I understand the distributed system. I have everything you need to know

Preface When it comes to distributed systems, we have to say centralized systems. In the traditional centralized system, everything in the whole project is in one application. A website is an application. When the system is under great pressure, it can only expand horizontally, add multiple servers or ...

Posted on Sun, 16 Feb 2020 00:26:05 -0800 by scottchr226

[Enjoy Feign]10. Enable Feign to naturally support POJO encoding and decoding using feign-jackson module

"Flexibility is overestimated - constraints are liberation," says the Redis author. ->Return to Column Directory <- Code download address: https://github.com/f641385712/feign-learning Catalog Preface text feign-jackson Solution Option 1: Manual encoding (serialization) Scenario 2: ...

Posted on Fri, 14 Feb 2020 20:47:50 -0800 by KaFF

FFmpeg audio player - create FFmpeg player

Original address: https://www.jianshu.com/p/73b0a0a9bb0d Related articles 1. FFmpeg audio decoding and playing---- https://www.jianshu.com/p/76562aba84fb 2. Playing music files through FFMpeg---- https://blog.csdn.net/chenhy24/article/details/84201421 3. ffmpeg command operation audio format conv ...

Posted on Wed, 12 Feb 2020 00:46:45 -0800 by tmed

Deal with Mina's package sticking and package breaking (with complete instance, client and server)

1. What is broken package and sticky package? Before talking about breaking and sticking packets, we first talk about message protection boundary and no message protection boundary. 1. Protected message boundary means that the transmission protocol transmits data as an independent message on the Internet, and the receiver can only receive indep ...

Posted on Wed, 29 Jan 2020 00:38:55 -0800 by kamasheto

Why not use Java serialization framework at the bottom of RPC framework?

Recently, I am learning RPC related knowledge. Since it is a remote procedure call, it will involve the problem of transmission on the network. I found that the common RPC framework does not use Java Native serialization mechanism. Let's record the disadvantages of Java sequential words. 1, Disadvanta ...

Posted on Mon, 20 Jan 2020 05:40:47 -0800 by tomtimms

Using Feign to send http request and source code analysis

Using Feign to send http request and source code analysis brief introduction Feign is a lightweight framework for HTTP request calling, which can call HTTP request by java interface annotation instead of directly calling by encapsulating HTTP request message in Java. Annotation annotation Scope ...

Posted on Wed, 15 Jan 2020 02:40:17 -0800 by Greaser9780

Several common encryption algorithms

I. concept       data encryption The basic process is to press some algorithm To make it unreadable code is "ciphertext", so that it can only input the corresponding secret key After that, we can show the original content and protect the data from being stolen and read by illegal people. T ...

Posted on Sun, 12 Jan 2020 22:57:39 -0800 by docmattman

Python string common operations

Python string considerations Python strings cannot be changed. After updating a string, you need to put it into another variable Python does not support data types of char type, that is, data of single character type. Common built-in functions for Python strings encode(encoding='UTF-8',errors='strict') Encode the string in the encoding format ...

Posted on Mon, 23 Dec 2019 11:51:32 -0800 by mikewhy

Netty application example websocket application example

1. server implementation Source code implementation: public void run(int port){ EventLoopGroup bossGroup = new NioEventLoopGroup(); EventLoopGroup workGroup = new NioEventLoopGroup(); try{ ServerBootstrap b = new ServerBootstrap(); b.group(bossGroup, workGroup) .channel(NioServerSocketChannel.class) ...

Posted on Tue, 03 Dec 2019 16:39:40 -0800 by madhukar_garg

Common encryption and decryption -- Digital Signature

Original link: https://www.dubby.cn/detail.html?id=9125 Previously Common encryption and decryption (1) The message digest is mentioned in it. What's the difference between the digital signature and the message digest? In fact, a digital signature is a message digest with asymmetric encryption. The purpose of message digest is to ...

Posted on Sun, 01 Dec 2019 12:02:13 -0800 by Labbat