自定义博客皮肤VIP专享

*博客头图:

格式为PNG、JPG,宽度*高度大于1920*100像素,不超过2MB,主视觉建议放在右侧,请参照线上博客头图

请上传大于1920*100像素的图片!

博客底图:

图片格式为PNG、JPG,不超过1MB,可上下左右平铺至整个背景

栏目图:

图片格式为PNG、JPG,图片宽度*高度为300*38像素,不超过0.5MB

主标题颜色:

RGB颜色,例如:#AFAFAF

Hover:

RGB颜色,例如:#AFAFAF

副标题颜色:

RGB颜色,例如:#AFAFAF

自定义博客皮肤

-+

FeelTouch Labs

Best or Nothing!

  • 博客(15)
  • 资源 (35)
  • 收藏
  • 关注

转载 全局精确流量调度新思路-HttpDNS服务详解

但凡使用域名来给用户提供服务的互联网企业,都或多或少地无法避免在有中国特色的互联网环境中遭遇到各种域名被缓存、用户跨网访问缓慢等问题。那么对于腾讯这样的域名数量在10万级别的互联网公司来讲,域名解析异常的情况到底有多严重呢?每天腾讯的分布式域名解析监测系统在不停地对全国所有的重点LocalDNS进行探测,腾讯域名在全国各地的日解析异常量是已经超过了80万条。这给腾讯的业务带来了巨大的损失。为此腾讯建立了专业的团队与各个运营商进行了深度沟通,但是由于各种原因,处理效率及效果均不能达到腾讯各业务部门的需求。除了

2020-07-31 16:59:22 950

原创 股市投资必修课七---一个小散在股市投资中必经的进阶之路

目录前言投资需要经历的四个阶段投资四个阶段需要关注的点前言投资的能力不是一蹴而就的,而是需要经过漫长的投资修炼,一般主要经过以下四个阶段:1.投资世界的历史和基本概念以及原则2.企业价值分析的框架和方法论3.市场定价机制以及长期运行规律4.对于投资中多种要素的融合和综合运用投资需要经历的四个阶段提升投资素养并没有捷径,唯有大量的阅读、持续的观察和勤奋的思考以及练习。投资四个阶段需要关注的点阅读提供了基本的知识点和关注点,但是要真正起到作用唯有多

2020-07-26 00:05:27 654

原创 股市投资必修课六---小散们在投资中遇到的的千万个坑你有没有跳进过

前言如果说投资中不可动摇的基石可以帮助我们刚好的理解成功的必要的基础,那么导致投资失败的千万条因素又有那些呢?投资中失败的因素普通人最大的问题普通人面临的最大问题,在于不懂得对“得失”的安然处之,所以总是患得患失,永远处于不平衡状态。因为没有认识到“得失”是必然而不是偶然,选择的区别只在于“得什么”?“失什么”?也就永远难以泰然处之。...

2020-07-25 23:45:35 609

原创 股市投资心经---做T的要领

2020-07-20 01:02:23 526

转载 基金投资必修课一---基金该如何止盈

在前两天的文章中,我们分享了3000点附近是否适合定投,赚钱的概率有多大,选择哪些基金定投比较合适,有兴趣的朋友可以看前面的文章:聚财君:3000点是否是定投的好起点?那我们今天谈下,我们定投后最重要的事情——止盈。为什么止盈是最重要的呢?因为你投资主要是为了赚钱,如果只是账面上的,那像中国股市周期这么强,很可能没有止盈的话,就在一轮牛熊转换过程中,变成亏损。有句老话说,“会买的是徒弟,会卖的是师傅”,所以卖一定是最重要的。那我们今天就分享下,3个定投止盈最有效的方法。(一)目标收益法目标收益法

2020-07-19 12:55:55 1554

原创 股市投资必修课四---一个散户如何做真正的价值投资

不要预测市场 不要频繁交易

2020-07-19 12:44:35 580

原创 股市投资必修课五---一个成熟的投资者谨记的黄金数字

铁的纪律是股票投资制胜的法宝。

2020-07-19 11:08:21 735

原创 股市投资必修课三---一个散户该捅破的窗户纸

前言如果一个开始买卖的股票的人,并不是一种想着以“投资者”身份进入市场,那么这是悲剧的开场。正题投资、投机与赌博1. 投资与投机理论分析格雷厄姆在《证券分析》一书中有过如下的定义:“投资业务是已深入分析为基础,确保本金的安全,并适当获得回报;不满足这些要求就是投机”。从这个定义来看,投资与投机的区别如下:2. 投资与投机现实分析3.这就是赌博4.不要自持聪明真正的认识投资真正认识一个事物,不是能看说出多少优点,而是能够充分认识到它的缺陷。价值投资不

2020-07-18 23:05:31 448

原创 股市投资必修课二---一个散户在股市所具备的自身优势

“投资”慢慢变成了“投机”

2020-07-18 18:39:45 458

原创 股市投资必修课一---一个散户在股市中必须正视的实事

股市中你必须正视的实事1. 巴菲特说:“投资很简单,但并不容易”。太多人高估了前半句对自己的适用程度,却远远低估了后半句隐藏的极高壁垒。2. 投资者进行股票投资时,所必然面临的三大困难: 1)企业经营的不确定性 2)证券市场定价的复杂性 3)市场对人性弱点的放大。...

2020-07-18 10:06:31 592

原创 架构集二---如何从中台角度搭建直播聊天室

前言视频直播已经是一种成熟的产品形态,在不同行业中有多种应用场景。在泛娱乐行业,游戏直播、秀场直播、演唱会直播等已经走进广大用户的日常生活;在电商行业,网红带货直播已经成为增长的新动能;在教育行业,1对多的教育直播也正在改变着整个行业的格局。视频直播占用着越来越多的用户使用时间。随着线上线下服务的进一步融合,视频直播也将会有迎来越来越多的使用场景。让专业的人做专业的事。通常来说,一个典型的视频直播产品会使用二类中台能力:直播聊天室SDK和视频直播SDK。直播聊天中台主要负责提供视频直播中的文字聊天室

2020-07-16 21:02:43 1152

原创 架构集一---语音连麦聊天室实现方案分析

前言语音聊天基本是社交软件必备的功能,语音相比文字图片更丰富,比视频又更简便,是天然的社交工具。除了单纯的1对1语音或视频聊天,在实时音视频技术支持下,很多 APP 已经延伸出非常多的玩法。目前比较火的语聊房又分为语音电台、语音游戏、私人聊天房、多人语聊房、KTV 语聊房等细分的场景,延伸出去还有更多的形态,目前比较火的音遇 APP ,就是语聊房的最新形态。语音电台是目前很多社交APP的玩法。主播可以在直播间中给听众讲故事、脱口秀、唱歌,内容形式不胜枚举,观众也可以申请上麦与主播聊天互动(一般需

2020-07-16 20:36:16 4325

原创 一种基于线程池进行定时调度的实现方案

前言实现定时调度的方案真的是太多了,此处实现经典的基于线程池的定时调度方案。具体实现1,编写调度线程管理类@Slf4j@Servicepublic class TimerTaskService { private static ScheduledExecutorService scheduledExecutorService = Executors.newScheduledThreadPool(10, new ThreadFactory() {

2020-07-14 17:48:58 2710

原创 Kafka系列---Kafka客户端参数配置最佳实践解析

Kafka客户端的配置参数很多,以下提供Producer和Consumer几个常用参数配置。表1Producer参数 参数 默认值 推荐值 说明 acks 1 高可靠:all 高吞吐:1 收到Server端确认信号个数,表示procuder需要收到多少个这样的确认信号,算消息发送成功。acks参数代表了数据备份的可用性。常用选项:..

2020-07-11 17:48:51 1144

原创 Kafka系列---Kafka客户端使用最佳实践

目录1. consumer使用规范2. producer使用规范3. topic使用规范4. 其他建议1. consumer使用规范consumer的owner线程需确保不会异常退出,避免客户端无法发起消费请求,阻塞消费。 确保处理完消息后再做消息commit,避免业务消息处理失败,无法重新拉取处理失败的消息。 consumer不能频繁加入和退出group,频繁加入和退出,会导致consumer频繁做rebalance,阻塞消费。 consumer数量不能超过topic分.

2020-07-11 17:44:30 931

Natural Language Processing with Deep Learning CS224N/Ling284

1.The foundations of the effective modern methods for deep learning applied to NLP • Basics first: Word vectors, feed-forward networks, recurrent networks, attention • Then key methods used in NLP in 2024: transformers, encoder-decoder models, pretraining, post-training (RLHF, SFT), efficient adaptation, model interpretability, language model agents, etc. 2. A big picture understanding of human languages and the difficulties in understanding and producing them via computers 3. An understandin

2024-09-09

RFC9220 - HTTP Datagrams and the Capsule Protocol

This document describes HTTP Datagrams, a convention for conveying multiplexed, potentially unreliable datagrams inside an HTTP connection. In HTTP/3, HTTP Datagrams can be sent unreliably using the QUIC DATAGRAM extension. When the QUIC DATAGRAM frame is unavailable or undesirable, HTTP Datagrams can be sent using the Capsule Protocol, which is a more general convention for conveying data in HTTP connections.

2024-08-02

RFC9297 - Bootstrapping WebSockets with HTTP/3

The mechanism for running the WebSocket Protocol over a single stream of an HTTP/2 connection is equally applicable to HTTP/3, but the HTTP-version-specific details need to be specified. This document describes how the mechanism is adapted for HTTP/3.

2024-08-02

RFC9114 - HTTP/3

The QUIC transport protocol has several features that are desirable in a transport for HTTP, such as stream multiplexing, per-stream flow control, and low-latency connection establishment. This document describes a mapping of HTTP semantics over QUIC. This document also identifies HTTP/2 features that are subsumed by QUIC and describes how HTTP/2 extensions can be ported to HTTP/3.

2024-08-02

RFC9000 - QUIC: A UDP-Based Multiplexed and Secure Transport

This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.

2024-08-02

RFC8446 -The Transport Layer Security (TLS) Protocol Version 1.3

Abstract This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery. This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations. Status of This Memo This is an Internet Standards Track document. This document is a product o

2024-08-02

Web3+Decentralized+去中心化+存储

Storage parameter flexibility • Storage permanence • Redundancy persistence • Data transmission incentivization • Universality of storage tracking Filecoin’s tokenomics support growing the total network’s storage space. Crust’s tokenomics ensure hyper-redundancy with fast retrieval speeds. Sia is all about privacy Arweave is all about permanence Storj’s business model seems to heavily factor in their billing and payment approach. Swarm’s bonding curve model

2024-04-30

Chainbase+Web3+APi+Data warehouse

1.Chain API Service:提供安全稳定的多链节点 JSONRPC 集群⽀持,轻松访问多链⽹络 2.Web3 API Service:⽀持多种协议索引,快速⽀持业务应⽤场景(如Token、NFT、DeFi、Domain...)数据查询 3.All-In-One Dashboard:通过⼀站式控制台完成创建、调试、监控和运维 Web3 应⽤程序

2024-04-30

Graph+Web3+检索

1.Substreams 是 The Graph Network 的数据服务世界中即将推出的服务之一,它允许您以毫秒级的延迟查询 Solana 历史数据和实时数据。 2.The Graph 是 Web3 的核心开发者工具及中间件,作为去中心化网络的索引查询层,对区块链数据进行结构化和分类,使用户可以轻松高效地对其进行检索。

2024-04-30

Web3+Nostr+区块链+去中心化+Relay+抗审查

1.Notes and Other Stuff Transmitted by Relays 2.由“中继器”传输的“笔记”和“其它东西 3.不依赖于任何可信任(trusted)的中心化服务器,因此具有“韧性/可迅 速恢复性”(resilient) 4.基于公钥密码学的“密钥和签名”原理,所以它防篡改 5.不需要依赖P2P技术就能运行

2024-04-30

GO 中 Chan 实现原理分享

本文聚焦: 1.chan是什么 2.chan的底层数据结构 3.chan的读写基本流程 4.与sync的区别

2024-01-29

storj dcs video use case

Video Storage & Streaming

2023-12-25

Aurora - 去中心化的以太坊 Layer2

Aurora is a L2 Network

2023-12-25

闪电贷的攻防和智能合约审计

闪电贷和闪电兑,以及智能合约的安全防范

2023-12-25

Poly Network 技术架构

To build the next generation internet

2023-12-24

VISION FOR A HETEROGENEOUS MULTI-CHAIN FRAMEWORK DRAFT

Present-day blockchain architectures all suffer from a number of issues not least practical means of extensibility and scalability. We believe this stems from tying two very important parts of the consensus architecture, namely canonicality and validity, too closely together. This paper introduces an architecture, the heterogeneous multi-chain, which fundamentally sets the two apart.

2023-12-24

Security audit report for imtoken wallet

This security audit is a requested service authorized by the client. The service is mainly about application penetration testing which helps to find the vulnerabilities and threats of the target. All the penetration testing items are done by simulating the real world malicious attacks against the target, which mimics human hackers’ activities by manual penetration testing with automated tools.

2023-12-24

Decentraland is a blockchain-based virtual world

Decentraland is a virtual reality platform powered by the Ethereum blockchain. Users can create, experience, and monetize content and applications. Land in Decentraland is permanently owned by the community, giving them full control over their creations. Users claim ownership of virtual land on a blockchain-based ledger of parcels. Landowners control what content is published to their portion of land, which is identified by a set of cartesian coordinates (x,y). Contents can range from static 3D

2023-12-24

The Bitcoin Standard

The Bitcoin Standard Bitcoin的表演

2023-12-24

力场的定位是一个以公链共建挖矿为核心的社区平台以及UGC平台

力场的定位是一个以公链共建挖矿为核心的社区平台以及 UGC(用户生成贡 献)平台。力场的愿景是成为公链生态第一社区,无力场,不公链。 力场的使命是赋能公链生态,以(贡献)行为挖矿为切入点,形成公链、KOL、 用户、Dapp 共生、共建、共利的区块链用户社区。

2023-12-24

A Novel Metastable Consensus Protocol Family for Cryptocurrencie

This paper introduces a new family of leaderless Byzantine fault tolerance protocols, built on a metastable mechanism. These protocols provide a strong probabilistic safety guarantee in the presence of Byzantine adversaries, while their concurrent nature enables them to achieve high throughput and scalability.

2023-12-24

Measuring Ethereum Network Peers

Ethereum, the second-largest cryptocurrency valued at a peak of $138 billion in 2018, is a decentralized, Turing-complete computing platform. Although the stability and security of Ethereum—and blockchain systems in general—have been widely-studied, most analysis has focused on application level features of these systems such as cryptographic mining challenges, smart contract semantics, or block mining operators.

2023-12-24

Firework Games White Paper

Firework Games will be the most advanced and forward-looking blockchain game platform. Our vision is to provide an open and inclusive diverse game world based on the pure blockchain technology, which will change the game industry in modern society. Everyone is freely allowed to create, to play and to enjoy his own role in the parallel world.

2023-12-24

CS251 Final Exam 2021

You may use any (non-human) resource to answer the questions. You may not collaborate with others.

2023-12-24

Generic Construction of Ring Signatures with Efficient

We introduce a novel generic ring signature construction, called DualRing, which can be built from several canonical identification schemes (such as Schnorr identification).DualRing differs from the classical ring signatures by its formation of two rings: a ring of commitments and a ring of challenges. It has a structural difference from the common ring signature approaches based on accumulators or zero-knowledge proofs of the signer index.

2023-12-24

The Gridex Protocol

The Gridex Protocol is a permissionless and non-custodial trading protocol consisting of a set of persistent, non-upgradable smart contracts on the Ethereum blockchain. Unlike the current mainstream decentralized exchanges based on the Automated Market Maker (AMM) model, Gridex is based on order books. With our novel Grid Maker Order Book (GMOB) model, we have significantly reduced the resource consumption of running an order book based system, allowing us to deploy and run it on the Ethereum.

2023-12-24

Efficient Zero-Knowledge Arguments for Arithmetic Circuits

We provide a zero-knowledge argument for arithmetic circuit satisfiability with a communication complexity that grows logarithmically in the size of the circuit. The round complexity is also logarithmic and for an arithmetic circuit with fan-in 2 gates the computation of the prover and verifier is linear in the size of the circuit. The soundness of our argument relies solely on the well-established discrete logarithm assumption in prime order groups.

2023-12-24

KishuInu Whitepaper

$KISHU is an ERC20 token which started on the Ethereum blockchain April 17, 2021. The max supply is 100 quadrillion and one of its key functionalities is its decentralized usage rewards mechanism. For every active user transaction a 2% $KISHU reward is granted to holders’ decentralized wallets only, fostering a healthy distrubuted network and community usage. The more $KISHU is actively used, the more rewards are granted!

2023-12-24

On the Instability of Bitcoin Without the Block Reward

Bitcoin provides two incentives for miners: block rewards and transaction fees. The former accounts for the vast majority of miner revenues at the beginning of the system, but it is expected to transition to the latter as the block rewards dwindle. There has been an implicit belief that whether miners are paid by block rewards or transaction fees does not affect the security of the block chain.

2023-12-24

Shorter Proofs for Privacy-Enhanced Distributed Ledger

We present a new short zero-knowledge argument for the range proof and the arithmetic circuits without a trusted setup. In particular, the proof size of our protocol is the shortest of the category of proof systems with a trustless setup. More concretely, when proving a committed value is a positive integer less than 64 bits, except for negligible error in the 128-bit security parameter, the proof size is 576 byte long, which is of 85.7% size of the previous shortest one due to Bunzetal.

2023-12-24

Attacking Threshold Wallets

Threshold wallets leverage threshold signature schemes (TSS) to distribute signing rights across multiple parties when issuing blockchain transactions. These provide greater assurance against insider fraud, and are sometimes seen as an alternative to methods using a trusted execution environment to issue the signature. This new class of applications motivated researchers to discover better protocols, entrepreneurs to create start-up companies, and large organizations to deploy TSS-based.

2023-12-23

This paper provides an architectural overview of the Avalanche

Avalanche is a high-performance, scalable, customizable, and secure blockchain platform. It targets three broad use cases: 15 – Building application-specific blockchains, spanning permissioned (private) and permissionless (public) deployments. – Building and launching highly scalable and decentralized applications (Dapps). – Building arbitrarily complex digital assets with custom rules, covenants, and riders (smart assets).

2023-12-23

Avalanche Native Token ($AVAX) Dynamics

This paper discusses the key implementation details, in particular the token economics (tokenomics), of the native token of the Avalanche platform, called 5 $AVAX. The native token secures the network, pays for fees, and provides the basic unit of account between the multiple blockchains deployed on the larger Avalanche network. For additional details on Avalanche, which serves as a versatile and universal platform, allowing anyone to launch new blockchains with their own rules, virtual machine

2023-12-23

ZKSwap是一个基于 ZK-Rollup 的 Layer2 代币Swap协议

是一种基于 ZK-Rollup 技术的 Layer-2 AMM 去中心化交易协议 ZKSwap,在 Layer-2 上实现了 uniswap 的所有功能,在保证去中心化交易的核心 价值的同时,实现实时交易,把 Uniswap 的 TPS(每秒可以处理的交易数量) 提升了多个数量级,同时交易的过程几乎不需要消耗任何 Gas 费用。 ZKSwap 系统由链上智能合约,链下 ZKSwap Server,零知识证明系统和前端 用户界面组成。

2023-12-23

ZEND White Paper

You agree that you are acquiring ZEND to participate in zkLend and to obtain services on the ecosystem thereon. The Company, the Distributor and their respective affiliates would develop and contribute to the underlying source code for zkLend. The Company is acting solely as an arms’ length third party in relation to the ZEND distribution, and not in the capacity as a financial advisor or fiduciary of any person with regard to the distribution of ZEND.

2023-12-23

KZen Curv Security Audit

KZen Curv is a library written in Rust providing low-level elliptic curve cryptography functionalities (ECC), as well as higher-level protocols such as key-exchange, secret sharing, zero-knowledge, and multi-party computation. KZen Curv 是一个用 Rust 编写的库,提供低级椭圆曲线加密 功能 (ECC) 以及更高级别的协议,例如密钥交换、秘密 共享、零知识、多方计算。

2023-12-23

为什么虚拟资产值得投资:元宇宙虚拟地产报告

本篇报告回顾了2021年Metaverse虚拟地产商生态的发展,并讨论了与之相关的主要市场趋势。这些趋势包括:主流传统玩家的入场;Metaverse技术的商业应用(包括游戏和应用);以及非同质化代币NFT对于整个整体元宇宙的影响。

2023-10-27

元宇宙:未来数字绿洲入口已打开

元宇宙是与现实世界高度互通的虚拟世界,具有同步和拟真、开源和创 造、永续、闭环经济系统四大核心属性。元宇宙的兴起将伴随着 AR/VR、 云计算、AI、5G 等技术的进化,人类对虚拟世界的构建和发展将造就互 联网的终极形态——METAVERSE。随着 ROBLOX 上市受到追捧,元宇宙 正从概念走向现实,国内对标公司或如雨后春笋般出现,产业链发展值 得重视。

2023-10-27

Code Assessment of Liquidations 2.0 Smart Contracts

First and foremost we would like to thank the Maker Foundation for giving us the opportunity to assess the current state of their Liquidations 2.0 system. This document outlines the findings, limitations, and methodology of our assessment. Initially, our code assessment resulted in a number of findings regarding security and correctness. After the submission of the intermediate reports all findings have been resolved. These have been marked accordingly and can be found in the Resolved Findings s

2023-10-27

Scalable and Probabilistic Leaderless BFT Consensus through Meta

This paper introduces a family of leaderless Byzantine fault tolerance protocols, built around a metastable mechanism via network subsampling. These protocols provide a strong probabilistic safety guarantee in the presence of Byzantine adversaries while their concurrent and leaderless nature enables them to achieve high throughput and scalability. Unlike blockchains that rely on proof-of-work, they are quiesce

2023-10-27

空空如也

TA创建的收藏夹 TA关注的收藏夹

TA关注的人

提示
确定要删除当前文章?
取消 删除