 Common Performance Metrics Without Quantification, There's No Improvement
- 04 Jvm Basic Knowledge Without Accumulation, There's No Reaching a Thousand Miles
- 05 Java Bytecode Techniques Without Accumulating Small Streams, There's No Forming Rivers and Seas
- 06 Java Class Loaders the Mountain Doesn't Turn, Thus It Can Reach Its Height
- 07 Java Memory Model the Sea Doesn't Reject Water, Thus It Can Reach Its Depth
- 08 Jvm Startup Parameters Detailed Broad Vision and Thorough Understanding Accumulates Wisdom
- 09 Jdk Built in Command Line Tools to Perfect One's Work, Tools Must First Be Honed
- 10 Jdk Built in Graphical Tools the Vast Ocean Allows Fish to Leap; the Vast Sky Allows Birds to Fly
- 11 Jdwp Introduction a Step by Step Guide That Leaves No Trace for a Thousand Miles
- 12 Jmx and Related Tools High Mountains and Small Moons, Waterfalls Revealing Stones
- 13 Common Gc Algorithms the Background and Principles of Gc
- 14 Common Gc Algorithms Parallel, Cms, G1
- 15 Java11 Zgc and Java12 Shenandoah Introduction the Bamboo That Renews Itself Daily Is Ever New
- 16 Oracle Graal Vm Introduction Standing at the Frosty Summit Alone, Overlooking Tiny Mountains
- 17 Gc Log Reading and Analysis Fundamental Configuration
- 18 Gc Log Reading and Analysis Case Analysis Part 1
- 19 Gc Log Reading and Analysis Case Analysis Part 2
- 20 Gc Log Reading and Analysis Case Analysis Part 3
- 21 Gc Log Reading and Analysis Bonus Chapter Visualization Tools
- 22 Jvm Thread Heap and Other Data Analysis Curl a Thousand Times and Show Your Ability After Understanding a Thousand Swords
- 23 Memory Analysis and Related Tools Part 1 Memory Layout and Analysis Tools
- 24 Memory Analysis and Related Tools Part 2 Common Issue Analysis
- 25 Fast Thread Related Tools Introduction to Surpass a Thousand Miles, Aim Even Higher
- 26 Advanced Tools for Complex Problem Solving the Stones of Other Mountains Can Be Used to Polish Jade
- 27 Jvm Problem Investigation and Analysis Part 1 Tuning Experiences
- 28 Jvm Problem Investigation and Analysis Part 2 Case Practices
- 29 Gc Difficult Situation Problem Investigation and Analysis Part 1
- 30 Gc Difficult Situation Problem Investigation and Analysis Part 2
- 31 Common Jvm Interview Questions Compilation Victory in Strategies Often Lies Beyond a Thousand Miles
- 32 Challenges Faced in the Container Era the Long Winds Break Waves, Sometimes Hanging Sails Over the Sea Directly
-
- 00 Preface Why Study Kafka
- 01 Message Broker System Abc
- 02 an Article to Quickly Get You Up to Speed With Kafka Jargon
- 03 Is Kafka Just a Message Broker System
- 04 Which Kafka Should I Choose
- 05 Let's Discuss Kafka Versions
- 06 Kafka Online Cluster Deployment Solutions
- 07 the Most Most Important Cluster Parameter Configuration Part 1
- 08 the Most Most Important Cluster Parameter Configuration Part 2
- 09 Producer Message Partitioning Mechanism Analysis
- 10 Producers Compression Algorithms Overview
- 12 What Are Some Uncommon but Highly Advanced Client Features
- 13 How Java Producers Manage Tcp Connections
- 14 Are Idempotent Producers and Transactional Producers the Same Thing
- 15 What Exactly Are Consumer Groups
- 16 Unveil the Mystery of Log Compaction Topic
- 17 Can Consumer Group Rebalancing Be Prevented
- 18 Kafka Log Compaction Submission Details
- 19 How to Handle Commit Failed Exception Exceptions
- 20 Multi Threaded Development of Consumer Instances
- 21 How Java Consumers Manage Tcp Connections
- 22 How Are Consumer Group Consumption Progress Monitors Implemented
- 23 Kafka Replication Mechanism Explained
- 24 How Are Requests Processed
- 25 Consumer Group Rebalance Full Process Analysis
- 26 the Kafka Controller You Definitely Shouldn't Miss
- 27 Discussion on High Watermarks and Leader Epochs
- 28 How Much Do You Know About Topic Management
- 29 Kafka Dynamic Configuration Unveiled
- 30 How to Reset Consumer Group Offsets
- 31 Collection of Common Tools and Scripts
- 32 Kafka Admin Client Kafka's Operations Tool
- 33 Which Provider to Use for Kafka Authentication
- 34 How Should Authorization Be Handled in Cloud Environments
- 35 Cross Cluster Backup Solutions Mirror Maker
- 36 How Should You Monitor Kafka
- 37 Mainstream Kafka Monitoring Frameworks
- 38 Have You Optimized Kafka
- 39 Building an Enterprise Level Real Time Log Processing Platform Based on Kafka From Scratch
- 40 the Differences Between Kafka Streams and Other Streaming Platforms
- 41 Kafka Streams DSL Development Examples
- 42 Applications of Kafka Streams in the Financial Domain
- Bonus Set Up Development Environment, Read Source Code Methodology, Classic Study Materials Revealed
- User Story the Man in the Yellow Cloud Travels a Hundred Miles Half Ninety
- Closing Words Take Dreams as Horses, Don't Worry About the Distance
- 11 How to Implement No Message Loss Configuration
-
- 00 Why We Should Learn Kubernetes Technology
- 01 Rethinking the Core Components of Kubernetes
- 02 in Depth Understanding of Kubernetes Scheduling Objects
- 03 Dev Ops Scenario Analysis of Practical Difficulties in Kubernetes ( K8s)
- 04 Microservices Application Scenario Analysis of Practical Difficulties in Kubernetes ( K8s)
- 05 Methodology Proposal for Resolving Practical Issues in Kubernetes ( K8s)
- 06 Practice Chapter Mastery of Core Kubernetes ( K8s) Practical Knowledge
- 07 Container Engine Containerd Practical Implementation
- 08 Kubernetes ( K8s) Cluster Installation Tool Kubeadm Practical Implementation
- 09 Practical Implementation of North South Traffic Component IP Vs
- 10 Practical Implementation of East West Traffic Component Calico
- 11 Service Discovery DNS Practical Implementation
- 12 Practice Chapter Kubernetes ( K8s) Cluster Configuration Testing
- 13 Understanding the Objects Exposing External Services Ingress and Service
- 14 Application Gateway Open Resty Interface With Kubernetes ( K8s) Practice
- 15 Service Layer Traffic Steering Technology Implementation
- 16 Cilium Container Networking Practical Implementation
- 17 Practical Implementation of Graceful Traffic Switching for Applications
- 18 Practice Chapter Technology Testing for Graceful Traffic Switching in Applications
- 19 Using Rook to Build a Production Ready Storage Environment Practical Implementation
- 20 Analysis of Stateful Applications' Default Characteristics Implementation
- 21 Case Study Distributed My SQL Cluster Tool Vitess Practical Analysis
- 22 Management and Practical Implementation of Storage Objects Pv, Pvc, Storage Classes
- 23 Practical Implementation of Disaster Recovery for Storage Objects in Kubernetes ( K8s) Clusters
- 24 Practice Chapter Kubernetes ( K8s) Cluster Configuration Testing
-
- 01 Introduction to Kubernetes What Is It and Why We Need It
- 02 Basic Concepts of Kubernetes for Beginners
- 03 Macroscopic Understanding of the Overall Architecture
- 04 Build a Kubernetes Cluster Local Quick Setup
- 05 Hands on Practice Building a Production Ready Kubernetes Cluster
- 06 Cluster Management Introduction With Kubectl
- 07 Cluster Management Using Redis as an Example for Deployment and Access
- 08 Security Focus Authentication and Authorization
-
- 00 Preface How to Make the Linux Kernel Serve Applications Better
- 01 Basics How to Monitor Data With Page Cache
- 02 Basics How Page Cache Is Generated and Released
- 03 Case Study How to Handle High Load Issues Caused by Difficult to Reclaim Page Cache
- 04 Case Study How to Address Business Performance Issues Triggered by Easily Reclaimable Page Cache
- 05 Analysis How to Determine if a Problem Is Caused by Page Cache
- 06 Basics Which Memory Types in Processes Are Prone to Memory Leaks
- 07 Case Study How to Prevent System Crashes Caused by Memory Leaks
- 08 Case Study Where Did the Memory Go if the Shmem Process Did Not Consume It
- 09 Analysis How to Perform Basic Analysis of Kernel Memory Leaks
- 10 Analysis How Should We Step by Step Find the Root Cause of Memory Leaks
- 11 Basics How System Configurations Affect the Establishment and Termination of Tcp Connections
- 12 Basics How Various Configurations Affect the Tcp Transmission Process
- 13 Case Study How Tcp Congestion Control Leads to Business Performance Jitter
- 14 Case Study How to Determine Where the Problem Lies When There Is a Large End to End Tcp Delay
- 15 Analysis How to Analyze Tcp Retransmission Issues Efficiently
- 16 Series How to Analyze Common Tcp Issues
- 17 Basics How Does the CPU Execute Tasks
- 18 Case Study Whether the Business Needs to Use Transparent Huge Pages for Better Performance
- 19 Case Study Should Network Packet High Throughput Business Enable NIC Features
- 20 Analysis How to Analyze High CPU Utilization Issues
- Bonus How I Use Tracepoint to Analyze Kernel Bugs
- Closing Words the First Time I Looked at Kernel Code I Was Also Very Nervous
-
- 00 Preface Don't Let Linux Performance Issues Become Your Stumbling Block
- 01 How to Learn Linux Performance Optimization
- 02 Fundamentals What Does Mean by Average Load
- 03 Fundamentals the Meaning of Context Switch in CPU Part One
- 04 Fundamentals the Meaning of Context Switch in CPU Part Two
- 05 Fundamentals an Application's CPU Usage Reached 100%, What Should I Do
- 06 Case Study High CPU Usage but Can't Find the Application
- 07 Case Study Dealing With Uninterruptible Sleep and Zombie Processes in the System Part One
- 08 Case Study Dealing With Uninterruptible Sleep and Zombie Processes in the System Part Two
- 09 Fundamentals Understanding Linux Soft Lockup
- 10 Case Study High CPU Usage Due to Soft Lockup, What Should I Do
- 11 How Tos How to Quickly Identify System CPU Bottlenecks
- 12 How Tos Several Thoughts on CPU Performance Optimization
- 13 Q& a How to Deal With the Issue of Simulating Res in Middle of Break
- 14 Q& a How to Analyze Java Programs With Perf Tool
- 15 Fundamentals How Does Linux Memory Work
- 16 Fundamentals Understanding Buffer and Cache in Memory
- 17 Case Study How to Utilize System Cache to Optimize Program Execution Efficiency
- 18 Case Study Memory Leak, How to Locate and Handle
- 19 Case Study Why System's Swap Increased Part One
- 20 Case Study Why System's Swap Increased Part Two
- 21 How Tos How to Quickly and Accurately Find System Memory Issues
- 22 Q& a the Difference Between File System and Hard Disk
- 23 Fundamentals How Linux File System Works
- 24 Fundamentals How Linux Disk Io Works Part One
- 25 Fundamentals How Linux Disk Io Works Part Two
- 26 Case Study Finding the Internal Logger That Massively Writes Logs
- 27 Case Study Why Is My Disk Io Latency High
- 28 Case Study a SQL Query Takes 15 Seconds, What's Going On
- 29 Case Study Solving the Issue of Severe Delay in Redis Response
- 30 How Tos How to Quickly Analyze System Io Bottlenecks
- 31 How Tos Several Thoughts on Disk Io Performance Optimization
- 32 Q& a Difference and Relationship Between Blocking Non Blocking Io and Synchronous Asynchronous Io
- 33 About Networking in Linux You Must Know These Part One
- 34 About Networking in Linux You Must Know These Part Two
- 35 Fundamentals Overview of C10 K and C1000 K
- 36 How Tos How to Evaluate System Network Performance
- 37 Case Study DNS Resolves Sometimes Fast Sometimes Slow, What Should I Do
- 38 Case Study How to Use Tcpdump and Wireshark to Analyze Network Traffic
- 39 Case Study How to Mitigate Performance Downturn Caused by Ddo S Attacks
- 40 Case Study When Network Request Delay Increases, What Should I Do
- 41 Case Study Optimizing NAT Performance Part One
- 42 Case Study Optimizing NAT Performance Part Two
- 43 How Tos Several Thoughts on Network Performance Optimization Part One
- 44 How Tos Several Thoughts on Network Performance Optimization Part Two
- 45 Q& a Where Are the Buffers Located in the Network Send and Receive Process
- 46 Case Study Why Has Container Start Up Slowed Down Significantly
- 47 Case Study the Server Constantly Drops Packets, What Should I Do Part One
- 48 Case Study the Server Constantly Drops Packets, What Should I Do Part Two
- 49 Case Study High CPU Utilization of Kernel Threads, What Should I Do
- 50 Case Study How to Use Dynamic Tracing Part One
- 51 Case Study How to Use Dynamic Tracing Part Two
- 52 Case Study the Server's Throughput Drops Significantly, How to Analyze
- 54 How Tos General Thoughts on Application Monitoring
- 55 How Tos General Steps in Analyzing Performance Issues
- 56 How Tos General Methods for Optimizing Performance Issues
- 57 How Tos Quick Reference for Linux Performance Tools
- 58 Q& a How to Perform Performance Analysis of Container Cold Starts
- Extra One Book Recommendation Performance Optimization and Linux System Principles
- Extra Two Book Recommendation Network Principles and Linux Kernel Implementation
- User Story Leaving Home Halfway Must Also Smoothly Perform Performance Optimization
- User Story How Operation and Maintenance and Software Engineers Communicate
- Closing Words Wishing You Overcome Performance Challenges
- 53 How Tos Comprehensive Thoughts on System Monitoring
-
- 00 Preface Go Designed for Developers' Needs Helps You Work Efficiently
- 01 Basics Write Your First Go Program
- 02 Data Types What Are the Essential Data Types You Must Know
- 03 Control Structures the Ins and Outs of If, For, Switch Statements
- 04 Collection Types How to Properly Use Array, Slice, and Map
- 05 Functions and Methods What's the Difference Between Go's Functions and Methods
- 06 Struct and Interface What Features Do Structs and Interfaces Implement
- 07 Error Handling How to Handle Errors With Error, Defer, Panic, Etc
- 08 Concurrency Fundamentals Declaration and Use of Goroutines and Channels
- 09 Synchronization the Sync Package Allows You to Control Concurrency Precisely
- 10 Context the Essential Multiprocessing Control Tool You Must Grasp
- 11 Concurrency Patterns Effective Concurrency Patterns to Use Right Away in Go
- 12 Pointers Explained When Should Pointers Be Used
- 13 Parameter Passing the Differences Between Passing by Value, Reference, and Pointer
- 14 Memory Allocation New or Make, Whom to Use Under What Circumstances
- 15 Runtime Reflection How to Convert Between Strings and Structs
- 16 Non Typed Safety the Unsafe Package You Love and Hate
- 17 Slice Header How to Efficiently Handle Data With Slice
- 18 Quality Assurance How Go Ensures Quality Through Testing
- 19 Performance Optimization How to Conduct Code Review and Optimization in Go
- 20 Collaborative Development Why Modularization Management Can Enhance Development Efficiency
- 21 Network Programming How to Play With Restful API Services in Go
- 22 Network Programming How to Implement Cross Platform Services Through Rpc in Go
- 23 Conclusion Your Path to Growth With Go Language
-
- 00 Preface Let's Understand My SQL Together
- 01 Basic Structure How a SQL Query Sentence Is Executed
- 02 Log System How a SQL Update Statement Is Executed
- 03 Transaction Isolation Why Changes Are Invisible to Me
- 04 Deep Dive Into Indexes Part One
- 05 Deep Dive Into Indexes Part Two
- 06 Global Locks and Table Locks Why Adding a Field to a Table Causes Many Blocks
- 07 Row Locks How to Reduce Row Lock Impact on Performance
- 08 Transactions Are They Isolated or Not
- 09 Choosing Between Ordinary Indexes and Unique Indexes
- 10 Why My SQL Sometimes Picks the Wrong Index
- 11 How to Add an Index to a String Field
- 12 Why Does My My SQL Flutter Sometimes
- 13 Why Deleting Half of the Table Data Doesn't Change the File Size
- 14 Count Is So Slow, What Should I Do
- 15 Q& a Article Log and Index Related Issues
- 16 How Does Order by Work
- 17 How to Correctly Display Random Messages
- 18 Why Do These SQL Statements With Similar Logic Perform Differently
- 19 Why Is a Query for Just One Line Executed So Slowly
- 20 What Is Phantom Read and What Are the Issues
- 21 Why Does a Sentence Changing Just One Line Lock So Much
- 22 What Methods Does My SQL Have to Quench Thirst and Improve Performance
- 23 How My SQL Ensures Data Is Not Lost
- 24 How My SQL Ensures Master Slave Consistency
- 25 How My SQL Ensures High Availability
- 26 Why Backup Databases Might Delay for Several Hours
- 27 What to Do When the Master Database Encounters Problems
- 28 What Are the Pitfalls of Read Write Separation
- 29 How to Judge Whether a Database Has Problems
- 30 Q& a Article Dynamic Views on Locking
- 31 What to Do After Accidentally Deleting Data
- 32 Why Are There Still Non Killable Sentences
- 33 Will Querying Lots of Data Burst the Database Memory
- 34 Can We Use Join at All
- 35 How to Optimize Join Statements
- 36 Why Temporary Tables Can Be Renamed
- 37 When Do We Use Internal Temporary Tables
- 38 All Say Inno Db Is Good, So Should We Use Memory Engine or Not
- 39 Why Auto Increment Primary Key Is Not Continuous
- 40 Why Are There So Many Locks for Insert Statements
- 41 How to Copy a Table Fastest
- 42 Do We Need to Flush Privileges After Grant
- 43 to Use or Not to Use Partitioned Tables
- 44 Answering Questions Part Three Discussing These Good Questions
- 45 What to Do When Auto Increment ID Is Used Up
- My My SQL Journey
- Epilogue Let's Build a My SQL Knowledge Network Online Together
-
- 00 Opening Words Starting Volumetric My SQL Architecture Design From Business Development
- 01 Numeric Types Avoid Auto Increment Pitfalls
- 02 String Types the Essential Collation
- 03 Date Types Timestamp Might Be a Pitfall
- 04 Non Structured Storage Make Good Use of JSON
- 05 Table Structure Design Forget the Norms of Normalization
- 06 Table Compression Not Just Space Compression
- 07 Table Access Design Should You Choose SQL or No SQL
- 08 the Art of Index Sorting
- 09 Indexing Organizes Everything
- 10 Combined Indexes Improve Performance by 10 Times
- 11 if Indexing Fails, Understand the Working Principle of Cbo
- 12 Join Can or Can’t We Write Join
- 13 Subqueries Use Subquery Features With Ease
- 14 Partitioning Tables in Which Scenarios I Don't Recommend Partitioning
- 15 My SQL Replication the Simplest Yet Easiest to Misconfigure
- 16 Read Write Separation Design Replication Delay Is Actually Your Misuse
- 17 High Availability Design How to Effectively Use Three Major Architectural Solutions
- 18 Financial High Availability Architecture Indispensable Data Core
- 19 High Availability Components How to Choose Among So Many Options
- 20 Inno Db Cluster Changing History's New Product
- 21 Database Backup Check Backup Files as Well
- 22 Distributed Database Architecture Thoroughly Understand What a Distributed Database Is
- 23 Distributed Database Table Structure Design How to Properly Shard Data
- 24 Distributed Database Index Design the Best Design Practice for Secondary Index and Global Index
- 25 Distributed Database Architecture Selection Database Sharding vs Table Sharding or Middleware
- 26 Distributed Design Belt Design of the Consistent Hash Ring
- 27 Distributed Transactions Should We Use 2 PC or Not
-
- 00 Learn Netty Well, It Is the Essential Path to Cultivate Your Java Prowess
- 01 Getting to Know Netty, Why Is Netty So Popular
- 02 Take a Glance at the Overall Picture, Grasp the Netty Framework Structure
- 03 What Does the Bootstrapper Do, Both Client and Server Startup Require Some Operations
- 04 Event Dispatch Layer, Why Is Event Loop the Essence of Netty
- 05 Service Compilation Layer Pipeline, How Various Handlers Coordinate
- 06 Stick Package and Unpacking Problem, How to Obtain a Complete Network Packet
- 07 Dark Language Headers, How to Realize Custom Protocol Communication With Netty
- 08 Unpack and Use, Which Common Decoders Does Netty Support
- 09 Data Transmission Write and Flush, Dissecting the Processing Flow
- 10 Management of Netty Off Heap Memory in a Double Edged Sword Rationality
- 11 Firing Up the Furnace, a Detailed Explanation of Netty's Data Transmission Carrier Byte Buf
- 12 Stone From Other Mountains, the Basic Principles of the High Performance Memory Allocator Jemalloc
- 13 High Performance Memory Management in Netty Revisited Part 1
- 14 High Performance Memory Management in Netty Revisited Part 2
- 15 Lightweight Object Recycling Station Recycler, Object Pool Technology Analysis
- 16 Io Acceleration and the Distinct Netty Zero Copy Technology
- 17 Source Code Series, Deep Analysis of the Server Startup Process From Linux
- 18 Source Code Series, Decrypting Netty's Reactor Threading Model
- 19 Source Code Series, a Journey of a Network Request in Netty
- 20 Technique Series, Where Exactly Is Netty's Fast Thread Local Faster Than Thread Local
- 21 Technique Series, the Deity of Delayed Tasks Handling Time Wheel Hashed Wheel Timer
- 22 Technique Series, High Performance Lock Free Queue Mpsc Queue
- 23 Architectural Design, How to Implement a High Performance Distributed Rpc Framework
- 24 Service Publishing and Subscription, Building the Foundation of Producer and Consumer Structures
- 25 Remote Communication, Designing Communication Protocols and Implementing Encoding and Decoding
- 26 Service Governance, Implementing Service Discovery and Load Balancing Regulations
- 27 Dynamic Proxy, Shielding Users From the Underlying Details of Rpc Invocation
- 28 Actual Combat Summary, Rpc Practical Conclusions and Advanced Extensions
- 29 Programming Thoughts, Which Design Patterns Are Applied in Netty
- 30 Practical Conclusion, Some of the Best Practices of Netty in Project Development
- 31 Ending Words, How to Forge Your Own Technical System on the Road to Technical Growth
-
- 00 Introduction Why Learn Oauth 2.0
- 01 What Issues Does Oauth 2.0 Resolve Through What Means
- 02 Why Must Authorization Code Grant Type Have an Authorization Code
- 03 What Is the Authorization Service Authorization Code and Access Token Issuance Process
- 04 How to Use JWT Structured Tokens in Oauth 2.0
- 05 How to Securely and Quickly Integrate Oauth 2.0
- 06 Besides Authorization Code Grant Type, What Other Authorization Flows Does Oauth 2.0 Support
- 07 How to Use Oauth 2.0 in Mobile Apps
- 08 Possible Security Vulnerabilities When Practicing Oauth 2.0
- 09 Using Oauth 2.0 in Practice to Implement an Open ID Connect User Authentication Protocol
- 10 Serial Talk on the Working Process and Security Issues of Oauth 2.0
- 11 Practical Case Using Spring Security to Build a Oauth 2.0 Architecture Based on JWT
- 12 Architectural Example Based on Oauth 2.0 JWT for Microservices Reference Architecture
- 13 How Major Open Platforms Use Oauth 2.0
- 14 Addressing Common Issues Q& a for Oauth 2.0
- Endnote Turn Learning Into a Habit
-
- 00 OK R the Essential Tool for Organizational Goal Management
- 01 Goal Management Development Before OK R What Everyone Used to Manage Organizational Goals
- 02 OK R Value Why Internet Companies Are All Using OK R
- 03 OK R and Strategic OK R How to Solve Organizational Growth Problems
- 04 OK R Rules to Follow for Generating OK Rs at All Levels
- 05 What Kind of ' O' Should Be Recognized by Leaders
- 06 Kr the Universal Formula for Writing Good Krs
- 07 Case Studies Teach You to Write High Quality OK Rs
- 08 Process How You Should Define Managing OK Rs
- 09 OK R and Kpi the Differences and Connections
- 10 Motivation How to Use OK R to Energize Your Team
- 11 Culture Molding and Immersion of OK R Culture
- 12 Transformation OK R Change Difficulties and Solutions
- 13 Supper OK R Writing Templates and Examples
- Ending Words OK R Methodology Triumphs in the Second Half of the Internet Era
-
- 00 Preface Open Resty Opens the Gate to High Performance Development for You
- 01 Exploring the Three Major Features of Open Resty
- 02 How to Write Your Hello World
- 03 Unveiling the Sub Projects Hidden Behind
- 04 How to Manage Third Party Packages With Package Management Tools Luarocks and Opm
- 05 Video Tutorial of the Opm Project
- 06 Knowledge of Nginx Used in Open Resty
- 07 Quickly Getting Started With Lua
- 08 Differences Between Lua Jit Branch and Standard Lua
- 09 Why Luarestycore Offers Higher Performance
- 10 Why to Avoid Using Nyi in Jit Compiler
- 11 Dissecting the Unique Data Structures in Lua Table and Metatable Features
- 12 Advanced Secrets Understanding Lua's Unique Concepts and Pits
- 13 Video Tutorial Implementing 'Luarestylrucache' Based on Ffi
- 14 Q& a One How to Handle Conflicts Arising From Lua Rules and Nginx Configuration Files
- 15 Differences Between Open Resty and Other Development Platforms
- 16 Two Tools That Kill Most Development Issues Instantly Documentation and Test Cases
- 17 Why Being Able to Handle Dynamic Requests and Responses Better Is Key to a Web Server
- 18 the Most Important Data Structure for Communication Between Workers Shared Dict
- 19 the Core and Essence of Open Resty Cosocket
- 20 Exceeding Web Server Privileges With Progress and Scheduled Tasks
- 21 Playing With Time Regular Expressions and Other Common Apis
- 22 Video Starting From a Security Vulnerability to Explore the Balance Between API Performance and Security
- 23 Video Tutorial How the Excellent 'Luarestyrequests' of Luaresty Were Written
- 24 Practical Hands on Implementing a Memcached Server for 4 Layer Traffic
- 25 Q& a Two What Exactly Are the Privileges of Special Processes
- 26 Introduction to 'Testnginx' a Roadblock for Code Contributors
- 27 'Testnginx' a Comprehensive Test Methodology
- 28 'Testnginx' Can Also Be Used Like This
- 29 the Most Prone to Mistake Performance Tests You Need the Industry Benchmark Tool 'Wrk'
- 30 Q& a Three How to Build a Network Architecture for Testing
- 31 the Truly Malicious Function That Causes a 10x Performance Drop
- 32 String Operations Hated and Loved by Many
- 33 Secrets to a 10x Performance Boost You Must Use the 'Table' Properly
- 34 Special Release Open Resty Coding Guidelines
- 35 Video Performance Optimization in Actual Projects Reviewing Several Prs in 'Ingressnginx'
- 36 Discussing Various Debugging Techniques in Open Resty
- 37 How 'Systemtaptoolkit' and 'Stapxx' Can Pin Down Those Pesky Issues With Data
- 38 Video Cunningly Using 'Wrk' and Flame Graphs to Pinpoint Performance Bottlenecks
- 39 High Performance Secrets 'Shared Dict' Cache and 'Lru' Cache
- 40 Cache vs. Storms Who Says Cache Storms Can't Be Avoided
- 41 'Luaresty' Wrappers Let You Stay Away From the Pain of Multilevel Caching
- 42 How to Deal With Sudden Traffic Surges, Overflow, and Throttling
- 43 Agile Implementation of Dynamic Rate Limiting Is Not That Difficult
- 44 Open Resty's Killer Move Dynamic Handling
- 45 the Unmissable Capability Common Third Party Libraries Often Used With Open Resty
- 46 Q& a Four Is Shared Dictionary Cache Really Necessary
- 47 Three Step Melody for Building Microservice API Gateways Part One
- 48 Three Step Melody for Building Microservice API Gateways Part Two
- 49 Three Step Melody for Building Microservice API Gateways Part Three
- 50 Q& a Five How to Introduce Open Resty Into Work
- End Phrase Those Who Travel a Hundred Miles Are Halfway There
-
- 00 Preface Breaking Through the Four Misconceptions Stage to Advanced Performance Engineering
- 01 Why Many Performance Testing Personnel Cannot Be Held Accountable for Performance Results
- 02 Key Concepts Determination of Performance Indicators and Scenarios
- 03 Core Analysis Logic All Performance Analyses Rely on These Seven Steps
- 04 How to Build a Performance Analysis Decision Tree and Find the Bottleneck Evidence Chain
- 05 Performance Solution Is Your Solution Still Stuck on the Formality
- 06 How to Extract a Business Model That Fits the Real Business Scenario
- 07 What Should the Performance Scenario Data Look Like
- 08 Relationship Between Concurrent Online and Tps
- 09 How to Design Global and Targeted Monitoring Strategies
- 10 Designing Standard Scenarios Needs to Pay Attention to These Key Points
- 11 Opening Homepage an Example to Help You Understand the Performance Issues of Basic Hardware Deployment
- 12 Opening Homepage Second How to Balance and Utilize Hardware Resources
- 13 User Login How to Judge the Cause of Block in the Thread
- 14 User Information Query How to Solve Network Soft Breakpoints Bottle Neck Problem
- 15 Query Commodity Resource Insufficiency and Performance Behaviors
- 16 Goods Added to Shopping Cart SQL Optimization and Parameter Analysis in Stress Tools
- 17 Why the Checkout Parameters in the Shopping Cart Must Match the Real Business Characteristics
- 18 Why Dynamic Parameterization Logic Is Very Important for Confirming Shopping Cart Information to Order
- 19 Generating Order Information First Using Jdbc Pool Optimization and Memory Overflow Analysis
- 20 Generating Order Information Second How to Perform Performance Optimization on Complex Business Logic
- 21 How to Analyze and Optimize a Fixed Technological Component Before Payment Query Order List
- 22 How to Efficiently Solve Memory Overflow Issues Produced by for Loops in Payment Order Information
- 23 What Are the Key Factors in Determining the Failure of Capacity Scenarios
- 24 Capacity Scenarios First Index Optimization and How to Deal With Uneven Distribution of Kubernetes Resources
- 25 Capacity Scenarios Second How Caching Can Affect Performance
- 26 Stability Scenario First How to Handle the Bottleneck Issues Caused by Business Volume Accumulation
- 27 Stability Scenario Second How to Deal With the Bottle Neck Issues Caused by Insufficient Disk Space
- 28 How to Determine the Scope and Logic Design of Abnormal Scenarios
- 29 Abnormal Scenarios How to Simulate Exceptions at Different Component Levels
- 30 How to Determine the Production System Configuration
- 31 How to Write a Valuable Performance Report
- How Is the System of Our Course Built
- Ending Remarks Do Real Performance Projects
-
-
- 00 Preface Deeply Understand Python From an Engineering Perspective
- 01 How to Step by Step Become a Python Expert
- 02 Why Jupyter Notebook Is an Essential Skill for Modern Python
- 03 List and Tuple, Which One to Use
- 04 Do You Really Understand Dictionary Collection
- 05 Dive in and Out of Strings
- 06 Python Black Box Input and Output
- 07 Cultivating Basic Conditions and Loops
- 08 Exception Handling to Improve Program Stability
- 09 Indispensable Custom Functions
- 10 Simple Yet Not Simple Lambda Functions
- 11 Object Oriented Diagram Classes From Life
- 12 Object Oriented How to Implement a Search Engine
- 13 Constructing a Modular Python Stack
- 14 Answering How Lists and Tuples Are Implemented Internally
- 15 Python Object Comparison and Copy
- 16 Value Passing, Reference Passing, or How Are Arguments Passed in Python
- 17 the Powerful Decorators
- 18 Is a Metaclass a Pandora's Box or an Aladdin's Lamp
- 19 Deep Understanding of Iterators and Generators
- 20 Unveiling Python Coroutines
- 21 Python Concurrent Programming With Futures
- 22 Concurrent Programming With Asyncio
- 23 Do You Really Understand Python's Gil ( Global Interpreter Lock)
- 24 Guide to Python Garbage Collection Mechanism
- 25 Answering the Relationship Between Gil and Multithreading
- 26 Live Busy but Also Pay Attention to Code Style
- 27 Learn to Reasonably Decompose Code to Improve Code Readability
- 28 How to Reasonably Utilize Assert
- 29 Skillful Use of Context Managers and With Statement for Concise Code
- 30 Is It Really Necessary to Write Unit Tests
- 31 Pdb C Profile for Debugging and Performance Analysis
- 32 Answering How to Choose the Proper Exception Handling Method
- 33 Introducing You to the World of Quantitative Analysis
- 34 Restful & Socket to Build the Transaction Execution Core
- 35 Restful & Socket for Market Data Interface and Capture
- 36 Pandas & Numpy Strategies and Backtesting System
- 37 Kafka & Zmq for Automated Trading Workflow
- 38 My SQL Logs and Data Storage Systems
- 39 Django to Build a Monitoring Platform
- 40 Summary of Data Structures and Algorithms in Python
- 41 Silicon Valley First Line Internet Company Work Experience
- 42 Detailed Precautions for Technical Research and Development
- 43 Qa Discussion on Career Development and Choices
- Extra Guide You Through a Clear and Practical Swig Programming Practice
- Conclusion a Few Growth Suggestions Beyond Technology
-
- 00 Preface How to Efficiently Enter Py Torch
- 01 Py Torch Internet Celebrities Top Star
- 02 Num Py Core Data Structure Explained in Detail
- 03 Num Py Common Operations in Deep Learning
- 04 Tensor the Most Fundamental Computing Unit in Py Torch
- 05 Tensor Transformation Quick Mastery of Tensor Slicing, Transforming, Etc
- 06 Torchvision the First Step of Data Reading and Training
- 07 Torchvision Data Augmentation for More Diverse Data
- 08 Torchvision Other Interesting Features
- 09 Convolution How to Use Convolution to Give Computers Vision
- 10 Convolution How to Use Convolution to Give Computers Vision Part 2
- 11 Loss Function How to Help Models Learn to Save Themselves
- 12 Calculating Gradients Forward and Backpropagation in Networks
- 13 Optimization Methods Updating Model Parameters
- 14 Building Networks One Stop Implementation of Model Construction and Training
- 15 Visualization Tools How to Realize Visualization Monitoring of Training
- 16 Distributed Training How to Speed Up Your Model Training
- 17 Image Classification Principles and Models of Image Classification Part 1
- 18 Image Classification How to Build an Image Classification Model Part 2
- 19 Image Segmentation Explaining the Principles and Models of Image Segmentation Part 1
- 20 Image Segmentation How to Build an Image Segmentation Model Part 2
- 21 Nlp Fundamentals Explaining Principles of Natural Language Processing and Common Algorithms Part 1
- 22 Nlp Fundamentals Explaining Language Models and Attention Mechanisms Part 2
- 23 Sentiment Analysis How to Perform Sentiment Analysis With Lstm
- 24 Text Classification How to Build a Text Classification Model Using Bert
- 25 Summary How to Quickly Realize Automatic Summary Generation
- Extra Machine Learning Is Just That Many Things
- User Story Tango Master Leading the Entrance Rituals in Personal Life
- Answers Thinking Topics and Solution Summary
- Ending Words Choices in Life Are as Important as Effort
-
- 01 How Redis Executes
- 02 Quick Setup and Usage of Redis
- 03 Redis Persistence Rdb
- 04 Redis Persistence Aof
- 05 Redis Hybrid Persistence
- 06 String Usage and Internal Implementation Principles
- 07 Appendix More String Operation Commands
- 08 Dictionary Usage and Internal Implementation Principles
- 09 Appendix More Dictionary Operation Commands
- 10 List Usage and Internal Implementation Principles
- 11 Appendix More List Operation Commands
- 12 Set Usage and Internal Implementation Principles
- 13 Appendix More Set Operation Commands
- 14 Ordered Set Usage and Internal Implementation Principles
- 15 Appendix More Ordered Set Operation Commands
- 16 in Depth Analysis of Redis Transactions
- 17 Redis Key Expiration Operations
- 18 Redis Expiration Strategy and Source Code Analysis
- 19 Redis Pipeline Technology
- 20 Look Up Nearby People With Geo
- 21 Cursor Iterators and Filter Scan
- 22 Outstanding Cardinality Statistics Algorithm Hyper Log Log
- 23 Memory Reclamation Mechanism and Algorithms
- 24 Message Queues Publish Subscribe Mechanism
- 25 Other Implementations of Message Queues
- 26 Message Queue Ultimate Solution Stream Part 1
- 27 Message Queue Ultimate Solution Stream Part 2
- 28 Practical Distributed Lock Detailed Explanation and Code
- 29 Practical Deployment Filter Installation, Usage, and Principle Analysis
- 30 Complete Case Realizing Delayed Queues With Two Methods
- 31 Practical Scheduled Task Case Study
- 32 Practical High Performance Full Text Search Engine Redi Search
- 33 Practical Performance Testing for Redis
- 34 Practical Investigation of Slow Queries in Redis
- 35 Practical Redis Performance Optimization Solutions
- 36 Practical Redis Master Slave Synchronization
- 37 Practical Redis Sentinel Mode Part 1
- 38 Practical Redis Sentinel Mode Part 2
- 39 Practical Redis Cluster Mode Part 1
- 40 Practical Redis Cluster Mode Part 2
- 41 Case Study Redis Problem Summary and Resolution Solutions
- 42 Skills Learning Guide
- 43 Add on Redis Visualization Management Tools
-
- 00 Preface Redis Learning Tips Can Elevate Your Skills
- 01 Basic Structure What Does a Key Value Database Include
- 02 Data Structures Quick Redis Operations and Some Slow Ones
- 03 Why High Performance Io Model Makes Single Threaded Redis So Fast
- 04 Aof Log Persistence Redis How to Avoid Data Loss
- 05 Memory Snapshot Persistent Failure Redis How to Quickly Recover
- 06 Data Synchronization How Master Slave Repositories Achieve Data Consistency
- 07 When Master Database Crashes How to Ensure Uninterrupted Service
- 08 Sentinel Cluster What Happens to Master Slave Database When Sentinel Goes Down
- 09 Sharding Cluster Data Grows Should We Increase Memory or Add Instances
- 10 Lecture 19 Post Lecture Thinking Problems, Answers, and Common Questions
- 11 Why String in Redis Is Not Efficient Anymore
- 12 One Billion Keys Which Collection Should Be Used for Counting
- 13 What Is Geo Can We Define New Data Types
- 14 How to Store Time Series Data in Redis
- 15 Message Queues Verification What Are Redis's Solutions
- 16 Asynchronous Mechanism How to Avoid Blocking in Single Threaded Model
- 17 Why CPU Architecture Can Also Affect Redis Performance
- 18 How to Respond to the Wave of Latency Slowdown in Redis Before
- 19 How to Respond to the Wave of Latency Slowdown in Redis After
- 20 Why Is the Memory Utilization Still High After Data Deletion
- 21 Buffer Overflow a Place That Could Trigger Disasters
- 22 Lecture 1121 Post Lecture Thinking Problems, Answers, and Common Questions
- 23 How Lateral Cache Redis Works
- 24 Replacement Strategy What to Do When Cache Is Full
- 25 Cache Anomaly How to Solve Data Inconsistency Between Cache and Database
- 26 Cache Anomaly How to Resolve Cache Avalanche and Penetration Issues
- 27 Cache Contamination What to Do
- 28 How Pika Implements Large Capacity Redis Based on Ssd
- 29 How Redis Responds to Concurrent Access With Lock Free Atomic Operations
- 30 How to Implement Distributed Locks With Redis
- 31 Transaction Mechanism Can Redis Achieve Acid Properties
- 32 Sync and Failure Switching in Redis Master Slave What Are the Pitfalls
- 33 a Strange Case of Data Loss
- 34 Lecture 2333 Post Lecture Thinking Problems, Answers, and Common Questions
- 35 Codis vs Redis Cluster Which Clustering Solution Should I Choose
- 36 Redis's Key Technologies and Practices in Supporting High Concurrency Scenarios
- 37 Data Distribution Optimization How to Address Data Skew
- 38 Communication Bottlenecks Restrict Redis Cluster Scaling Key Factors
- 39 New Features of Redis 6 Multi Threaded Client Caching and Security
- 40 Redis's Next Step Practices Based on Nvm Memory
- 41 Lesson 3540 Post Lecture Thinking Problems, Answers, and Common Questions
- Extra Meal 01 Classic Redis Learning Materials
- Extra Meal 02 How User Kaito Learned Redis
- Extra Meal 03 User Kaito Hoping to Grow Under Pressure
- Extra Meal 04 How Redis Clients Exchange Commands and Data With Server
- Extra Meal 05 Useful Operational Tools for Redis
- Extra Meal 06 Usage Guidelines and Recommendations for Redis
- Extra Meal 07 Experiences We Can Learn From Microblog's Redis Practices
- Ending Words From Learning Redis to Being Enlightened by Redis
-
- 00 Preface What Can Reading Redis Source Code Bring to You
- 01 Guide You Through Redis Source Code Structure Quickly
- 02 Implementation of String in Key Value Pairs Using Char or Structure
- 03 How to Implement a High Performance Hash Table
- 04 How to Design Memory Friendly Data Structures in Detail
- 05 Why Ordered Sets Support Point Query and Range Query at the Same Time
- 06 From Ziplist to Quicklist to Listpack Evolution
- 07 Why Stream Employed Radix Tree
- 08 Actions Performed by Redis Server After Startup
- 09 When to Use Select, Poll, Epoll in Redis Event Driven Framework
- 10 Did Redis Implement the Reactor Pattern in the Event Driven Framework
- 11 What Events Are There in Redis Event Driven Framework
- 12 Is Redis Truly Single Threaded
- 13 Did 60 Io Threads Improve Redis Performance
- 14 Atomicity Guarantees From a Distributed Lock Implementation Perspective
- 15 Why Principles and Code Implementation of Lru Algorithm Are Different
- 16 Does the Lfu Algorithm Have Advantages Over Other Algorithms
- 17 Will Lazy Free Affect Cache Replacement
- 18 How to Generate and Parse Rdb Files
- 19 Impact of Aof Rewrite Trigger Timing and Rewriting
- 20 Where Are New Writes Recorded During Aof Rewrite
- 21 Master Slave Replication Design and Implementation Based on State Machine
- 22 Does Sentinel Initialize the Same as Redis Instances
- 23 Learning Raft Protocol Implementation From Sentinel Leader Election Part 1
- 24 Learning Raft Protocol Implementation From Sentinel Leader Election Part 2
- 25 Role of Pub Sub During Master Slave Failover Switch
- 26 Learning Gossip Protocol Implementation From Ping Pong Messages
- 27 Handling Commands From Moved Ask in Cluster Nodes
- 28 Does Redis Cluster Data Migration Cause Blockage
- 29 How to Properly Implement Circular Buffers
- 30 How to Implement Latency Monitoring in Systems
- 31 Learning Dynamic Extension Functions From Module Implementation
- 32 How to Implement Unit Testing in a System
- Concluding Remarks Redis Source Code Reading Lets Us Start Afresh
-
- 01 Setting Up Learning Environment Preparation
- 02 Rocket Mq Core Concepts Primer
- 03 Message Sending API Detailed Explanation and Version Migration Description
- 04 Discussing Message Sending Practical Application Scenarios
- 05 Message Sending Core Parameters and Working Principles Detailed Explanation
- 06 Common Message Sending Errors and Resolution Solutions
- 07 Transactional Message Usage and Solution Selection Thinking
- 08 Message Consumption API and Version Migration Explanation
- 09 Default Mqpush Consumer Core Parameters and Working Principles
- 10 Default Mqpush Consumer Usage Examples and Precautions
- 11 Default Lite Pull Consumer Core Parameters and Practical Combat
- 12 Discussing the Usage of Default Lite Pull Consumer in Practical Application Scenarios Again
- 13 Practical Combat of Sequential Message Consumption Filtering in Real World Scenes
- 14 Message Consumption Backlog Problems Troubleshooting
- 15 Rocket Mq Common Command Practices
- 16 Rocket Mq Cluster Performance Tuning
- 17 Rocket Mq Cluster Performance Optimization
- 18 Rocket Mq Cluster Smooth Operation Maintenance
- 19 Rocket Mq Cluster Monitoring I
- 20 Rocket Mq Cluster Monitoring Ii
- 21 Rocket Mq Cluster Alerts
- 22 Rocket Mq Cluster Failure Recording
- 23 Message Trace ACL and Multi Replica Construction
- 24 Rocket Mqconsole Common Pages Index Retrieval Logic
- 25 Behind the Rocket Mq Nameserver Design Concepts
- 26 Java Concurrency Programming Practices
- 27 Learning Programming Patterns Based on Files From Rocket Mq I
- 28 Learning Programming Patterns Based on Files From Rocket Mq Ii
- 29 Learning Netty Network Programming Techniques From Rocket Mq
- 30 Rocket Mq Learning Methods My Perspective
-
- 00 Preface Don't Always Think About How to Use Rpc Framework Well, You Need to Spend Time Grinding the Principles
- 01 Core Principle Can You Draw a Diagram to Explain the Communication Process of Rpc
- 02 Protocol Design How to Design a Protocol That Is Extensible and Backwards Compatible
- 03 Serialization How Do Objects Get Transmitted Over the Network
- 04 Network Communication Which Network Io Model Does the Rpc Framework Lean More Towards in Network Communication
- 05 Dynamic Proxy Hiding Rpc Processing Flow Through Interface Oriented Programming
- 06 Rpc Practice Dissecting G Rpc Source Code to Implement a Complete Rpc by Hand
- 07 Architectural Design Designing a Flexible Rpc Framework
- 08 Service Discovery Whether to Choose Cp or Ap
- 09 Health Check if This Node Is Down, Why Still Crazily Send Requests
- 10 Routing Strategy How to Let Requests Go to Different Nodes According to the Set Rules
- 11 Load Balancing Why Is There Such a Big Discrepancy in the Load Received by the Node
- 12 Exception Retry How to Safely and Reliably Retry Within a Set Time
- 13 Graceful Shutdown How to Avoid Business Losses Caused by Service Shutdown
- 14 Graceful Boot How to Prevent Traffic From Hitting Nodes That Have Not Fully Started
- 15 Throttling and Limiting How to Implement Self Protection in Business
- 16 Business Isolation How to Isolate Traffic
- 17 Asynchronous Rpc Pressure Measured by the Swallowing Capacity of a Single Machine
- 19 Distributed Environment How to Quickly Locate Problems in a Distributed Setting
- 20 Detailed Analysis the Application of the Timing Wheel in Rpc
- 21 Traffic Replay the Magic Weapon to Protect Business Technical Upgrades
- 22 Dynamic Grouping Highly Efficient Implementation of Second Level Expansion and Contraction
- 23 How to Perform Rpc Calls Without an Interface
- 24 How to Accommodate Multiple Rpc Protocols in an Online Environment
- Appendix Detailed Explanation of Rpc Framework Code Instances
- Appendix Discussing the Rpcs I Have Experienced
- Q& a Classroom Collection of Basic and Advanced Chapter Thinking Questions and Answers
- Closing Remarks Learning to Excavate Knowledge From the Source Code of Excellent Projects
- 18 Security System How to Establish a Reliable Security System
-
- 00 Introduction Making Rust Your Next Main Language
- 01 Placing Values in Heap or Stack, That Is the Question
- 02 Essential Concepts You Need to Master in Programming Development
- 03 Start Your Journey With Your First Rust Program
- 04 Get Hands Dirty to Write a Practical CLI Tool
- 05 Get Hands Dirty How Hard Is It to Make an Image Server
- 06 Get Hands Dirty SQL Query Tool How to Multitask With One Fish
- 07 Ownership of the Power of Life and Death Ultimately in Whose Hands
- 08 How Borrowing of All Ownership Values Works
- 09 Can One Value Have Multiple Owners
- 10 Lifecycle How Long Can the Value You Created Last
- 11 Memory Management From Creation to Expiration What It Goes Through
- 12 Type System Features of Rust's Type System
- 13 How to Use Trait to Define Interface in Type System
- 14 Types of Essential Traits to Master
- 15 Data Structures These Striking Structures Are Actually Smart Pointers
- 16 Data Structure Vec Ttbox T Do You Really Understand the Collection Container
- 17 Data Structure Software System Core Component Hash Table Memory Layout
- 18 Why Rust's Error Handling Is Different
- 19 Closures Fn Once, Fn Mut, and Fn Why Are There So Many Types
- 20 4 Steps How to Read Rust Source Code Better
- 21 Stage Practical Operation 1 Building a Simple Kv Server Basic Process
- 22 Stage Practical 2 Constructing a Basic Kv Server Workflow
- 23 How to Use Generics in Practical Programming With Type Systems
- 24 How to Use Trait Objects in Practical Applications of the Type System
- 25 Type System How to Design and Architect Systems Around Traits
- 26 Step Practice 3 Build a Simple Kv Server With Advanced Trait Techniques
- 27 Common Rust Libraries Available for Use in the Ecosystem
- 28 How to Handle Network Requests Using Rust in Web Development
- 29 How to Handle Network Requests in Web Development Using Rust
- 30 Unsafe Rust Opening Rust the C Way
- 31 Ffirust How to Bridge the Communication Gap With Your Language
- 32 Practical Projects Using Py O3 to Develop Python 3 Modules
- 33 Concurrent Processing From Atomics to Channel What Tools Rust Provides
- 34 Concurrency Handling Tools Provided by Rust From Atomics to Channels
- 35 Practical Project How to Implement a Basic Mpsc Channel
- 36 Stage Practical Exercise 4 Building a Simple Kv Server for Network Processing
- 37 Stage Practical Operation 5 Build a Simple Kv Server Network Security
- 38 Asynchronous Processing What Is Future and What Is Its Relationship With Async Await
- 39 Asynchronous Processing How Is Async Await Implemented Internally
- 40 Asynchronous Processing Handling Asynchronous Io
- 41 Stage Practical Exercise 6 Build a Simple Kv Server With Asynchronous Processing
- 42 Stage Practicum 7 How to Do Major Refactoring to Build a Simple Kv Server
- 43 Production Environment Real World Rust Project Components
- 44 Data Processing Applications and How They Interact With Data
- 45 Practical Operation 8 Build a Simple Kv Server Configuration Test Monitoring Ci Cd
- 46 Software Architecture How to Use Rust to Build Complex Systems
- Special Planning Study Tips Volume Three Listen to What the Class Representatives Have to Say
- Extra Meal Writing Macros in the Dumbest Way Possible in Macro Programming
- Extra Meal the Summit of Ignorance Your Rust Learning Frequently Asked Questions Summary
- Special Planning Study Tips Volume 2 What Class Representatives Have to Say
- Additional Meal Gracefully Construct Macros Using Synquote in Macro Programming
- Epilogue the Eternal Basis of Rust Learning How to Continuously Improve
- Extra Meal Midterm Test Reference Implementation Explanation
- Special Planning Learning Tips Listening to Class Representatives' Opinions
- User Story Change in the Valley of Despair Begins With Learning
- Extra Meal How You Can Learn From This Column and Whether Rust Is Worth Learning
- Celebrities Assist in the Event the Current Situation, Opportunities, and Challenges of Rust on the Slope of Enlightenment
- Extra Meal Code Is Data Why We Need Macro Programming Capabilities
- Extra Meal Midterm Test Write a Simple Grep Command Line
- Extra Meal Rust 2021 Edition Released
- Big Shot Support the Current Status, Opportunities, and Challenges of Rust Down the Slope of Enlightenment
- User Stories Language Is Not Only a Tool but Also a Way of Thinking
- Extra Meal Write a Simple Grep Command for the Midterm Test
- Extra Meal Summit of Ignorance Your Rust Learning Frequently Asked Questions Compilation
- Special Planning Study Tips Series 2 Listen to What the Class Representatives Have to Say
-
- 01 Architecture's Evolution
- 02 the Value of Serverless
- 03 Common Serverless Architecture Patterns
- 04 Serverless Technology Selection
- 05 Function Compute Brief Introduction
- 06 How Function Compute Works
- 07 Function Integration With Cloud Services for End to End Solutions
- 08 Function Compute Development and Configuration
- 09 Function Debugging and Deployment
- 10 Automation Cicd and Canary Release
- 11 Function Compute Observability
- 12 Case Study 1 Function Compute in Video Scenarios
- 13 Case Study 3 Building a Scalable Web API in Ten Minutes
- 14 Serverless Kubernetes Container Service Introduction
- 15 Serverless Kubernetes Applications Deployment and Scaling
- 16 Running Jobs at Low Cost With Spot Instances
- 17 Low Cost Running Spark Data Processing
- 18 Gpu Machine Learning Ready to Use
- 19 Knative Based Low Cost Online Application Elastic Auto Scaling
- 20 Quickly Build Jenkins Gitlab Continuous Integration Environment
- 21 Online Application's Serverless Practices
- 22 Deploying Serverless Applications Through ID Emaven Practices
- 23 Enterprise Level Cicd Tools for Deploying Serverless Applications
- 24 How Serverless Applications Manage Persistent Logging Data
- 25 Serverless Application Traffic Load Balancing and Routing Strategy Configuration Practices
- 26 Spring Cloud Dubbo Applications Seamless Migration to Serverless Architecture
- 27 Sae Application Batch Release and Best Practices for Zero Downtime Offline
- 28 How to Easily Handle High Traffic With Sae Elastic Capabilities Through Stress Testing Tools
- 29 Sae Extreme Application Deployment Efficiency
-
- 00 How to Correctly Learn an Open Source Framework for Database Sharding and Table Splitting
- 01 From Theory to Practice How to Make Database Sharding and Table Splitting Truly Effective
- 02 What Kind of Apache Open Source Software Is the Top Level Project Sharding Sphere
- 03 Jdbc Standard Compatibility and the Relationship With Sharding Sphere
- 04 Methods for Integrating Sharding Sphere in Business Systems
- 05 How Is the Configuration System in Sharding Sphere Designed
- 06 How to Implement Database and Table Sharding as Well as Enforce Routing Above
- 07 How to Implement Database and Table Sharding as Well as Enforce Routing Below
- 08 How to Integrate Database and Table Data Into the Master Slave Architecture for Read Write Separation
- 09 How to Use Strong Consistency Transactions and Flexible Transactions in Distributed Transactions
- 10 Data Desensitization How to Ensure Safe Access to Sensitive Data
- 11 Code Governance How to Implement Dynamic Configuration Management in a Distributed Environment
- 12 From Application to Principle How to Efficiently Read the Sharding Sphere Source Code
- 13 How Does Sharding Sphere Implement System Scalability With Microkernel Architecture
- 14 Distributed Main Key What Are the Methods for Implementing Distributed Primary Keys in Sharding Sphere
- 15 Parsing Engine SQL What Core Stages Should the Parsing Process Include Above
- 16 Parsing Engine SQL What Core Stages Should the Parsing Process Include Below
- 17 Routing Engine How to Understand the Operation Mechanism of the Sharding Routing Core Class Sharding Router
- 18 Routing Engine How to Implement Fragment Routing and Broadcast Routing for Data Access
- 19 Routing Engine How to Integrate Various Routing Strategies and Algorithms in the Routing Process
- 20 Rewriting Engine How to Understand the SQL Rewriting Implementation Mechanism Under the Decorator Pattern
- 21 Execution Engine How Should the Overall SQL Execution Process in a Sharded Environment Be Abstracted
- 22 Execution Engine How to Master the Execution Model of Executor in Sharding Sphere Above
- 23 Execution Engine How to Master the Execution Model of Executor in Sharding Sphere Below
- 24 Merging Engine How to Understand the Types of Data Merging and the Implementation Process of Simple Merge Strategies
- 25 Merging Engine How to Understand Stream Merging and in Memory Merging in Complex Merge Scenarios
- 26 Read Write Separation Common Master Slave Architecture and Shard Master Slave Architecture How Are They Implemented
- 27 Distributed Transactions How to Understand the Abstraction Process of Distributed Transactions in Sharding Sphere
- 28 Distributed Transactions How to Integrate Support for Strong Consistency Transactions and Flexible Transactions in Sharding Sphere Above
- 29 Distributed Transactions How to Integrate Support for Strong Consistency Transactions and Flexible Transactions in Sharding Sphere Below
- 30 Data Desensitization How to Implement Low Intrusiveness Data Desensitization Solutions Based on Rewriting Engines
- 31 Configuration Center How to Implement Dynamic Management of Configuration Information Based on Configuration Center
- 32 Registry Center How to Implement Database Access Circuit Break Mechanism Based on Registry Center
- 33 Chain Tracking How to Implement Data Access Chain Tracking Based on Hook Mechanism and Open Tracing Protocol
- 34 System Integration How to Complete the Seamless Integration of Sharding Sphere Kernel With Spring Spring Boot
- 35 Conclusion Summary and Prospects of Sharding Sphere
-
- 00 Introduction to Spark Performance Tuning Master These Pitfalls
- 01 the Necessity of Performance Tuning Why Adjust When Spark Itself Is Fast
- 02 the Essence of Performance Tuning Five Flowers Eight Doors Tuning Techniques to Start With
- 03 Why You Must Understand Rdd Elastic Distributed Datasets
- 04 Dag & Pipelining What Is in Memory Computing
- 05 Task Scheduling System What Does It Mean to Move Data Less and Move Code More
- 06 Storage System Space for Time or Time for Space
- 07 Memory Management Fundamentals How Spark Efficiently Utilizes Limited Memory Space
- 08 Application Development Three Principles How to Expand Your Development Horizon
- 09 Optimization at a Glance Quick Reference Manual to Improve Efficiency by Halving the Effort Part 1
- 10 Optimization at a Glance Quick Reference Manual to Improve Efficiency by Halving the Effort Part 2
- 11 Why Shuffle Is an Unparalleled Performance Killer
- 12 Broadcast Variables How to Counter Shuffle in One Move
- 13 Broadcast Variables Ii How to Let Spark SQL Choose Broadcast Joins
- 14 From the CPU Perspective How to Efficiently Utilize the CPU
- 15 Memory Perspective I How to Maximize Memory Usage Efficiency
- 16 Memory Perspective Ii How to Avoid Cache Saturation Effectively
- 17 Memory Perspective Iii Whose Fault Are Ooms and How to Break Them
- 18 Disk Perspective if Memory Were Unlimited, Would Disk Still Have a Place in Your Arsenal
- 19 Network Perspective How to Effectively Reduce Network Overheads
- 20 Rdd and Data Frame Which Shines Brighter
- 21 Catalyst Logical Planning How Your SQL Statements Are Optimized Part 1
- 22 Catalyst Physical Planning How Your SQL Statements Are Optimized Part 2
- 23 Tungsten Execution Plan What Blessings Does Tungsten Bring to Developers
- 24 Spark 3.0 Feature I Aqe How to Make Good Use of 3 Aqe Characteristics
- 25 Spark 3.0 Feature Ii Dpp How to Use the Dpp Feature
- 26 Join Hints Guide How to Choose Join Strategies in Different Scenarios
- 27 Large Table Joins Small Table What to Do When Broadcast Variables Cannot Fit Small Table
- 28 Large Table Joins Large Table I What Is the Divide and Conquer Tuning Approach
- 29 Large Table Joins Large Table Ii What Is the Negative Scalability Resistance Tuning Approach
- 30 Application Development Analysis of Beijing Minibus Oil Tanker's Shaking Number Trend
- 31 Performance Tuning Hands on Guide You to Improve the Execution Performance of Your Application
- In Depth Interpretation of Spark Job on Spark Ui Part 1
- In Depth Interpretation of Spark Job on Spark Ui Part 2
- Final Exam Spark Performance Tuning 100 Points Test Paper Awaits Your Challenge
- Closing Remarks Be a Determined Learner Before Time
-
- 00 Preface Why Start to Learn Spring Boot From Scratch
- 01 Understanding the Spring Family Ecosystem Correctly
- 02 Case Driven How to Analyze a Spring Web Application
- 03 Multi Dimensional Configuration How to Use the Configuration Hierarchy in Spring Boot
- 04 Custom Configuration How to Create and Manage Custom Configuration Information
- 05 Automatic Configuration How to Understand the Principles of Spring Boot Auto Configuration Correctly
- 06 Basic Norms How to Understand Jdbc Relational Database Access Standards
- 07 Data Access How to Use Jdbc Template to Access the Relational Databases
- 08 Data Access How to Parse the Data Access Implementation Principles of Jdbc Template
- 09 Data Abstraction How to Carry Out Unified Data Access Abstraction With Spring Data
- 10 Orm Integration How to Use Spring Data Jpa to Access Relational Databases
- 11 Service Deployment How to Build a Restful Web Service
- 12 Service Invocation How to Use Rest Template to Consume Restful Services
- 13 Service Invocation How to Understand the Remote Invocation Implementation Principles of Rest Template Correctly
- 14 Message Driven How to Integrate Kafka With Kafka Template
- 15 Message Driven How to Integrate Active Mq With Jms Template
- 16 Message Driven How to Integrate Rabbit Mq With Rabbit Template
- 17 Security Architecture How to Understand the Overall Structure of the Spring Security Framework
- 18 User Authentication How to Build User Authentication System Based on Spring Security
- 19 Service Authorization How to Guarantee Request Security Access Based on Spring Security
- 20 Service Monitoring How to Implement System Monitoring With Actuator Components
- 21 Custom Metrics How to Implement Custom Metrics and Actuator Endpoints
- 22 Run Management How to Use Admin Server to Manage Spring Applications
- 23 Data Testing How to Use Spring Testing Data Access Layer Components
- 24 Service Testing How to Use Spring Testing Web Service Layer Components
- End Statement Ending as the Beginning, Spring Boot Summary and Prospects
-
- 00 Introduction 5 Minutes Easy Understanding of Spring Fundamentals
- 00 Opening Words Stick to Protecting Bom, How to Deal With Spring Layoffs
- 01 Spring Bean Common Definition Errors
- 02 Spring Bean Dependency Injection Common Errors Part 1
- 03 Spring Bean Dependency Injection Common Errors Part 2
- 04 Spring Bean Lifecycle Common Errors
- 05 Spring Aop Common Errors Part 1
- 06 Spring Aop Common Errors Part 2
- 07 Spring Events Common Errors
- 08 Question Scene Spring Core Thoughts Question Collection
- 09 Spring Web URL Resolution Common Errors
- 10 Spring Web Header Resolution Common Errors
- 11 Spring Web Body Transformation Common Errors
- 12 Spring Web Parameter Validation Common Errors
- 13 Spring Web Filters Usage Common Errors Part 1
- 14 Spring Web Filters Usage Common Errors Part 2
- 15 Spring Security Common Errors
- 16 Spring Exception Common Errors
- 17 Question Scene Spring Web Thoughts Question Collection
- 18 Spring Data Common Errors
- 19 Spring Transactions Common Errors Part 1
- 20 Spring Transactions Common Errors Part 2
- 21 Spring Rest Template Common Errors
- 22 Spring Test Common Errors
- 23 Question Scene Spring Supplement Thoughts Question Collection
- Introduction 5 Minutes Easy Understanding of an HTTP Request Handling Process
- Knowledge Review Systematic Debugging Spring Programming Error Roots
- Concluding Words Issue Overall Comparisons of Solutions Method More
-
- 00 Preface Spring Security Ensures the Safety and Career Path of Your Application
- 01 the Top Framework What Kind of Security Framework Is Spring Security
- 02 User Authentication How to Use Spring Security to Build User Authentication System
- 03 Authentication System How to Deeply Understand the Spring Security Authentication Mechanism
- 04 Password Safety Which Encryption and Decryption Techniques Are Included in Spring Security
- 05 Access Authorization How to Effectively Configure the Security Access Process for Requests
- 06 Permission Management How to Analyze the Authorization Principles of Spring Security
- 07 Case Practice Using Spring Security Basic Functions to Protect Web Applications
- 08 Pipeline Filtering How to Extend Security With Spring Security Filters
- 09 Attack Responses How to Implement Csrf Protection and Cross Domain Cors
- 10 Global Methods How to Ensure Security Access at the Method Level
- 11 Case Practice Using Spring Security Advanced Topics to Protect Web Applications
- 12 the Open Protocol Oauth2 What Problems Does the Protocol Solve
- 13 Authorization System How to Construct an Oauth2 Authorization Server
- 14 Resource Protection How to Configure Authorization Process Based on Oauth2 Protocol
- 15 Token Extension How to Use JWT to Implement Custom Tokens
- 16 Case Practice Building Microservice Security Architecture Based on Spring Security and Spring Cloud
- 17 Case Practice Implementing Single Sign on Based on Spring Security and Oauth2
- 18 Tech Trends How to Add Reactive Programming Features to Spring Security
- 19 Test Driven How to Test the Security of the System Based on Spring Security
- 20 Closing Speech the Summary of Learning Spring Security From Beginning to End
-
- 00 Introduction
- 01 Parking Service Business Analysis With a Focus on Actual Market Situations
- 02 Detailed Analysis and Abstract Design of Specific Business Requirements
- 03 the First Spring Boot Microservice Member Service
- 04 How to Maintain API Documentation for External Invocation and Online Interface Document Management
- 05 Understanding Spring Cloud & Spring Cloud Alibaba Projects
- 06 Challenges in Managing Multiple Services and Breaking Service Registry & Discovery
- 07 How to Invoke Services Outside of This Business Module Service Invocation
- 08 Slow Service Responses or Downtime How to Deal With Quick Failure and Service Degradation
- 09 Hot Updates Updating Service Parameters and Cloud Configuration Center
- 10 How to Effectively Read Hot Data Such as Billing Rules Using Distributed Caching
- 11 How to Avoid Duplicate Execution in Distributed Scheduled Tasks Under Multiple Instances
- 12 How a Set of Services Should Adapt to Different End User Requirements
- 14 Spring Cloud vs Dubbo Conflict or Strong Integration
- 15 Addressing Common Issues in Services With Complex Handling Methods via API Gateway
- 16 Service Stress and System Slow Responses How to Break Through Gateway Traffic Control
- 17 How to Perform Security Verification and Unify Authentication After Integrating Gateways
- 18 How to Unify Management of Apis Across Multiple Modules and Aggregate Apis
- 20 How to Avoid Over Distribution With Coupon Redemption Through Distributed Locks
- 21 How to Check the Health Status of Each Service System Application Monitoring
- 22 How to Ensure a Complete Service Chain Path for a Request Tracking Process
- 23 Conclusion
- 13 Adopting Message Driven Environments for Processing Billing Notifications and Integration of Messaging Middleware