This document discusses how to connect logs to various network services using Logback. It begins with a brief introduction of common logging frameworks like SLF4J, Log4j 1, Log4j 2 and Logback. It then explains Logback's internal architecture including loggers, appenders and layouts. The main part demonstrates how to develop a custom appender in Logback to send logs to network services by utilizing the ILoggingEvent object. It provides code templates and examples of accessing log content and stack traces. Finally, it introduces some open source Logback appenders and the Logpush service for remote log monitoring.
The document introduces Webduino, which allows controlling Arduino boards from a web browser using HTML, JavaScript and Wi-Fi instead of C/C++ and a USB connection. It discusses how Webduino works using MQTT, WebSocket and Firmata protocols to connect the client and server. Examples are shown of switching LEDs and traffic lights remotely in a web browser with Webduino.
This document discusses various mechanisms for syncing data between clients and servers in real-time, including polling, Comet, long polling, websockets, and Engine.IO. It then provides an overview of Firebase, a backend service that allows saving and syncing data in real-time. Firebase allows developing apps using only client-side code, integrating apps with servers, or adding real-time features to existing apps. The document addresses common questions about Firebase's enterprise offerings and data export options.
How to build a scalable SNS via Polling & PushMu Chun Wang
This document discusses building scalable social networking services (SNS) using polling and push mechanisms. It describes various sync mechanisms like polling, long polling, websockets, and Engine.IO. It then discusses using polling for real-time updates versus using push notifications. The document outlines how push notifications would work on the server and client sides. It also covers RESTful API design principles and examples.
How to build a scalable SNS using HBaseMu Chun Wang
The document discusses various strategies for designing row keys in HBase. It covers techniques for avoiding hotspotting like salting, hashing, or reversing keys. It also discusses refining IDs by using shorter hashed values. Other sections provide examples for row keys that enable authentication with access tokens, comments linked to posts in a tree structure, access control lists for controlling data visibility, and organizing statistical data by time period and user. The overall goal of the document is to provide best practices for row key design in HBase to optimize performance and functionality.
97. 97
Blurhash encode diagram
client
CDN
S3
1. get image from CDN
MQ 5. get image from S3
origin
2. get image from origin
4.push
im
age id
to
M
Q
3
.
g
e
t
i
m
a
g
e
f
r
o
m
S
3
DB
98. 98
Blurhash encode diagram
client
CDN
S3
1. get image from CDN
MQ 5. get image from S3
6. store blurhash to DB
origin
2. get image from origin
4.push
im
age id
to
M
Q
3
.
g
e
t
i
m
a
g
e
f
r
o
m
S
3
DB