Achieve multiple solutions for session sharing

Session sharing Why is there session sharing At present, most of the projects of Internet companies are built in a micro-service Huahe distributed environment. This will lead to a project being likely to be distributed and deployed in several or even many server clusters. At this time, a problem will arise. When a user has […]

Write static library (ar, package), write dynamic library (sharing principle, -fPIC, -shared), install static library (system path (library name)/specified path (-I, -L option)), install dynamic library ( ldd,-static, tells the loader the path to search

Table of Contents How to write a library static library Introduction — static library principle form static library introduce ar Options Create static library Add files to existing static library After we have a library, how should we give it to others? dynamic library The difference between static library and dynamic library linking static library […]

Sharing jupyter between python and R is not successful at the moment–The letter makes me miserable, I will stay with you forever

conda creates an R environment: conda create -n lry_R4.2.2 conda activate lry_R4.2.2 conda install -c conda-forge r-base=4.2.2 After installation, enter R to run R. Exit and enter q(); In the R environment, you can install the corresponding R package. The corresponding R package can be installed in the R environment. Or use conda to install, […]

[Multi-threading] The concept of threads {heap area management in the Linux kernel; conversion of virtual addresses to physical addresses, pages, page frames, page tables, MMU memory management units; Linux thread concepts, lightweight processes; thread sharing processes Resources; Advantages and Disadvantages of Threads; Purpose of Threads}

1. Supplementary content 1.1 Heap area management in Linux kernel vm_area_struct (VMA) is a data structure in the Linux kernel, which represents a heap memory area in the process virtual memory space. It is used to track various properties and information about the heap memory area, such as starting and ending addresses, permissions, flags, and […]

Hand-shredded event bus and second global data sharing library

A global data sharing tool based on event bus Take you to hand-write event bus and encapsulate global data sharing library Comments are articles EventBus //Global event bus // Author:coderwhy(mentor) // Rewrite:coderJoon(little fan) class EventBus {<!– –> constructor() {<!– –> // Object to store events this.EventBus = {<!– –>}; } /** * Listen for events […]

4.11.7-Testing_Cross_Origin_Resource_Sharing

Testing Cross Origin Resource Sharing ID WSTG-CLNT-07 Summary Cross Origin Resource Sharing (CORS) is a mechanism that enables a web browser to perform cross-domain requests using the XMLHttpRequest (XHR) Level 2 (L2) API in a controlled manner. In the past, the XHR L1 API only allowed requests to be sent within the same origin as […]

Use the Redis publish-subscribe model to implement session sharing

In fact, it is not to realize session sharing, but to use redis publish and subscribe, so that all cluster servers can send messages to their own sessions. For example, if userId is on the 35th server and there are 100 servers, then the first server receives the message and needs to notify userId. Instead […]

Build a shared disk (iscsi disk sharing)

1. Overview of iscsi disk sharing The implementation principle of iSCSI disk sharing is mainly based on iSCSI Target software and TCP/IP network protocol. The storage space of the server is allocated to the client. The client can use the iSCSI disk like a local hard disk, including partitioning and formatting it. And reading and […]

Principle, construction and code implementation of linear secret sharing scheme based on sharing matrix

1 Linear secret sharing scheme Linear secret sharing scheme is an encryption technology used to split a secret message into multiple fragments and distribute these fragments to multiple participants. Only when a sufficient number of participants cooperate, the complete secret information can be restored Secret information. The basic principle of linear secret sharing scheme is […]