Tornado 6.2 Documentation
decorated coroutines How it works How to call a coroutine Coroutine patterns Calling blocking functions Parallelism Interleaving Looping Running in the background Queue example - a concurrent web spider why CPU blocking must be taken as seriously as other kinds of blocking, consider password hashing functions like bcrypt [http://bcrypt.sourceforge.net/], which by design use hundreds of milliseconds of CPU background before triggering some future action in the application (as opposed to normal synchronous functions, which do everything they are going to do before returning). There are many styles of asynchronous0 码力 | 407 页 | 385.03 KB | 1 年前3
Tornado 6.5 Documentationdecorated coroutines How it works How to call a coroutine Coroutine patterns Calling blocking functions Parallelism Interleaving Looping Running in the background Queue example - a concurrent web spider why CPU blocking must be taken as seriously as other kinds of blocking, consider password hashing functions like bcrypt [http://bcrypt.sourceforge.net/], which by design use hundreds of milliseconds of CPU background before triggering some future action in the application (as opposed to normal synchronous functions, which do everything they are going to do before returning). There are many styles of asynchronous0 码力 | 437 页 | 405.14 KB | 3 月前3
Tornado 6.4 Documentation
decorated coroutines How it works How to call a coroutine Coroutine patterns Calling blocking functions Parallelism Interleaving Looping Running in the background Queue example - a concurrent web spider why CPU blocking must be taken as seriously as other kinds of blocking, consider password hashing functions like bcrypt [http://bcrypt.sourceforge.net/], which by design use hundreds of milliseconds of CPU background before triggering some future action in the application (as opposed to normal synchronous functions, which do everything they are going to do before returning). There are many styles of asynchronous0 码力 | 432 页 | 402.58 KB | 1 年前3
Tornado 6.4 Documentation
decorated coroutines How it works How to call a coroutine Coroutine patterns Calling blocking functions Parallelism Interleaving Looping Running in the background Queue example - a concurrent web spider why CPU blocking must be taken as seriously as other kinds of blocking, consider password hashing functions like bcrypt [http://bcrypt.sourceforge.net/], which by design use hundreds of milliseconds of CPU background before triggering some future action in the application (as opposed to normal synchronous functions, which do everything they are going to do before returning). There are many styles of asynchronous0 码力 | 432 页 | 402.58 KB | 1 年前3
Tornado 6.4 Documentation
decorated coroutines How it works How to call a coroutine Coroutine patterns Calling blocking functions Parallelism Interleaving Looping Running in the background Queue example - a concurrent web spider why CPU blocking must be taken as seriously as other kinds of blocking, consider password hashing functions like bcrypt [http://bcrypt.sourceforge.net/], which by design use hundreds of milliseconds of CPU background before triggering some future action in the application (as opposed to normal synchronous functions, which do everything they are going to do before returning). There are many styles of asynchronous0 码力 | 432 页 | 402.58 KB | 1 年前3
Tornado 6.3 Documentation
decorated coroutines How it works How to call a coroutine Coroutine patterns Calling blocking functions Parallelism Interleaving Looping Running in the background Queue example - a concurrent web spider why CPU blocking must be taken as seriously as other kinds of blocking, consider password hashing functions like bcrypt [http://bcrypt.sourceforge.net/], which by design use hundreds of milliseconds of CPU background before triggering some future action in the application (as opposed to normal synchronous functions, which do everything they are going to do before returning). There are many styles of asynchronous0 码力 | 423 页 | 398.18 KB | 1 年前3
Tornado 4.5 Documentation
it works How to call a coroutine Coroutine patterns Interaction with callbacks Calling blocking functions Parallelism Interleaving Looping Running in the background Queue example - a concurrent web spider why CPU blocking must be taken as seriously as other kinds of blocking, consider password hashing functions like bcrypt [http://bcrypt.sourceforge.net/], which by design use hundreds of milliseconds of CPU background before triggering some future action in the application (as opposed to normal synchronous functions, which do everything they are going to do before returning). There are many styles of asynchronous0 码力 | 333 页 | 322.34 KB | 1 年前3
Tornado 5.1 Documentation
decorated coroutines How it works How to call a coroutine Coroutine patterns Calling blocking functions Parallelism Interleaving Looping Running in the background Queue example - a concurrent web spider why CPU blocking must be taken as seriously as other kinds of blocking, consider password hashing functions like bcrypt [http://bcrypt.sourceforge.net/], which by design use hundreds of milliseconds of CPU background before triggering some future action in the application (as opposed to normal synchronous functions, which do everything they are going to do before returning). There are many styles of asynchronous0 码力 | 359 页 | 347.32 KB | 1 年前3
Tornado 5.1 Documentation
why CPU blocking must be taken as seriously as other kinds of blocking, consider password hashing functions like bcrypt, which by design use hundreds of milliseconds of CPU time, far more than a typical network background before triggering some future action in the application (as opposed to normal synchronous functions, which do every- thing they are going to do before returning). There are many styles of asynchronous Callback registry (e.g. POSIX signals) Regardless of which type of interface is used, asynchronous functions by definition interact differently with their callers; there is no free way to make a synchronous0 码力 | 243 页 | 895.80 KB | 1 年前3
Tornado 6.1 Documentation
why CPU blocking must be taken as seriously as other kinds of blocking, consider password hashing functions like bcrypt, which by design use hundreds of milliseconds of CPU time, far more than a typical network background before triggering some future action in the application (as opposed to normal synchronous functions, which do every- thing they are going to do before returning). There are many styles of asynchronous Callback registry (e.g. POSIX signals) Regardless of which type of interface is used, asynchronous functions by definition interact differently with their callers; there is no free way to make a synchronous0 码力 | 245 页 | 904.24 KB | 1 年前3
共 20 条
- 1
- 2













