• Technology sharing | MySQL uses the MariaDB audit plug-in


    Author: Yao yuanFocus on Oracle, MySQL database for many years, Oracle 10g and 12C OCM, MySQL 5.6, 5.7, 8.0 OCP. Now, Dingjia technology works as a consultant to improve database training and technical support services for colleagues and customers.Source: original contribution*The original content is not allowed to be used without authorization. Please contact Xiaobian for […]

  • Detailed explanation of HBase basic principle


    Introduction to HBase HBase is a distributed, column oriented open source database. Built on HDFS. The source of the name of HBase is Hadoop database, or Hadoop database. The computing and storage capacity of HBase depends on Hadoop cluster. It is between NoSQL and RDBMS. It can only retrieve data through row key and range […]

  • The threshold of programming


    Why is it that sometimes for new people, the most important requirement is the so-called love of programming? Because programming really needs a certain threshold, if not, it can be accumulated slowly with time. But if they don’t love each other, it won’t take time to reach the threshold.Common thresholds1. Grammar, which requires certain logical […]

  • Deep residual shrinkage network


    In this paper, a new deep learning algorithm deep residual shrinkage network is discussed. 1. The basis of deep residual shrinkage network It can be seen from the name that the deep residual shrinkage network is an improved method of the deep residual network. Its feature is “shrinkage”, which refers to soft thresholding, which is […]

  • Deep learning: understanding the deep residual shrinkage network in 10 minutes


    RESNET, a residual network, has won the best paper award of IEEE Conference on computer vision and pattern recognition in 2016, with 38295 academic citations in Google. Deep residual shrinkage network is an improved version of deep residual network, which is actually the integration of deep residual network, attention mechanism and soft threshold function. To […]

  • Trigger mechanism of memstore in HBase


    Because the data storage of HBase uses HDFS, and HDFS does not support random reading and writing, so the data writing of HBase adopts LSM algorithm. LSM algorithm is generally divided into memory and disk to store data. In the implementation of HBase, the memory part is called memstore, which adopts jump table to maintain […]

  • Is there a new variant of CNN that can improve the accuracy of the model?


    Is there a new variant of CNN that can improve the accuracy of the model? -Amaze2’s answer – Zhihu https://www.zhihu.com/question/397944899/answer/1314983195 We can just introduce a one-dimensional CNN model called deep residual shrinkage networks. The deep residual shrinkage network is originally used in fault diagnosis based on one-dimensional vibration signal, which is an improvement of the […]

  • Simple eigenvalue gradient pruning, 4-5 times training acceleration on CPU and arm | ECCV 2020


    In this paper, the DBTD method is used to calculate the filtering threshold, and then the random pruning algorithm is used to prune the eigenvalue gradient. The sparse eigenvalue gradient can reduce the amount of calculation in the return phase. The training on CPU and arm has 3.99 times and 5.92 times acceleration effect respectively  […]

  • [spark series 3] spark 3.0.1 AQE analysis


    Introduction to AQE fromspark configurationAs early as in spark version 1.6, AQE has been established; in spark version 2. X, Intel big data team has carried out corresponding prototype development and practice; in spark 3.0 era, databricks and Intel have contributed new AQE to the community together Configuration of AQE in spark 3.0.1 Configuration item […]

  • ThreadLocal source code analysis


    ThreadLocal What is it? First of all, from the name, it means thread local. You can think that all threads in ThreadLocal belong to the thread itself. In fact, the ThreadLocal object can provide thread local variables. ThreadLocal creates a copy of the variables in each thread, and each thread can access its own internal […]

  • Yixin’s 105 database rules


    Abstract: This paper introduces the 105 database military regulations of Yixin, which helps the R & D team to evaluate the quality of database development and achieve the goal of finding and solving problems as soon as possible. As a financial technology enterprise, a large number of businesses of Yixin rely on databases. How to […]

  • Springcloud Chapter 8: hystrix fusing mechanism (5)


    1: Overview of avalanche effect When multiple microservices are called, it is assumed that microservice a calls microservice B and microservice C, and microservice B and microservice C call other microservices. This is called “fan out”. If the response time of a microservice call on the fanout link is too long or unavailable, the call […]