Easy to understand 50 IT terminology

Suppose you are a girl, you have a boyfriend, and at the same time you are having an affair with another guy, who is better than a friend, but not a lover. You can dump your current boyfriend at any time, and another one will fill you up right away. This is a cold backup .

Let's say you're a girl and you're dating two guys at the same time, both of whom are your boyfriends. And they also do not interfere with each other and operate independently. This is the dual-machine hot backup .

Let's say you're a girl and you're uncomfortable with the security your boyfriend gives you. In a distant place where the boyfriend is unknown, keep in touch with a boy, you tell him that you don’t have a boyfriend, you are now in a tangled period, once you and your boyfriend are separated, you can immediately transfer your feelings to a man in a different place go. This is remote disaster recovery backup .

Suppose you are a girl with a boyfriend, and you pay a marriage agency to look out for good resources for you. Once you separate from your boyfriend, the marriage agency will immediately arrange resources for you. Feelings run uninterrupted, it's cloud backup . . . .

Suppose you are a girl, you doubt your boyfriend's loyalty to you, and you buy a loyalty testing service in a certain treasure. This is a disaster drill . Friendly reminder, in the absence of backup, do not conduct disaster drills, otherwise your data will be wiped out.

Suppose you are a girl and you are in a long-distance relationship with your boyfriend. You call and check every night to ask him if he still loves you. This is called ping .

Suppose you are a girl, and your boyfriend often disappears, so you want to know his whereabouts at all times, you call his good friend A first, A says good friend B knows, B says good friend C knows, C Say good friend D knows, D said your boyfriend is playing games in an Internet cafe, you finally know where your boyfriend is, this is called TraceRoute .

Suppose you are a girl, and your boyfriend is addicted to games and often does not answer the phone for no reason, so when you make an appointment to go shopping in the afternoon, you have to call from time to time to see if he can still provide services normally, this is called heartbeat monitoring .

Suppose you are a girl and you want to go shopping and your boyfriend A is playing a game and does not answer the phone, so you send the shopping request to the backup boyfriend B, so as to ensure the uninterrupted operation of the service. This is called failover .

Suppose you are a girl, and you have a lot of things that need to be done by your boyfriend, so you can’t describe it when you go shopping with A, travel and eat, and B can only go shopping with you, and cannot have all the rights of boyfriends. This is called master-slave configuration . .

Suppose you are a girl, and you are so prodigal that your boyfriend can’t stand it, so you find two boyfriends, one, three, five odd numbers, two, four, six even numbers, so as to reduce the pressure faced by a boyfriend , which is called load balancing .

Assuming you are a girl and have multiple boyfriends, you will achieve the ultimate experience with heartbeat detection, failover and load balancing. This is called cluster LVS . Note that it is not recommended to enable clustering when the demand can be handled by a single machine, which will cause a lot of problems. Resources are idle, increasing maintenance costs.

Suppose you are a girl, and your demand is getting higher and higher, so that one boyfriend cluster can no longer handle it, so you have added another few, which is called multi- cluster horizontal expansion , or multi-cluster grid for short .

Suppose you are a girl, and your boyfriend is too thin to meet the needs, so you buy a lot of supplement products to help your boyfriend upgrade, so as to increase the capacity of the stand-alone machine, this is called vertical expansion, Scale up . Keep in mind that scaling up becomes more expensive and less effective.

Suppose you are a girl, you and your boyfriend often go out to play, and when you are in love with something and want to do something, you suffer from no tt, so you have to go to the supermarket to buy it, so you put tt in the places you often go to, thereby greatly reducing Waiting time, this is called CDN .

Suppose you are a girl, and your boyfriend is handsome, unrestrained, suave, rich and rich, and you are the only one, so you are met with hostility from female B, who will ask your boyfriend to repair the computer and refrigerator on weekends in the name of a friend, taking up a lot of boyfriend’s time , causing your boyfriend to be unable to serve you, this is called a denial of service attack, or DOS for short .

Suppose you are a girl, and you are hostile by a woman because of your boyfriend, but your boyfriend's processing ability is very strong, and the processing speed is faster than her request speed, so she hired a group of women to trouble your boyfriend in turn, This is called a distributed denial of service attack , or DDOS for short .

Suppose you are a girl, and you find that your boyfriend is always processing some other irrelevant requests, so you gave your boyfriend a white list, asking him to only process requests in the white list, and reject requests from other unknown people , which is called access control .

Suppose you are a girl, and your boyfriend is suave, and you are always worried about him cheating, so you install a bug on him, which has some built-in feature libraries of suspicious girls hooking up. Immediately call the police, this is called an intrusion detection system (IDS) .

Suppose you are a girl, and you improve the above bug, when a suspicious woman hooks up with your boyfriend, immediately release 10,000 volts of voltage, stun the suspect, and terminate the hookup. This is called an Intrusion Prevention System (IPS) .

Suppose you are a girl, although you have installed various bugs and alarms, but your blue friend is merciful everywhere, and the alarms keep ringing, which makes you overwhelmed and exhausted, so you set up a device to collect these cheating alarms and carry out Comprehensive analysis to generate your boyfriend's cheating report. This is called SIEM or SOC .

Suppose you are a girl, and you submit your boyfriend’s cheating report to his parents, and get their strong support. The boyfriend’s parents start to strictly discipline him, rectify within a time limit, and escort your love, so that it is reasonable, legal and compliant , which is called hierarchical protection .

Suppose you are a girl and you are a little far away from your boyfriend’s house. You drive there, which is called a self-built dedicated line . If you take a taxi, this is called a leased line . If you ride a Mobike, this is called SDWAN .

Suppose you are a girl, and the relationship between you and your boyfriend is opposed by the parents of both parties, and the two parties are not allowed to communicate with each other. You secretly dug a tunnel to facilitate the tryst. This is called VPN .

Suppose you are a girl, and your boyfriend is too good to make people peep, so they researched your boyfriend, modified it a little bit, and produced a boyfriend B, which is similar to your boyfriend's 99 percentile system. It's called plagiarism, and it's called reverse engineering , such as boyfriend cheating.

Suppose you are a girl and you ask your boyfriend to persist for ten minutes, then fifteen minutes and then twenty minutes to test where your boyfriend's limit is, this is called a stress test .

Suppose you are a girl. In order to ensure the normal operation of your boyfriend, you check his WeChat, Weibo and other social profiles every day to find clues that may cause problems. This is called data analysis .

Suppose you are a girl, and your boyfriend is an active social player. Every day Weibo Zhihu produces a lot of information, and you find that your analysis speed is far lower than his production speed, so you find your girlfriends together Analysis, this is called parallel computing .

Suppose you are a girl, and your boyfriend is too merciful and has generated a huge amount of pending information. You and your girlfriends are already exhausted and have not caught up with the speed of his creation, so you pay to find it on Zhihu. 20 small partners help you analyze together, this is called cloud computing .

Suppose you are a girl. After you get the places where your boyfriend often hangs out, you can determine that your boyfriend is cheating based on information such as hotels and sensitive time periods. This is called data mining .

Suppose you are a girl, after analyzing your boyfriend’s data, you know that he is going out to open a room again in the afternoon, so you send him a text message before he is about to go out, asking if he has brought TT, if not, you can buy it from me , which is called precise push , which needs to cooperate with data mining.

If you are a girl, your boyfriend should always go out and have all kinds of problems, so you rent a room and prepare everything you need and tell him, don't look for a hotel in the future, just come to my room , everything is ready, this is called a container .

If you are a girl, you have to open an interface with your boyfriend once a day to collect data . You collect data 24 hours a day, which is called real-time data collection . You decide to develop a new interface to communicate with your boyfriend, which is called virtualization . You decide to collect data from different boyfriends, you are the big data center . One day you decide to have a baby, this is called big data application . The baby is born without knowing who it belongs to. This is called big data desensitization . But judging from the baby's appearance, he has black skin and golden hair, which is called data fusion cross-domain modeling . You decide to bring this baby to the exhibition and collect some tickets. This is called big data realization .

If you have a lot of boyfriends, you can’t even see them, and you can’t remember them if you don’t need them. Simply pick out the most typical, essential, and potential high-quality boyfriends. This is called data simplification . As for how to pick, data reduction techniques are used .

Guess you like

Origin blog.csdn.net/qq_41286824/article/details/125406964