Go 101 (Golang 101) v1.21.0standard package. §40. Atomic Operations - the sync/atomic standard package. §41. Memory Order Guarantees in Go §42. Common Concurrent Programming Mistakes Memory Related §43. Memory Blocks §44. Memory understand these synchronization techniques better, it is recommended to know the memory order guarantees in Go (§41). The data synchronization techniques in Go will not prevent programmers from writing non-closed non-nil channel any more, then a goroutine can close the channel safely. However, making such guarantees by a receiver or by one of many senders of a channel usually needs much effort, and often makes0 码力 | 610 页 | 945.17 KB | 1 年前3
Go 101 (Golang 101) v1.21.0standard package. §40. Atomic Operations - the sync/atomic standard package. §41. Memory Order Guarantees in Go §42. Common Concurrent Programming Mistakes Memory Related §43. Memory Blocks §44. Memory understand these synchronization techniques better, it is recommended to know the memory order guarantees in Go (§41). The data synchronization techniques in Go will not prevent programmers from writing non-closed non-nil channel any more, then a goroutine can close the channel safely. However, making such guarantees by a receiver or by one of many senders of a channel usually needs much effort, and often makes0 码力 | 880 页 | 833.34 KB | 1 年前3
Hyperledger Fabric 1.1 Documentationthe name suggests, allow a party to digitally sign its messages. Digital signatures also provide guarantees on the integrity of the signed message. Technically speaking, digital signature mechanisms require (Orderers) The orderers form the ordering service, i.e., a communication fabric that provides delivery guarantees. The ordering service can be implemented in different ways: ranging from a centralized service properties The guarantees of the ordering service (or atomic-broadcast channel) stipulate what happens to a broadcasted message and what relations exist among delivered messages. These guarantees are as follows:0 码力 | 422 页 | 4.84 MB | 1 年前3
Hyperledger Fabric 1.2 Documentationthe name suggests, allow a party to digitally sign its messages. Digital signatures also provide guarantees on the integrity of the signed message. Technically speaking, digital signature mechanisms require (Orderers) The orderers form the ordering service, i.e., a communication fabric that provides delivery guarantees. The ordering service can be implemented in different ways: ranging from a centralized service properties The guarantees of the ordering service (or atomic-broadcast channel) stipulate what happens to a broadcasted message and what relations exist among delivered messages. These guarantees are as follows:0 码力 | 497 页 | 6.59 MB | 1 年前3
Hyperledger Fabric 1.3 Documentationthe name suggests, allow a party to digitally sign its messages. Digital signatures also provide guarantees on the integrity of the signed message. Technically speaking, digital signature mechanisms require person (unlinkability). Idemix authentication technology provides the trust model and security guarantees that are similar to what is ensured by standard X.509 certificates but with underlying cryptographic (Orderers) The orderers form the ordering service, i.e., a communication fabric that provides delivery guarantees. The ordering service can be implemented in different ways: ranging from a centralized service0 码力 | 528 页 | 6.85 MB | 1 年前3
Hyperledger Fabric 1.4.8 Documentationthe name suggests, allow a party to digitally sign its messages. Digital signatures also provide guarantees on the integrity of the signed message. Technically speaking, digital signature mechanisms require person (unlinkability). Idemix authentication technology provides the trust model and security guarantees that are similar to what is ensured by standard X.509 certificates but with underlying cryptographic (Orderers) The orderers form the ordering service, i.e., a communication fabric that provides delivery guarantees. The ordering service can be implemented in different ways: ranging from a centralized service0 码力 | 699 页 | 9.02 MB | 1 年前3
Hyperledger Fabric 1.4.9 Documentationthe name suggests, allow a party to digitally sign its messages. Digital signatures also provide guarantees on the integrity of the signed message. Technically speaking, digital signature mechanisms require person (unlinkability). Idemix authentication technology provides the trust model and security guarantees that are similar to what is ensured by standard X.509 certificates but with underlying cryptographic (Orderers) The orderers form the ordering service, i.e., a communication fabric that provides delivery guarantees. The ordering service can be implemented in different ways: ranging from a centralized service0 码力 | 701 页 | 9.02 MB | 1 年前3
Hyperledger Fabric 1.4 Documentationthe name suggests, allow a party to digitally sign its messages. Digital signatures also provide guarantees on the integrity of the signed message. Technically speaking, digital signature mechanisms require person (unlinkability). Idemix authentication technology provides the trust model and security guarantees that are similar to what is ensured by standard X.509 certificates but with underlying cryptographic (Orderers) The orderers form the ordering service, i.e., a communication fabric that provides delivery guarantees. The ordering service can be implemented in different ways: ranging from a centralized service0 码力 | 701 页 | 9.02 MB | 1 年前3
Hyperledger Fabric 1.4 Documentation
the name suggests, allow a party to digitally sign its messages. Digital signatures also provide guarantees on the integrity of the signed message. Technically speaking, digital signature mechanisms require person (unlinkability). Idemix authentication technology provides the trust model and security guarantees that are similar to what is ensured by standard X.509 certificates but with underlying cryptographic (Orderers) The orderers form the ordering service, i.e., a communication fabric that provides delivery guarantees. The ordering service can be implemented in different ways: ranging from a centralized service0 码力 | 678 页 | 10.02 MB | 1 年前3
Cilium v1.6 DocumentationProgram Types Further Reading API Reference Introduction How to access the API Compatibility Guarantees API Reference Reference Command Cheatsheet Command utilities: Command examples: Kubernetes examples: IPAM specific parameters. Failure Behavior If Cilium loses connectivity with the KV-Store, it guarantees that: Normal networking operations will continue; If policy enforcement is enabled, the existing feature in non-tunneled datapath modes, which may decrease system networking performance. This guarantees HTTP and Kafka redirection works as intended. However, if HTTP or Kafka enforcement policies or0 码力 | 734 页 | 11.45 MB | 1 年前3
共 187 条
- 1
- 2
- 3
- 4
- 5
- 6
- 19













