


Differences and installation steps of memcache/memcached in 64-bit systems under win7
This article introduces the difference between memcache and memcached and their installation steps! Hope this helps beginners!
The difference between memcache and memcached
I plan to fully apply memcached technology in my new program. It is easy to understand that memcached is a memory cache, but why is there still memcache?
It’s actually very simple, memcache is an extension of php, used for php to manage memcached, php-memcache.dll.
If memcached is installed but the extension is not installed, then PHP cannot control memcached, but there is no problem in using the command line
If the memcache extension is installed but the memcached service is not installed, then this cannot be used
Only when the memcached service and memcache extension are installed at the same time can you use memcached in PHP to improve dynamic website performance
Steps to install memcached under win7 system 64-bit:
Download memcached-win32-1.4 .4-14.zip, unzip it to disk, for example D:memcached
Run cmd as administrator and go to the folder where memcached is located, for example: cd d:memcached
-
Install memcached :
d:memcached> memcached.exe -d install
(No prompts on the screen afterwards)
-
Start memcached:
d:memcached&g t;memcached.exe -d start
(There will be no prompts on the screen afterwards, but if you check "Show all user processes" in "Task Manager", you can see that the memcached.exe process is running)
-
memcached basic parameter settings:
-p The listening port
-l The IP address of the connection, the default is the local machine
-d start Start the memcached service
-d restart Restart the memcached service
-d stop|shutdown Close the running memcached service
-d install Install memcached service
-d uninstall Uninstall memcached service
-u Run as (only valid when running as root) -m Maximum memory Use, unit MB. Default 64MB
-M Returns an error when memory is exhausted instead of deleting items
-c Maximum number of simultaneous connections, the default is 1024
-f Block size growth factor, the default is 1.25
-n Minimum Allocate space, key+value+flags defaults to 48
-h displays help
When setting parameters, you need to stop memcached first, and then use the command line to set it, such as: d:memcached> memcached.exe -m 1 -d start Stop memcached: -
d:memcached> memcached.exe -d stop
Uninstall memcached: -
cached> memcached.exe -d uninstall
memcache.dll: http://pecl.php.net/package/memcache Download and place it in the php/ext extension file. Then modify php.ini and add extension=php_memcache.dll

Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Notepad++7.3.1
Easy-to-use and free code editor

SublimeText3 Chinese version
Chinese version, very easy to use

Zend Studio 13.0.1
Powerful PHP integrated development environment

Dreamweaver CS6
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

Hot Topics











Export password-protected PDF in Photoshop: Open the image file. Click "File"> "Export"> "Export as PDF". Set the "Security" option and enter the same password twice. Click "Export" to generate a PDF file.

H5. The main difference between mini programs and APP is: technical architecture: H5 is based on web technology, and mini programs and APP are independent applications. Experience and functions: H5 is light and easy to use, with limited functions; mini programs are lightweight and have good interactiveness; APPs are powerful and have smooth experience. Compatibility: H5 is cross-platform compatible, applets and APPs are restricted by the platform. Development cost: H5 has low development cost, medium mini programs, and highest APP. Applicable scenarios: H5 is suitable for information display, applets are suitable for lightweight applications, and APPs are suitable for complex functions.

The key differences between CentOS and Ubuntu are: origin (CentOS originates from Red Hat, for enterprises; Ubuntu originates from Debian, for individuals), package management (CentOS uses yum, focusing on stability; Ubuntu uses apt, for high update frequency), support cycle (CentOS provides 10 years of support, Ubuntu provides 5 years of LTS support), community support (CentOS focuses on stability, Ubuntu provides a wide range of tutorials and documents), uses (CentOS is biased towards servers, Ubuntu is suitable for servers and desktops), other differences include installation simplicity (CentOS is thin)

The necessity of registering VueRouter in the index.js file under the router folder When developing Vue applications, you often encounter problems with routing configuration. Special...

Detailed explanation of XPath search method under DOM nodes In JavaScript, we often need to find specific nodes from the DOM tree based on XPath expressions. If you need to...

不同数据库系统添加列的语法为:MySQL:ALTER TABLE table_name ADD column_name data_type;PostgreSQL:ALTER TABLE table_name ADD COLUMN column_name data_type;Oracle:ALTER TABLE table_name ADD (column_name data_type);SQL Server:ALTER TABLE table_name ADD column_name data_

Laravel and ThinkPHP are both popular PHP frameworks and have their own advantages and disadvantages in development. This article will compare the two in depth, highlighting their architecture, features, and performance differences to help developers make informed choices based on their specific project needs.

The state of the CentOS firewall can be viewed through the sudo firewall-cmd --state command, returning to running or not running. For more detailed information, you can use sudo firewall-cmd --list-all to view, including configured areas, services, ports, etc. If firewall-cmd does not solve the problem, you can use sudo iptables -L -n to view iptables rules. Be sure to make a backup before modifying the firewall configuration to ensure server security.
