1.3 Go practices in TiDB 姚维
Agenda ● How to build a stable database ○ Schrodinger-test platform ○ Failpoint injection ○ Goroutine-leak detection ● Optimization ○ Chunk vs interface{} ○ Vectorized execution TiDB Overview TiDB TiDB TiDB goroutine leak What is goroutine leak? func main() { go func() { // Just invalid the deadlock detection. for { time.Sleep(1 * time.Second) } }() done := make(chan bool) leakCh := make(chan string, 1)0 码力 | 32 页 | 1.76 MB | 6 月前3Contracts for C++
std::source_location location() const noexcept; const char* comment() const noexcept; detection_mode detection_mode() const noexcept; evaluation_semantic semantic() const noexcept; assertion_kind std::source_location location() const noexcept; const char* comment() const noexcept; detection_mode detection_mode() const noexcept; evaluation_semantic semantic() const noexcept; assertion_kind std::source_location location() const noexcept; const char* comment() const noexcept; detection_mode detection_mode() const noexcept; evaluation_semantic semantic() const noexcept; assertion_kind0 码力 | 181 页 | 4.44 MB | 5 月前3Oracle VM VirtualBox 4.3.36 User Manual
ballooning control . . . . . . . . . . . . . . . . . . . . . . . . . 191 9.21.2 Host isolation detection . . . . . . . . . . . . . . . . . . . . . . . . . . . 192 9.21.3 More information . . . . . . . installer will add several device drivers to the Windows driver database and then invoke the hardware detection wizard. Depending on your configuration, it might display warnings that the drivers are not digitally CD-ROM”, irrespective of the current configuration of the virtual drive. This is to prevent hardware detection from being triggered in the guest operating sys- tem every time the configuration is changed. The0 码力 | 380 页 | 3.79 MB | 6 月前3Oracle VM VirtualBox 4.2.32 User Manual
ballooning control . . . . . . . . . . . . . . . . . . . . . . . . . 182 9.22.2 Host isolation detection . . . . . . . . . . . . . . . . . . . . . . . . . . . 183 9.22.3 More information . . . . . . . installer will add several device drivers to the Windows driver database and then invoke the hardware detection wizard. Depending on your configuration, it might display warnings that the drivers are not digitally CD-ROM”, irrespective of the current configuration of the virtual drive. This is to prevent hardware detection from being triggered in the guest operating sys- tem every time the configuration is changed. The0 码力 | 348 页 | 5.93 MB | 6 月前3Unity for Human Beings
now cover the basics. The basics will cover first person view, third person view, and collision detection. As usual my tutorials will be broken down into several sections. First section will cover what person view is and how to achieve it using code. The third and final section is all about collision detection in 3D. As a warning to all of my readers do not to use the code provided in a game of their own behind the player model. This method’s concerns are where the character is facing and collision detection. Another method is the overhead view. The overhead view does not care whether the player is facing0 码力 | 239 页 | 27.39 MB | 10 月前3OpenAI 《A practical guide to building agents》
21 22 23 24 25 from import from import class str async def ( "Churn Detection Agent" "Identify if the user message indicates a potential customer churn risk." agents Agent is_churn_risk: reasoning: churn_detection_agent = Agent( name= , instructions= , output_type=ChurnDetectionOutput, ) @input_guardrail churn_detection_tripwire( bool 28 A practical Agent, | [TResponseInputItem] ) -> GuardrailFunctionOutput: result = Runner.run(churn_detection_agent, , context=ctx.context) GuardrailFunctionOutput( output_info=result.final_output0 码力 | 34 页 | 7.00 MB | 5 月前3Oracle VM VirtualBox 4.1.40 User Manual
installer will add several device drivers to the Windows driver database and then invoke the hardware detection wizard. Depending on your configuration, it might display warnings that the drivers are not digitally CD-ROM”, irrespective of the current configuration of the virtual drive. This is to prevent hardware detection from being triggered in the guest operating sys- tem every time the configuration is changed. The unless you know what you’re doing. • The osdetect command makes the VMM’s debugger facility (re-)detection the guest oper- ation system. This corresponds to the detect command in the debugger. • The osinfo0 码力 | 310 页 | 4.87 MB | 6 月前3Robotics at Compile-Time: Optimizing Robotics Algorithms with C++'s Compile-Time Features
operator()(double value){ return std::clamp(value, limits_.lower, limits_.upper); } };Collision Detection • Need to decide in real-time: is the robot colliding with itself • Each physical link is represented represented by one or more collision shapes • O(n^2) or O(n log n)Collisions with ShapesCollision Detection at Runtime With Ranges auto is_in_collision = [](const ShapeWithPose& shape1, const ShapeWithPose& | std::ranges::transform(is_in_collision_tuple) | std::ranges::none_of; }Collision Detection at Compile Time bool is_in_collision( const BoxWithPose& shape1, const SphereWithPose& shape2){0 码力 | 45 页 | 20.73 MB | 5 月前3LLVM's Realtime Safety Revolution: Tools for Modern Mission Critical Systems
code runs faster than allotted time. ● No detection of hand-written assembly system calls. ● Not all libc wrapper functions implemented. ● No detection of nondeterministic loops. ○ Infinite loops code runs faster than allotted time. ● No detection of hand-written assembly system calls. ● Not all libc wrapper functions implemented. ● No detection of nondeterministic loops. ○ Infinite loops existing sanitizers (RTSAN_OPTIONS) ○ Adding “continue mode” ○ Suppression lists ● Later ○ Detection of nondeterministic loops ● Someday? ○ Windows support ○ Android/iOS support ○ Other architectures0 码力 | 153 页 | 1.38 MB | 5 月前3The DevOps Handbook
loops i. Enable working towards shared goals ii. See problems as they occur iii. Enable quick detection & recovery iv. Ensure features operate as intended and achieve organizational goals 2. Ch. 14 most severe incident in recent past. 2. Create list of telemetry that could have enabled earlier detection and diagnosis as well as confirmation 3. For each metric, configure alerts when metric deviates curve) so standard deviations will likely over or under alertd. USING ANOMALY DETECTION TECHNIQUES i. Anomaly detection is “the search for items or events which do not conform to an expected pattern0 码力 | 8 页 | 24.02 KB | 5 月前3
共 112 条
- 1
- 2
- 3
- 4
- 5
- 6
- 12