Detailed explanation of Java RMI based on distributed architecture

Distributed architecture infrastructure: detailed explanation of Java RMI Introduction to RMI Java RMI, remote method call( Remote Method Invocation ), a method for implementing remote procedure calls (RPCs) (Remote procedure call) Java API, which can directly transfer serialized Java objects and Distributed garbage collection . Its implemen ...

Posted by ljCharlie on Sun, 12 Dec 2021 10:05:43 +0100

Implementing Redis distributed lock from zero to one coding

Some students are so pissing. You can understand it. If you don't do it yourself, how can you understand it thoroughly? Let's do it together! Usage scenario and model selection The distributed multi node deployment mode makes it possible for shared variables to be operated at the same time. In case of data consistency requirements, global loc ...

Posted by phifgo on Thu, 09 Dec 2021 07:03:02 +0100

zookeeper command line operation

1. Command line syntax Basic command syntaxFunction descriptionhelpDisplay all operation commandsls pathUse the ls command to view the child nodes of the current znode - w: listen for child node changes - s additional secondary informationcreateNormal creation - s contains sequence - e: temporary (restart or timeout disappears)get pathGet the ...

Posted by douga on Mon, 06 Dec 2021 05:50:28 +0100

Blog recommendation | zero experience play isolation strategy: multiple Pulsar clusters

Warm tip: This is the "Pulsar fool's Manual", with zero experience, small white pit lightning protection. As long as you follow the instructions, the success rate is 100%!This article is the second in the Pulsar isolation strategy series. The first blog in this series -   "How to realize isolation in Pulsar by deep resolutio ...

Posted by YourNameHere on Mon, 29 Nov 2021 13:40:58 +0100

Spring Cloud Alibaba technology stack

Spring Cloud Alibaba Dubbo 1, Project introduction Dubbo Spring Cloud is developed based on Dubbo Spring Boot 2.7.1 and Spring Cloud 2.x. whether the developer is a Dubbo user or a Spring Cloud user, it can be easily controlled and the application can be migrated upward at a cost close to "zero". Dubbo Spring Cloud is committed to s ...

Posted by jaygattis on Mon, 29 Nov 2021 06:29:06 +0100

Java policy pattern of Java proxy pattern

Java policy pattern In strategy pattern, the behavior of a class or its algorithm can be changed at run time. This type of design pattern belongs to behavioral pattern. In the policy pattern, we create objects representing various policies and a context object whose behavior changes with the change of policy objects. The policy object changes ...

Posted by BRUUUCE on Sun, 28 Nov 2021 06:15:41 +0100

MySQL index -- how to improve query speed

What is the index? If you have been to the library, you should know the library's retrieval system. The library has prepared a search catalogue for books, including book name, book number and corresponding location information, including which area, shelf and floor. We can quickly know the location of books and get the books we need through th ...

Posted by xXx_Hobbes_xXx on Fri, 26 Nov 2021 16:21:40 +0100

Design and implementation of proxy gateway (based on NETTY)

Introduction: This paper focuses on the design and implementation of proxy gateway itself, rather than the management and maintenance of proxy resources.Author Xin RanSource: Ali technical official accountI. problem backgroundThe platform side purchases a number of naked agents to advertise, show and audit in different places. Agents purchased ...

Posted by disenopop on Fri, 26 Nov 2021 05:20:25 +0100

Application of cache and distributed lock

Application of cache and distributed lock 1. Cache application Cache usage scenario: In order to improve the system performance, we usually put some data into the cache to speed up access, while the database only undertakes the data dropping work So what data is suitable for caching? The requirements for immediacy and data consistency are n ...

Posted by billynastie2007 on Mon, 22 Nov 2021 15:33:09 +0100

Second shallow encapsulation practice in microservice architecture

1, Background introductionThere are many split services in the distributed system. In the process of continuous iterative upgrading, the following common thorny situations will occur:For the version upgrade of a technical component, depending on the package upgrade leads to the expiration of some syntax or API, or the component fixes urgent vul ...

Posted by pohopo on Mon, 22 Nov 2021 01:25:14 +0100