“cache”可以造什么句,cache造句

来源:语文精选馆 3.14W
cache造句

The configured sized of each cache.

Also since Cayenne query cache is pluggable, users can rely on event mechanism of their cache provider to implement JMX monitoring of cache independently from Cayenne.

If it is, it loads the class from the cache.

Each cache type can have a different expiration period setup.

This means the write-behind cache must reliably keep the data in the cache until it can be written to disk.

When you retrieve the object from another mechanism, you should set that object to the cache so that the next retrieval can get it directly from the cache.

If it is not in the cache, you know this is a valid request and you process and store the item in the cache.

This will cause uneven load on your cache in terms of memory and processing.

After some time this page will refresh and look again for data in the cache.

When a file is updated, its removal from cache depends on what this parameter is.

This increases the latency of the task's memory access until its data is in the cache of the new CPU.

The page cache stores the entire page as a single entity, so when shuffling between pages using the back and forward functions of the browser the page loads immediately from the cache.

This data region performs well, and most JCS users designate it as the default cache region to use first.

For performance reasons, it is advantageous to configure caches to be non-shared and to explicitly invalidate cache entries.

If the connection is slow, then the XML gateway raises an alert, or takes remedial action such as using a response from its cache.

Need to cache data from a database or other backend data store that needs to be accessed at speeds that would otherwise be unattainable?

Matching work partitions to their data partitions will increase the probability of a cache hit within the server and decrease remote accesses to the database, which introduces quite a bit of latency.

Predictive loading is a strategy by which when you load an object (say, upon a cache miss) and then guess which other related objects might also need at the same time and load them as well.

The discoverer of the Jefferson bottles, a German pop-band manager turned wine dealer called Hardy Rodenstock, would not say who had sold them to him, or even how many were in the cache.

Because the cache can persist indefinitely, filesystem updates that invalidate classes in the cache may occur.

Coordinating the invalidation of stale cache data as well as the replication of updated across an N-tier cache.

By separating the two elements of the structure into two different cache lines, modification of one cache line does not cause another cache line to be read in again from the memory.

If the cache is full, the first entry to be evicted from the cache is the entry that is closest to expiration.

The returned event objects are immutable and the application can cache them beyond the parsing process.

If you were to store the data in a real cache, then the system could discard parts of the cache to gain memory for other tasks because the client can always re-create the cached data.

By using a cache in this way, the effects of a cloud service outage can be mitigated.

Where appropriate, this information can be cached in memory, but beware of the potential challenges that surround keeping the cache consistent in a distributed environment.

每个pod具有自己的处理器和内存,并通过一条高速缓存一致*互连总线(cache -coherentinterconnectbus)连接到较大的系统

Have all cache entries time out.

Set the catalog cache, package cache, and log buffer size to an appropriate size to improve performance.

Initializing the slab allocator and creating slab caches for VFS, buffer cache, etc.

This is a good debugging technique to make sure a problem isn't resulting from stale data in the browser cache.

By padding 28 bytes of the first element in the shared_data_align structure, the elements of the structure can be separated into two different cache lines.

This variable controls the cache recycle size limitation.

If all the data fits in the cache, then the data is read from disk only once; after that, all requests are satisfied from the cache at memory speed.

The first option requires you to stop and restart all the node agents in order to clear the "stale" cache in the node agent JVM that points to the old IP address for the server.

The database is now offloaded as it gets writes from the cluster, all reads are satisfied using the cache in the cluster member.

More precisely, any application can lookup any cache in JNDI if the cache is accessible from that server and then see (or modify) all of its contents.

热门标签