开箱

那张XFX的就是本次评测的主角了,可以看到有很多的灰
打电话咨询客服后得知,本卡于2017年4月8日出货,按理还有半年保修

清灰


基本清干净了,换了下硅脂(NT-H1),放弃保修
拆开可以看见硅脂已经硬了,烤鸡温度直飙90

性能

刚拿到手习惯性提取BIOS看了一下

可以看到被降频,显存时序被改,增加TDP等

无法接受
于是刷入了RX474深红的BIOS

附上娱乐大师跑分

最近娱乐大师很恶心,各种弹窗,跳转双十一天猫,跑完马上卸了

Radeon Wattman 超频



娱乐大师16.2万,超过部分1060,不得不说,尔必达/镁光显存确实不如三星耐超,1850最高了,三星2000基本盘

3DMARK


1320/1800 FSE

1320/1800 TS

致敬退役卡

从上到下依次为

  • ASUS Radeon HD7770 1GB
  • ASUS Radeon R9 270 OC 2GB
  • ZOTAC GeForce GTX760 2GB Extreme OC+

后记

总的来说,418顺丰包邮的XFX RX470 4G 黑狼真的超值,接近GTX1060 6GB的性能 + 超低的价格,对于广大垃圾佬来说确实不错。
不过,买矿卡=摸奖确实不假,请酌情下手。
今天,山东大量雷锋474矿卡下架,可以去咸鱼看看,399包邮。
如果有机会的话,会再买一张交火玩🍻

由于项目需要,我们建立了某日本插画网站的全站作品和图片数据库。
利用php-phash为每张图片生成了唯一的标识码,通过计算汉明距离进行匹配。
那么有了这些数据之后,就应该开始搭建图片搜索引擎了。

数据量

  • 作品数:3700万左右
  • 空间:1.9TB
  • 数据库:MongoDB 4.0.3

前端

  • pixiv.FUN RiseFront - 可通过Redis缓存搜索结果,组织搜索队列
  • NGINX - 反向代理RiseFront

后端

  • Pifrise - 全称为pixiv.FUN Reverse Image Search Engine

    • 通过连接MongoDB初始化数据,以及作品信息
    • 接口为HTTP协议
    • 只支持全部搜索
    • Java
  • AoiHammer - 开源的汉明距离搜索引擎,通过本地文件初始化数据

    • 接口为TCP ANSI协议
    • 支持摘要搜索和全部搜索
    • C++

性能

  • Pifrise

    • i5-2300 3600w 900ms
    • E5645 x2 3650w 490ms
    • Mem: 6GB
  • AoiHammer

    • F i5-2300 3600w 100~200ms
    • S i5-2300 3600w 500ms
    • Mem: 8GB

iTXTech Rpf

是一个为 SimpleFramework 2.1swoole 4.2 设计的可扩展的反向代理框架

几行代码就能完成一个可用的反向代理

require_once "load_env.php";

use iTXTech\SimpleFramework\Console\Logger;
use iTXTech\Rpf\{Handler, Launcher};
use Swoole\Http\{Request, Response};
use Swoole\Coroutine\Http\Client;

Logger::info("Constructing");
$launcher = (new Launcher())
    ->listen("127.0.0.1", 80)
    ->handler(new class() extends Handler{
        public function ssl(bool $ssl){
            $this->ssl = true;
        }

        public function request(Request $request){
            Logger::info("Got request from " . $request->server["remote_addr"] . " to " .
                $request->header["host"] . $request->server["request_uri"]);
        }

        public function complete(Request $request, Response $response, string $body){
            Logger::info("Got response from " . $request->header["host"] . $request->server["request_uri"] .
                " len: " . strlen($body));
        }

        public function response(Request $request, Response $response, Client $client){
            $response->header["X-Powered-By"] = "iTXTech Rpf";
            $client->body .= "\n<!-- Powered by iTXTech Rpf --!>";
        }
    });

Loader::load($launcher);

开源协议

Copyright (C) 2018 iTX Technologies

Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at

    http://www.apache.org/licenses/LICENSE-2.0

Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.

Introduction

Bypass TLS reset (based on Server Name Indication detection) of GFW on iOS.
Details for the GFW's new feature

RESEARCH ONLY PROJECT

Roadmap

  1. Find a web framework to implement a Reverse Proxy (Kitura or Perfect)
  2. Test on macOS first
  3. Integrate with OpenSSL for self-signed certificate
  4. Build an iOS app
  5. Use Network Extension to setup a VPNService in order to intercept packets with a TUNInterface
  6. Maybe NEKit will be used to modify packets for redirection

Notes

  1. This project will be my first Swift/Objective-C project.
  2. All these technologies has been tested on Android (Using Undertow or Nginx)
  3. Contributions are welcomed. See my GitHub homepage.

Records