Programmers: do not take the initiative to contact a girl you have a chance?

This article comes from know almost popular question, "do not take the initiative to contact a girl you have a chance?" Could have been emotional problems, a study IT-old man answered, look just like the technical terms into a small classroom, do not care about the feelings of the problem, Consider the following technical terminology it.

Vernacular to explain the technical jargon.

Many students on hot standby, cold standby, deep understanding of cloud backup, I look at science various backup IT industry terminology. After Knock jokes.

Suppose you are a sister, you have a boyfriend, the same time you and ambiguous Another guy, better than friends, but not lovers. You can always dump current boyfriend, another can immediately fill. This is a cold backup .

Suppose you are a sister, and while the two men in a relationship, you two are boyfriend. And they also interfered with each other independently. This is the hot backup .

Suppose you are a sister, a boyfriend to give you uneasy sense of security. In the distant boyfriend unknown place, and a boy kept in touch, you tell him you do not have a boyfriend, you are now in the tangle of, once you and your boyfriend separated, you can immediately put their feelings transferred to different places where men go with. This is the off-site disaster recovery .

Suppose you are a sister, have a boyfriend, you have paid the money to a marriage agency, let him help you look good resources, once you and your boyfriend the separate marriage agency immediately to make arrangements for resources, you feelings of uninterrupted operation, which is cloud backup . . . .

Suppose you are a sister, you suspect your boyfriend's loyalty, a treasure in the purchase of a loyalty test services. This is a disaster drill . Friendly reminder, in the absence of backup, disaster drills should not be that bad data will make you lose everything.

Suppose you are a sister, you and your boyfriend long distance relationship, you call every night Chagang, and asked him still loved you, and is called the ping .

Suppose you are a sister, your boyfriend often disappeared, so you want to always grasp his whereabouts, you called him good-based Friends of A, A say good-based Friends of B know, B said that based Friends of C know, C said D-based Friends know, your boyfriend says D are Internet cafes to play games, you finally know where her boyfriend, called TraceRoute .

Suppose you are a sister, your boyfriend addicted to the game often does not answer the phone down for no reason, so when you made an appointment to go shopping in the afternoon from time to time you have to make a phone call to ask, see if he can provide normal service, called Heart Rate Monitor .

Suppose you are a sister, you want to go shopping and your boyfriend A playing games do not answer the phone, shopping Ever since you put the request to the bench boyfriend B, in order to guarantee uninterrupted service operation, called failover.

Suppose you are a sister, you have a lot of things you need to complete a boyfriend, and thus you can not go shopping with a meal A tour description, and B can only accompany you shopping, can not have all the right boyfriend, called master-slave configuration master-slave .

Suppose you are a sister, you lag behind the others too much, that your boyfriend simply too much, so you call to find two boyfriends, one hundred thirty-five single number, two hundred forty-six pairs number lines, thereby reducing the pressure faced by a boyfriend , called load balancing .

Suppose you are a sister and her boyfriend have more, with the heartbeat detection with failover and load balancing will reach the ultimate experience, called cluster LVS , noted that when the case may demand a stand-alone treatment is not recommended to enable clustering, will cause a lot idle resources, increase maintenance costs.

Suppose you are a sister, your increasingly high demand led to a boyfriend cluster has been unable to deal with the reason that you has added several other, called multi-cluster lateral expansion , referred to as multi-cluster grid.

Suppose you are a sister, your boyfriend frail and thus can not meet the demand, and thus you buy a lot boyfriend nourishing products to help you upgrade to improve the unit capacity, called vertical expansion , Scale up. Remember, the cost of vertical expansion will be increasing and more and more obvious effect.

Suppose you are a sister, you often go out to play with her boyfriend, love to the depths of time want to do something but could not tt, go to the supermarket to buy, and thus you often go to where you have placed tt, thus greatly reducing waiting time, called CDN .

Suppose you are a sister, your boyfriend handsome, suave romantic deep pockets to you the only reason that you met with hostility to women of B, B will ask you in the name of a friend boyfriend computer repair, refrigerator repair, take up a lot of time on weekends boyfriend , resulting boyfriend can not serve you, called denial of service attacks, referred to as DOS.

Suppose you are a sister, you are a female hostility because of her boyfriend, but your boyfriend's processing capacity is very strong, the processing speed has been higher than the speed of her request, so she hired a female vote to turn your boyfriend trouble, This is called a distributed denial of service attacks , referred to DDOS .

Suppose you are a sister, you always find a boyfriend in dealing with some insignificant other requests, Ever since you gave her boyfriend a white list, asking him to handle only requests within the white list, and rejects any other unidentified person's request , called access control .

Suppose you are a sister, your boyfriend suave, you always worry that he derailed, so you install a listening device in his possession, which built a number of suspicious girls flirting behavior feature database, as long as there suspected case is hooked, it will to immediately alert you, called intrusion detection system (IDS).

Suppose you are a sister, you improve the above bug, when hooked up to make women suspicious behavior to your boyfriend, the immediate release of 10,000 volts, the suspicious person knocked unconscious, hooked end this. This is called Intrusion Prevention System (IPS).

Suppose you are a sister, though you installed a variety of listening devices, alarms, but your blue friends pull their punches, the alarm ringing, so you could be overwhelmed, exhausted, so you engage in a centralized collection of these devices derailed alarms, carry out comprehensive analysis, report generation derail your boyfriend. This is called SIEM or the SOC .

Suppose you are a sister, you submit reports derailed her boyfriend to his parents, got their support, her boyfriend parents began his strict discipline, rectification, escort your love, so reasonable, legal compliance , called the level of protection .

Suppose you are a sister, you are a bit far away from her boyfriend home, you drive to, is called self-built green , your taxi in the past, called leased lines , you ride a bicycle past Mount worship, called SDWAN.

Suppose you are a sister, love your boyfriend and was opposed both parents, the two sides are not allowed to contact you secretly dug a tunnel, facilitate tryst, called VPN .

Suppose you are a sister, your boyfriend is too good and made man peering reason that they study a little your boyfriend, slightly modified to produce a little bit of a boyfriend B, similar to the 99 percentile your boyfriend, it is not called plagiarism, called reverse engineering , such as plug-in boyfriend.

Suppose you are a sister, you ask your boyfriend adhere to ten minutes, then fifteen minutes and then twenty minutes to test the limits of where your boyfriend, called stress tests.

Suppose you are a sister, in order to ensure the normal operation of your boyfriend reason that you see everyday. He is micro-channel microblogging and other social data to find clues to possible problems, called the data analysis .

Suppose you are a sister, your boyfriend belong to socially active players, know almost every day microblogging micro letter produced a wealth of information, you find yourself analyzing much slower than the speed of his students, Ever since you got your girlfriends together analysis, called parallel computing .

Suppose you are a sister, your boyfriend too can toss pull their punches produce the amount of days to be processed information, you and your girlfriends who have tired of lying did not catch up with the speed of his creation, so you pay for looking on know almost the 20 small partner to help you with the analysis, called cloud computing .

After Suppose you are a sister, you get a boyfriend frequented sites to determine because of the boyfriend is derailed, according to the information called hotel, sensitive periods such as data mining .

Suppose you are a sister, after analyzing data boyfriend, that he has to go out to open room in the afternoon, Ever since you sent him a text message on his ready to go out, asked him if he did not take tt, if you can not buy me , called precision push and in line with data mining.

If you are a sister, your boyfriend out of the total of the waves and all kinds of problems, and thus you rented a house and ready for everything you need and tell him, you do not look after the hotel directly to my house right What are ready, called containers .

If you are a sister, boyfriend and you have to get through once a day interface collect data . 24 hours a day to pick your day, called the real-time data acquisition . You decided to develop a new interface to exchange with her boyfriend, called virtualization . You decide to collect data from different boyfriend who you are large data centers . One day you decide to have a baby, called big data applications . I do not know who the baby is born is called big data desensitization . But from the looks of the baby, black skin, blond hair, is called data fusion cross-domain modeling . You decided to bring this baby exhibition ticket collection points, called Big Data realizable . @ Color from tulips

Focus on micro-channel public number [chi] programmers live, do not miss a thing fresh internet!

 
Published 38 original articles · won praise 742 · views 30000 +

Guess you like

Origin blog.csdn.net/cxyshenghuozhi/article/details/103767165