- Self introduction.
- The main direction of the future
- Introduce the optimization points used in previous projects 、 difficulty
- Why not use a lot of goroutine
- gpm Model
- go Inside goroutine Is there a limit on the number of creation ?
- What's the difference between threads and coroutines
- golang What concurrency mechanisms are supported
- go utilize channel Mode of communication
- Buffered and unbuffered channel The difference between
- channel Realization principle
- By close Of channel What's the problem
- What do distributed locks know ? use channel How to achieve ?
- For cluster channel How to implement distributed locks
- parallel goroutine How to achieve
- go How to ensure the safety of concurrency by sharing memory ?
- go Is your lock reentrant ?
- Will you wait until you get the lock ?
- How to achieve a timeout Lock of ?
- go How slicing is implemented
- It mainly uses redis What functions are implemented
- How to solve cache penetration
- Common current limiting algorithms
- What is the difference between a token bucket and a leaky bucket
- How do different services communicate
- once rpc What process to go through
- rpc How the framework does performance tuning
- Which have been used? rpc frame
- Talk about fusing 、 Current limiting 、 Downgrade 、 An avalanche
- Do you know which open source frameworks ?
- docker What's the difference between virtual machine and virtual machine
- serviceMash To solve any problem ?
- devops What are the related technologies
当前位置:网站首页>[issue 18] share a Netease go experience
[issue 18] share a Netease go experience
2022-07-06 14:23:00 【GOLANG_ ROADMAP】
边栏推荐
- AQS details
- [VMware abnormal problems] problem analysis & Solutions
- JDBC看这篇就够了
- 1143_ SiCp learning notes_ Tree recursion
- Strengthen basic learning records
- 强化学习基础记录
- Apache APIs IX has the risk of rewriting the x-real-ip header (cve-2022-24112)
- Canvas foundation 1 - draw a straight line (easy to understand)
- 浅谈漏洞发现思路
- Mathematical modeling idea of 2022 central China Cup
猜你喜欢
强化学习基础记录
On the idea of vulnerability discovery
Intranet information collection of Intranet penetration (5)
Strengthen basic learning records
Library management system
内网渗透之内网信息收集(一)
Attack and defense world misc practice area (simplerar, base64stego, no matter how high your Kung Fu is, you are afraid of kitchen knives)
记一次api接口SQL注入实战
sqqyw(淡然点图标系统)漏洞复现和74cms漏洞复现
Attach the simplified sample database to the SQLSERVER database instance
随机推荐
Detailed explanation of network foundation routing
The United States has repeatedly revealed that the yield of interest rate hiked treasury bonds continued to rise
xray与burp联动 挖掘
Intranet information collection of Intranet penetration (I)
Tencent map circle
Captcha killer verification code identification plug-in
HackMyvm靶机系列(2)-warrior
强化学习基础记录
Simply understand the promise of ES6
Network layer - simple ARP disconnection
Intranet information collection of Intranet penetration (4)
Only 40% of the articles are original? Here comes the modification method
Detailed explanation of three ways of HTTP caching
Constants, variables, and operators of SystemVerilog usage
Sword finger offer 23 - print binary tree from top to bottom
Harmonyos JS demo application development
Solutions to common problems in database development such as MySQL
Experiment five categories and objects
中间件漏洞复现—apache
7-11 mechanic mustadio (PTA program design)