Giriş
gcloud container clusters create ile yaratılan cluster silinir
Şöyle yaparız
gcloud container clusters delete <my-cluster>
gcloud container clusters delete <my-cluster>
kubectl config get-contexts
CURRENT NAME CLUSTER AUTHINFO NAMESPACE
docker-desktop docker-desktop docker-desktop
* gke_hazelcast-33_us-central1-c_orcun-test gke_hazelcast-33_us-central1-c_orcun-test gke_hazelcast-33_us-central1-c_orcun-testkubectl config use-context my-context-name
gcloud container clusters get-credentials <my-cluster>
gcloud container clusters get-credentials orcun-test --zone us-central1-c --project hazelcast-33
gcloud container clusters get-credentials mycluster --zone us-central1-a
The minimum spanning tree ensures that your internet traffic gets delivered even when cables break.Graph içinde cycle yani döngüler olmamalı. Yani Directed Acyclic olmalı. Açıklaması şöyle.
Topological sort is used in project planning to decide which tasks should be executed first.
Disjoint sets help you efficiently calculate currency conversions between NxN currencies in linear time
Graph coloring can in theory be used to decide which seats in a cinema should remain free during a infectious disease outbreak.
Detecting strongly connected components helps uncover bot networks spreading misinformation on Facebook and Twitter.
DAGs are used to perform very large computations distributed over thousands of machines in software like Apache Spark and Tensorflow
For instance, the vertices of the graph may represent tasks to be performed, and the edges may represent constraints that one task must be performed before another; in this application, a topological ordering is just a valid sequence for the tasks. A topological ordering is possible if and only if the graph has no directed cycles, that is, if it is a directed acyclic graph (DAG)
Root hariç her düğümde 3 pointer ve en az 1 leaf node olmalı.
Algorithms like Dijkstra's enable your navigation system / GPS to decide which roads you should drive on to reach a destination.
The Hungarian Algorithm can assign each Uber car to people looking for a ride (an assignment problem)
Chess, Checkers, Go and Tic-Tac-Toe are formulated as a game tree (a degenerate graph) and can be "solved" using brute-force depth or breadth first search, or using heuristics with minimax or A*
Flow networks and algorithms like maximum flow can be used in modelling utilities networks (water, gas, electricity), roads, flight scheduling, supply chains.
Bayesian networks were used by NASA to select an operating system for the space shuttle
Neural networks are used in language translation, image synthesis (such as fake face generation), color recovery of black-and-white images, speech synthesis
A —> B —> <— C
|
v
E <— F —> D —> G
X -> <- Y
node : neighbors
A : [B]
B : [C, E]
C : [B]
D : [G]
E : []
F : [E, D]
G : []
X : [Y]
Y : [X]A--5--B
| /
2 3
| /
C4. Graph İçin Kullanılan Temel Veri Yapıları* 1 -> 2 4
* 2 -> 3 1
* 3 -> 2 4
* 4 -> 3 1Düğümün komşularını saklamak için vector, list, hashmap gibi herhangi bir veri yapısı kullanılabilir. Basit bir Java örneğipublic class SimpleAdjacencyList {
private Map<Integer, List<Vertex>> adjacencyList = new HashMap<>();
}Yukarıdaki kodda Map Value değeri için şöyle bir sınıf tanımlamak daha iyi olabilir.public class DirectedGraphNode {
String val;
List<DirectedGraphNode> neighbors;
}What is Session Fixation?In Session Fixation attacks, the attacker hijacks a valid user session. We said that we sign the cookie in order to be sure that no one can hijack another user's valid session. But what if the attacker has his own valid session and tries to associate it with another user? in this case he can perform actions on behalf of the victim.The problems occur when we are not generating new sessionIds(unique identifier) on actions like Login.How can the Attacker do this?One of the cases is when attacker has physical access to the computer. As an attacker, I go to the university and I choose one of the shared computers, then I sign into my account on the vulnerablewebsite.com and then without doing the logout (which normally destroys the session in the server store), I leave an open login page on vulnerablewebsite.com and before that I have to copy my valid sessionId. Now the victim is using this computer and if the victim signs in, the attacker sessionId is associated with the victim's account.
Redis Changes its Protocol: From version 7.4, Redis will use RSALv2 and SSPLv1 protocols instead of fulfilling the OSI’s definition of “open-source software.”
Redis is no longer open source. In March 2024 the project was relicensed, leaving its vast community confused.
Following the announcement on Redis relicensing, several forks of the project started to pop up, such as Redict and Garnet.
Valkey was established under The Linux Foundation by former Redis maintainers, and brought together important figures from the Redis community, as well as leading industry giants including AWS, Google Cloud, Oracle and others. Valkey has rapidly gained momentum and just reached General Availability (GA).
Valkey keeps Redis’ existing open source license, namely BSD 3-clause.
Valkey’s Technical Steering Committee currently has six members: Madelyn Olson of Amazon, Zhao Zhao of Alibaba, Ping Xie of Google, Viktor Söderqvist of Ericsson, Wen Hui of Huawei and Zhu Binbin of Tencent. They duly deserve the credit for initiating and driving the fork.Linux dağıtımları da Valkey'e dönmeye başladılar. Bunlar AlmaLinux, Fedora, Alpine, Ubuntu
MessagePack is a great choice when you need a balance between speed and cross-language compatibility. It’s suitable for real-time applications and situations where data size reduction is crucial.