It is common to use redis as a cache, but there may be a series of problems after using redis, especially when the amount of data is large. Some classical problems are as follows:
(1) Data consistency between caches and databases
Distributed environments (not to mention stand-alone) are very prone ...
Posted on Wed, 14 Aug 2019 02:24:21 -0700 by Rodis
net start mysql
mysql -u root -p
Item 10: Employees with the highest salaries in all departments
Create an Employee table that contains all employee information, each employee has ...
Posted on Tue, 13 Aug 2019 05:24:07 -0700 by yaba
Public Configuration application.yml
👉 Official Full Configuration for SpringBoot
Tomcat related configuration
context-path: project access path
max-threads:tomcat thread pool size setting
min-spare-threads: number of to ...
Posted on Mon, 12 Aug 2019 09:13:30 -0700 by mjs87
Introduction to MySQL Binlog
What is binlog?
A binary log that records SQL statements that make or potentially change to data and is saved on disk as a result.
What is the role of binlog?
There are three main uses:
Data replication (master-slave synchronization)
Mysql's Master-Slave protocol enables Slave to achieve data consistency by listeni ...
Posted on Sat, 10 Aug 2019 22:39:15 -0700 by frikus
Normally, each developer will discuss the optimization of sql when there is a large amount of data.But not everyone has 100w of data to use for actual combat, so today we'll start by simulating a table of 100w of data.
In fact, there are many ways to create, fast and slow.This blog is certainly not the fastest one to writ ...
Posted on Sat, 10 Aug 2019 21:42:21 -0700 by Rupo
The ceph-kvstore-tool is used to obtain key-value metadata stored in a leveldb or rocksdb database.And the tool can configure the data in kvstore as if it were operating osd map on an offline osd
Using this tool, you need to i ...
Posted on Fri, 09 Aug 2019 19:37:09 -0700 by abid786
Bean s are often used to configure relevant information or to rely on injection to prevent hard coding and better unit testing.
Bean management is done by Spring. When a Bean object is needed, Spring intercepts your request and returns the existing Bean object to you instead of creating a new object ...
Posted on Fri, 09 Aug 2019 02:20:56 -0700 by vietnamese
There's always been a catch-up with your blog site, and then you find that article editing can cause a lot of problems if you just use text editing, so you decide to look for data and have a third-party open source Markdown editor built in.Ultimately, I chose editor.md.
Show me the final result.
Say no ...
Posted on Thu, 08 Aug 2019 19:40:07 -0700 by parka
1. Target Scene
I don't know if you've had any experience. I want to contact a friend who hasn't been in touch for a long time. I find that the other party deleted you a long time ago and you don't know anything about it.
It's so young and naive to believe that everyone has some "zombie powder" ...
Posted on Wed, 07 Aug 2019 23:17:24 -0700 by captain_scarlet87
Compare addresses, String overrides methods, and compares values.
Print object attribute information (class name and hexadecimal hascode)
The hash code value of the acquired object can be used as the identity card (unique identifier) of the current object in ...
Posted on Wed, 07 Aug 2019 02:46:41 -0700 by HA7E