Tag: 系统架构

23 articles

RocketMQ Core Architecture: NameServer/Broker/Producer

RocketMQ (formerly MetaQ) technical evolution history and core architecture deep dive, NameServer, Broker, Producer, Consumer roles and deployment topology. This article analyzes principles and pra...

RocketMQ Core Features: Ordering/Filtering/Transaction/Ti...

Deep dive into RocketMQ core features: ordered consumption, Broker-side filtering, transaction messages, scheduled timing messages, consumption retry, flow control mechanism and dead letter queue. ...

Spymemcached Deep Dive: Thread Model, Sharding, Serializa...

Java service integrating with Memcached needs to understand Spymemcached's thread model, sharding routing and serialization details. Spymemcached implements async IO via NIO+callback, uses ketama c...

FastDFS High Concurrency Optimization: max_connections, T...

Optimization for high concurrency/massive small files with single disk or RAID: upgrade to v5.04+, configure threads based on CPU cores, reduce directory levels, adjust sync parameters based on lat...

AI Research #128: Qwen2.5-Omni Training Pipeline - Three-...

Complete training pipeline breakdown for Qwen2.5-Omni: Thinker based on Qwen2.5, vision initialized from Qwen2.5-VL, audio from Whisper-large-v3. Uses...

AI Research #126: Tesla FSD V14 Engineering - High-Precis...

Tesla FSD V14 related US patents: engineering analysis of high-precision vision occupancy network (SDF ~10cm), sparse sampling + trilinear interpolation,...

AI Investigation #108: Complete Robot Model Training Proc...

Full robot training pipeline: pre-training, fine-tuning (LoRA), reinforcement learning, imitation learning, and human feedback for safe autonomous decision-making.

AI Investigation #107: RL and Robot Training Data Format ...

Data formats and development processes in robot and reinforcement learning systems, including time series trajectories, state-action pairs, offline RL data,...

AI Investigation #106: Robot Learning Data Collection Too...

Core data collection methods and application scenarios, covering over ten methods from manual entry, sensor collection, web crawlers, API calls, log collection...

AI Investigation #105: Robot Learning Data Collection - F...

Data collection is a critical step in robot learning development, covering demonstration video collection, trajectory recording, state-action pair generation, and data quality control strategies.

AI Investigation #103: Embodied AI Technology Landscape

Comprehensive overview of embodied AI tech stack: hardware (GPU, sensors, actuators), software (ROS, simulation), and algorithms (deep learning, RL, VLA models).

AI Investigation #99: Sensor Fusion Technology - Camera, ...

Sensor Fusion is a core technology in autonomous driving, robotics and smart security. Through multi-sensor data fusion of cameras, LiDAR, radar, IMU,...

AI Investigation #96: Robot Scenario Testing - From Extre...

Complete guide to robot scenario testing, covering three dimensions: environment testing, load testing, and anomaly testing. Traditional manual testing has...

AI Investigation #93: Robot Simulation Tools - Comprehens...

Simulation tools are an important part of robot R&D, enabling algorithm verification and system debugging in risk-free environments, accelerating iteration.

AI Investigation #92: Robot Motion Control - From Traditi...

Robot motion control can be divided into two categories: traditional model-based methods and deep learning-based intelligent control. The former emphasizes kinematics/dynamics modeling, trajectory ...

MySQL Master-Slave Replication: Read-Write Separation and...

This article provides an in-depth explanation of MySQL master-slave replication: master-slave mode, read-write separation, semi-sync replication principles and configuration.

MySQL Design Guide: Availability, Scalability, Consistency

This article provides an in-depth explanation of MySQL database design: availability (redundancy, failover), scalability (sharding, read-write separation), consistency (strong consistency vs eventu...

MySQL Deadlock: Principles, Scenarios and Prevention

This article provides an in-depth explanation of MySQL deadlocks: deadlock definition, necessary conditions, table lock deadlocks, row-level deadlocks, shared to exclusive lock conversion, deadlock...

MySQL Lock Mechanism: From Table Locks to Row Locks

This article provides an in-depth explanation of MySQL lock mechanisms: pessimistic locking, optimistic locking, table-level locks, row-level locks (shared locks, exclusive locks), intention locks,...

MySQL Parallel Replication: From 5.6 to 8.0 Evolution

This article provides an in-depth explanation of MySQL parallel replication technology: from 5.6 database-based parallel to 5.7 group commit-based to 8.0 writeset-based evolution.

MySQL Dual-Master Architecture and MMM High Availability

Deep dive into MySQL dual-master architecture and MMM high availability solution: dual-master mode, MMM fault handling, monitoring mechanism. This article analyzes principles and practical applicat...

MySQL MHA Master-Slave Failover: Architecture and Impleme...

Deep dive into MySQL MHA high availability solution: MHA architecture, fault handling, primary-standby switch, lag issues and solutions. This article analyzes principles and practical applications.

MySQL Transaction Isolation Levels: Read Uncommitted to S...

This article provides an in-depth explanation of MySQL transaction isolation levels: Read Uncommitted, Read Committed, Repeatable Read, and Serializable, analyzing dirty read, non-repeatable read, ...