A mimic database interaction method and device applied in a network operating system
A technology of operating system and interactive method, which is applied in the field of network equipment operating system and database, can solve problems such as lack of ability to resist unknown risks, difficulty in guaranteeing database security, etc., and achieve the effects of improving flexibility, improving security, and saving costs
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0035] In order to make the objectives, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail below through the accompanying drawings and embodiments. However, it should be understood that the specific embodiments described herein are only used to explain the present invention, and not to limit the scope of the present invention. Also, in the following description, descriptions of well-known structures and techniques are omitted to avoid unnecessarily obscuring the concepts of the present invention.
[0036] refer to figure 1 , an embodiment of the present invention provides a mimic database interaction method applied in a network operating system, where the network operating system includes a basic operating system and a plurality of containers running on the basic operating system, and the containers include a business container cluster and a mimic database A container cluster, the mimic database conta...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


