SEARCH KEYWORD -- SERVICE DOWN



  etcd installation and usage

etcd is an open source and highly available distributed key-value storage system and is commonly used in critical data storage and service discovery and registration use cases. It is focusing on: Simple: well-defined, user-facing API (gRPC) Secure: automatic TLS with optional client cert authentication Fast: benchmarked 10,000 writes/sec Reliable: properly distributed using Raft etcd and Redis both support key-value storage and can be set up in distributed systems. Also Redis supporst more key...

   ETCD,TUTORIAL,RAFT,DISTRIBUTED SYSTEM     2021-03-07 03:10:33

  Multi-master,NoSQL and MySQL

The MySQL family has been innovating rapidly. New features need names and sometimes those names are confusing. Describing something as multi-master or a NoSQL solution has confused me.Multi-master requires one of conflict prevention, conflict resolution or faith. MySQL Cluster provides both conflict prevention and resolution as described in these great posts. Regular MySQL has minimal support for conflict prevention (auto-increment-offset can prevent insert conflict...

   MySQL,NoSQL,Comparison,RANT,Master     2011-10-17 11:30:42

  Products born for Cloud

Cloud computing has become increasingly popularity among companies. It greatly saves the investment of infrastructure and training with everything is running on cloud, it also improves the accessibility and flexibility of service provided by companies. With its popularity, many products are born or becoming popular to help build and move the apps to the cloud. Some well known names of these products are Vagrant, Docker/LXC, Chef and OpenStack. These tools can help create, test and deploy applica...

   Cloud,Openstack,Docker,Vargrant,LXC,Chef     2015-01-25 02:27:11

  8 Things To Love & Hate About Outsourcing Employees

What is the dirtiest word in business? Chances are that the word ‘outsourcing’ comes to mind. Many Americans despise it, many business owners shy away from it and many entrepreneurs depend on it. Regardless of what side of the issue you are on, it is important to know that it exists and will continue to exist. Why? Because there are a lot of things to love about outsourcing.As a business owner and tech entrepreneur who exists in a hyper-competitive market, I have used outsourcing to...

   Employee,Outsourcing,Merits,Disadvantage     2011-11-12 10:16:13

  Linux Clock : CST,UTC and NTP setup

1. There is an option when you set up clock on installing Linux: system clock users UTC, so what does UTC mean? It's Universal Time Coordinated(UTC), there are two different times in GPS system: one is UTC , the other one is LT(Local Time). The difference between these two is just the timezone difference, UTC is the time in timezone 0. If the local time in Beijing is 8 o'clock in the morning, then UTC time is 0 o'clock, which is a 8 hour difference. 2. In Linux, when we use date to check the tim...

   Linux,Clock,UTC     2013-03-21 12:19:30

  The Greatest Hacks of All Time

Reader's advisory: Wired News has been unable to confirm some sources for a number of stories written by this author. If you have any information about sources cited in this article, please send an e-mail to sourceinfo[AT]wired.com. In 1972, John T. Draper discovered he could make free long-distance phone calls using a whistle from a Cap'n Crunch cereal box. The whistle emitted a 2,600-hertz tone that got him into the internal authorization system at the phone company. With another noi...

   Hack,Greatest,All time     2012-02-29 05:05:42

  How Do I Enable Remote Access To MySQL Database Server?

By default remote access to MySQL database server is disabled for security reasons. However, some time you need to provide remote access to database server from home or a web server. If you want to remotely access to the database server from the web server or home, follow this quick tutorial.MySQL Remote AccessYou need type the following commands which will allow remote connections.Step # 1: Login Using SSH (if server is outside your data center)First, login over ssh to remote MySQL database ser...

   MySQL,Remote access,Enable,Host or webdomain     2011-10-31 00:31:41

  Some measures for improving Linux server security

The hackers often exploit server weakness to gain access control to some servers. With a scanner, aimlessly looking undefended host, backdoor, control, and sold to people in need. Some basic security measures can be taken on Linux servers to avoid being attacked by hackers. Disable root remote login As the default administrative account, root is the account which is most likely to be attacked.Disabling ssh remote login is necessary. Method: Edit / etc / ssh / sshd_config PermitRootLogin no At t...

   Linux server,Server security     2012-08-21 05:08:50

  Cracking the Data Lineage Code

What is Data Lineage?  Data lineage describes the life-cycle of data, from its origins to how it is manipulated over time until it reaches its present form. The lineage explains the various processes involved in the data flow of an organization and the factors that influence each process. In other words, data lineage provides data about your data.  Data lineage helps organizations of all sizes handle Big Data, as finding the creation point of the data and its evolution provides valuabl...

   BIG DATA, DATA LINEAGE,BUSINESS     2019-08-08 12:41:42

  The Golden Age of Design in Startups

I just returned from Dave McClure’s excellent Warm Gun Conference, and I haven’t been this excited to be a designer in a while. The entire event was about design, metrics, and products, and even more importantly the people at the conference were many of the who’s who in Bay Area design. From what I saw and experienced there I daresay there are signs we’re entering a golden age of Design. The evidence: 1. The startups being invested in are designer-led. Take the...

   Designer,Golden age,Startup,Talent,Founder     2011-12-05 12:35:33