Suppose you are a woman, and you have a boyfriend. At the same time, you are ambiguous with another boy, better than a friend, but not a lover. You can dump your current boyfriend at any time, and the other one can make up for it immediately. This is Cold backup

Suppose you are a woman and you are dating two men at the same time. Both of them are your boyfriends. And they also operate independently of each other. This is it. Hot Standby

Suppose you are a woman who is uneasy about the sense of security your boyfriend gives you. In the unknown place of your distant boyfriend, you kept in touch with a boy. You told him that you didn't have a boyfriend, and you are now in a tangled period. Once you and your boyfriend are separated, you can immediately transfer your feelings to a man in a different place. This is Remote disaster recovery backup

Suppose you are a woman and have a boyfriend, and you pay a marriage agency to help you pay attention to good resources. Once you are separated from your boyfriend, the marriage agency will immediately arrange resources for you, and your relationship will continue to run. This is Cloud backup

Suppose you are a woman, you doubt your boyfriend's loyalty to you, and buy a service to test your loyalty in a treasure. This is Disaster drill As a friendly reminder, you should never conduct a disaster drill without a backup. If you don't say yes, your data will cost you nothing.

Suppose you are a woman, you have a girlfriend who is too good to be a good friend, and you can share a boyfriend. This is NAS

Suppose you are a woman, and your boyfriend lives so well that you can't hold him alone. You must ask your sisters to help him. This is Load balancing, QOS

Suppose you are a woman, eating with A, shopping with B and shooting with C. Together, he is a complete boyfriend. This This is Supercomputing cluster ... It is recommended that women with low frequency should not do this. It will crash directly

Suppose you are a woman, and your boyfriend is addicted to games and often stops without answering the phone for no reason. So when you make an appointment to go shopping in the afternoon, you should call from time to time to ask whether he can provide services normally. This is called Heartbeat detection

Suppose you are a woman, you want to go shopping, but your boyfriend A is playing games and doesn't answer the phone, so you send the shopping request to substitute boyfriend B, so as to ensure the uninterrupted operation of the service, which is called Failover

Suppose you are a woman, and you have a lot of things to do with your boyfriend, so it is impossible to describe how you go shopping and eat with A, while B can only go shopping with you, and cannot have all the rights of your boyfriend. This is called Master slave configuration

Suppose you are a woman, and your needs are so strong that your boyfriend can't stand it, so he calls you to find two boyfriends, one three five odd number, two four six even number, to limit traffic, so as to reduce the pressure faced by a boyfriend. This is called load balancing

If you are a woman and have multiple boyfriends, you will achieve the ultimate experience with heartbeat detection, failover and load balancing. This is called Cluster LVS Note that it is not recommended to enable clusters when the demand can be processed by a single machine, which will cause a large number of resources to be idle and increase maintenance costs.

Suppose you are a woman, and your demand is getting higher and higher, which leads to the inability of a boyfriend cluster to deal with, so you may add another several, which is called Multi cluster , horizontal expansion, short for multi-cluster grid

Suppose you are a woman, and your boyfriend is too thin to meet the demand, so you buy a lot of big tonic products to help your boyfriend upgrade, so as to increase the single machine capacity. This is called Vertical expansion Remember, the cost of vertical expansion will become higher and higher, but the effect will become less and less obvious.

Suppose you are a woman, you and your boyfriend often go out to play, but when you want to do something deep down, you have to go to the supermarket to buy, so you have placed tt in the places you often go, thus greatly reducing the waiting time. This is called CDN

Suppose you are a woman, and your boyfriend is handsome, handsome, elegant, and wealthy. As a result, you have been hostile to female B. In the name of a friend, B will ask your boyfriend to repair the computer and refrigerator at the weekend, taking up a lot of his time, causing him to be unable to serve you. This is called a denial of service attack DOS

Suppose you are a female, and you are hostile to a female because of your boyfriend, but your boyfriend's processing ability is very powerful, and the processing speed is higher than her request speed. So she hired a group of women to trouble your boyfriend in turn, which is called distributed denial of service attack, or DDoS, for short DDOS

Suppose you are a woman, and you find that your boyfriend is always dealing with other unimportant requests, so you call you to give your boyfriend a white list and ask him to only deal with the requests in the white list and refuse the requests of other unidentified people. This is called access control , also called Session Tracking

Suppose you are a woman, and you find that after taking the above measures, your boyfriend's processing requests have not decreased much. So you find through investigation that someone has forged your WeChat avatar nickname to make a request to your boyfriend, which is called cross site request forgery, short for CSRF

Suppose you are a woman, and you receive a express delivery, so you ask your boyfriend to pick up the express delivery for you. When you get the express delivery, you find that someone has mailed you a letter full of abuse, which is called cross site scripting attack for short XSS , please note that the other party can send you a micro eavesdropper to eavesdrop on your privacy.

Suppose you are a woman. In order to deal with the threat, you ask your boyfriend to check the mail sent to you. This is called Data verification and filtering

Suppose you are a woman, and your boyfriend is too good to be watched, so they study your boyfriend and slightly modify it to produce a boyfriend B, which is similar to your boyfriend's 99% system. This is not plagiarism, it is called reverse engineering , such as boyfriend plug-in.

Suppose you are a woman. You ask your boyfriend to stick to it for ten minutes, and then for fifteen minutes and twenty minutes to test where your boyfriend's limit is. This is called Pressure test The purpose of the stress test is to check whether the boyfriend can handle the needs, so as to decide whether to enable the boyfriend cluster or improve the boyfriend processing ability. Do not stress test the boyfriend running online, which may cause Downtime The consequences will be lost.

Suppose you are a woman. In order to ensure the normal operation of your boyfriend, you need to check his WeChat microblog and other social data every day to find clues that may cause problems. This is called Data analysis

Suppose you are a woman, your boyfriend belongs to an active social player, and your daily microblog Zhihu WeChat produces a lot of information. You find that your analysis speed is far lower than his birth speed, so you can find your friends to analyze together, which is called Parallel computing

Suppose you are a woman, and your boyfriend is too troublesome to be lenient and has produced a huge amount of information to be processed. You and your friends have been exhausted and have not caught up with his creation speed, so you pay to find 20 partners on Zhihu to help you analyze together, which is called cloud computing

Suppose you are a woman who has obtained a large amount of sorted boyfriend data after using cloud computing, such as:

 Number of active places in active time period Home like xxxx 123 times Hanting xxxx 45 times ...

This is called data statistics

Suppose you are a woman. After you get the place where your boyfriend often haunts, you can determine that the boyfriend is cheating according to the hotel, sensitive time period and other information. This is called data mining

Suppose you are a woman. After analyzing her boyfriend's data, you know that he is going to go out to open a house in the afternoon, so you sent him a text message before he was ready to go out, asking if he had brought a tt. If not, you can buy it from me. This is called Precise push , required Cooperate with data mining

If you are a woman, your boyfriend should always go out and have problems. So you rent a room and have everything ready and tell him that you don't need to look for a hotel in the future. Come to my room directly. Everything is ready. This is called container

If you are a woman, you should get through with your boyfriend every day to collect data. The tool your boyfriend uses to connect you with his is called interface "machine", and the data you collect is called "stream" data.

You pick 24 hours a day, which is called Real time data acquisition You decide to develop a new interface to communicate with your boyfriend, which is called Virtualization

You decide to collect data from different boyfriends, you are Big Data Center
One day you decide to have a baby, which is called Big data application
Baobao was born without knowing who it was. It's called Big data desensitization
But from the baby's appearance, black skin and blond hair are called Data fusion cross domain modeling
You decide to take the baby to the exhibition to collect some tickets, which is called Big data realization