I recently got the AWS solutions architect associate certificate in July 2019, and wanted to share my notes with anyone who might benefit from it. The path I followed was
So you should go through the notes only after you have done a course that explains the basics, such as the one from ACloudGuru. Also, full disclosure, the links to the above courses are referral ones. So if these notes helped you and you're planning to buy the courses or practices tests, please consider going through the links when you're buying.
Note — You can also check out this blog post where I describe my preparation strategy in detail.
The five pillars are —
Key AWS Service — AWS CloudFormation.
Key AWS Service — AWS Identity and Access Management (IAM).
Key AWS Service — Amazon CloudWatch.
Key AWS Service — Amazon CloudWatch.
Key AWS Service — Cost Explorer.
Main functions of Route53 —
It's not used to distribute traffic.
CNAME vs ALIAS —
ALIAS only supports the following services —
Route53 does not directly log to S3 bucket, we can forward that from Cloudwatch, but can't do it directly.
Types of Route53 health checks —
Multivalue answer routing policy responds with upto 8 healthy records selected at random.
Weighted routing policy is a good fit for blue-green deployments.
In a newly created S3 bucket, everything // every additional option is turned off by default. Also, no bucket policy exists.
S3 bucket properties are —
Object level properties—
Metadata and Storage class are object level properties. All object level properties are
DELETE operation does not keep a copy unless you have versioning enabled. From the docs
The DELETE operation removes the null version (if there is one) of an object and inserts a delete marker, which becomes the current version of the object. If there isn't a null version, Amazon S3 does not remove any objects.
S3 is a managed service. It can't be part of a VPC.
S3 object metadata—
User defined metadatas must start with x-amz-meta
.
When you enable logging on a bucket, the console both enables logging on the source bucket and adds a grant in the target bucket's access control list (ACL) granting write permission to the Log Delivery Group.
S3 bucket endpoints formats —
Update — AWS will stop supporting the URL path format for buckets created after September 30, 2020. Read this for details.
Object sizes —S3 can store objects of size 0 bytes to 5 TB.A single PUT can transfer 5 GB max. For files larger than 100MB, multipart upload is recommended.
Cross-region replication requires that versioning be enabled on both the source bucket and the destination bucket.
AWS Glacier archive retrieval options —
To increase performance, we can prefix each object name with a hash key along with the current date. But, according to the new S3 performance announcement, this is not needed anymore.
Increasing performance in S3 —
In the CORS configuration, the exact URLs must be added, with the correct protocol, i.e. http vs https.
S3 does not support OPTIONS
, CONNECT
and TRACE
methods.
S3 encryptions —
To make sure that S3 objects are only accessible from Cloudfront, create an Origin Access Identity (OAI) for Cloudfront and grant access to the objects to that OAI.
We can create event notification in S3 to invoke lambda function.
Customer managed S3 encryption workflow —
Generate a data key using Customer managed CMK. Encrypt data using data key and delete data key. Store encrypted data key and data in S3 buckets. For decryption, use CMK to decrypt data key into plain text and then decrypt data using plain text data key.
AWS S3 performance —
Provisioned capacity should be used when we want to guarantee the availability of fast expedited retrieval from S3 Glacier within minutes.
For S3 static website hosting, the default provided URL is https://bucket-name.s3-website-aws-region.amazonaws.com.
S3 server side encryption uses AES 256.
S3 event notification targets —
An 80 TB Snowball appliance and 100 TB Snowball Edge appliance only have 72 TB and 83 TB of usable capacity respectively.
For static website hosting with S3, the name of the bucket must be the same as the domain or subdomain name.
Preventing accidental deletion of S3 objects —
Amazon Redshift Enhanced VPC Routing provides VPC resources the access to Redshift.
Amazon ElastiCache offers fully managed Redis and Memcached.
Cross-region replication can be setup for Redshift Clusters.
Redshift encryption —
RDS data size limits —
During automated backup, Amazon RDS performs a storage volume snapshot of entire Database instance. Also, it captures transaction logs every 5 minutes.
AWS RDS is a service whereas AWS Aurora is a database engine.
For Redshift, spot instances are not an option.
Encryption of RDS — Have to enable it on database creation. Also, not all instance classes support encryption, we have to choose one which supports it.
To enable multi-region replication of RDS, we have to use Read Replicas. Multi-AZ is not the solution here.
RDS Read Replicas are synced asynchronously, so it can have replication lag.
Redshift automated snapshot retention period — 1 day to 35 days.
We can't use auto-scaling with RDS. To improve performance, we should look to sharding instead. Starting from June 20, we can use auto-scaling with RDS instances.
We configure RDS engine configurations using parameter groups.
To use REDIS AUTH with ElastiCache, in-transit encryption must be enabled for clusters.
For RDS, Enhanced Monitoring gathers its metrics from an agent on the instance.
In case of a failover, Amazon RDS flips the canonical name record (CNAME) for your DB instance to point at the standby.
Aurora endpoints, by default —
We can create additional custom endpoints that load balance based on specified criteria.
With Redshift Spectrum, we can run complex queries on data stored in S3.
We can use WLM in the parameter group configuration of Redshift to define number of query queues and how queries are routed to those queues.
The memory and processor usage by each process in an RDS instance can not be monitored by Cloudwatch, we have to use RDS Enhanced Monitoring for that. Because Cloudwatch monitors the hypervisor, not the individual instances.
IAM DB authentication can be used with MySQL and PostgreSQL. With this, you don't need to use a password when you connect to a DB instance. Instead, you use an authentication token.
Instance store —You cannot add instance store volume to an instance after it's launched.Not all EC2 instance types support instance store volume.
Persistence — Instance store persists during reboots, but not stop or terminate. EBS volumes however persists accross reboot, stop, and terminate.
EBS volume types —
Also, to note, HDDs cannot be boot volumes.
We can use Amazon Data Lifecycle Manager to automate taking backups // snapshots of EBS volumes, and protect them from accidental or unwanted deletion.
EBS-optimized EC2 instances provide additional, dedicated capacity for EBS IO. Helps squeeze out the last ounce of performance.
Encrypted EBS volumes are not supported on all instance types.
To get more performance out of EBS volumes —
VolumeRemainingSize is not an Cloudwatch metric for EBS volumes.
EBS volume types —
By default, EBS volumes are automatically replicated within their availability zone, and offers a significant high availability.
AWS Cloudwatch Logs can be used to monitor and store logs from EC2 instances. The instance needs awslogs log driver installed to be able to send logs to CloudWatch. We don't need any database or S3 for storage.
Cloudwatch logs agent is more efficient than AWS SSM Agent.
With EC2 dedicated hosts we have control over number of cores, not anywhere else.
Placement groups —
The console does not support placement groups, have to do it from CLI.
Cluster Placement groups have very low inter-note latency.
Hibernation of EC2 instances —
Default Cloudwatch metrics —
Custom metrics —
Reserved Instances that are terminated are still billed until the end of their term according to their payment option.
Upon stopping and starting an EC2 instance —
EBS is lower-latency than EFS.
The maximum ratio of provisioned IOPS to requested volume size (in GiB) is 50:1.
For new accounts, Amazon has a soft limit of 20 EC2 instances per region, which can be removed by contacting Amazon.
You can attach a network interface (ENI) to an EC2 instance in the following ways —
EBS snapshots are more efficient and cost-effective solution compared to disk mirroring using RAID1.
EBS volumes can only be attached to an EC2 instance in the same Availability Zone.
EBS snapshot creation — In usual scenarios EBS volume snapshots can be created at the same time it's in usage. But when using RAID configurations, there are additional complexities and we should stop every IO operation and flush the cache before taking a snapshot.
Cloudwatch alarm actions can automatically start, stop or reboot EC2 instances based on alarms.
With scheduled reserved instances, we can plan out our future usage and get reserved instances in those planned time-frame only.
Throughput optimized HDD vs Cold HDD — Throughput optimized is used for frequently accessed data, whereas Cold HDD is used for infrequently accessed data. Also the later is more cost-effective.
RAID0 vs RAID1 —
Larger EC2 instances have higher disk data throughput. This can be used in conjunction with RAID 0 to improve EBS performance.
EFS supports cross availability zone mounting, but it is not recommended. The recommended approach is creating a mount point in each availability zone.
You can mount an EFS file system in only one VPC at a time. If you want to access it or mount it from another VPC, you have to create a VPC peering connection. You should note that all of these must be within the same region.
NFS port 2049 for EFS.
Encryption
Performance mode
Throughput mode
Patching an AMI for an auto scaling group, the procedure is —
Note that AMI ID is set during creation of launch configuration and cannot be modified, so we have to create a new launch configuration.
Default metric types for a load balancer —
Monitoring Application Load Balancers —
Adding lifecycle hooks to ASGs put instances in wait state before termination. During this wait state, we can perform custom activities. Default wait period is 1 hour.
ASG Dynamic Scaling Policies —
If you are scaling based on a utilization metric that increases or decreases proportionally to the number of instances in an Auto Scaling group, we recommend that you use target tracking scaling policies. Otherwise, we recommend that you use step scaling policies.
The ELB service does not consume an IP address, it's the nodes that consume one IP address each.
Auto-scaling ensures —
ELBs can manage traffic within a region and not between regions.
For unstable scaling behavior, that is scaling multiple times frequently, the following things can be done —
Default cooldown period is 300 seconds.
Port based routing is supported by Application Load Balancer.
Network Load Balancer can be used to terminate TLS connections. For this, NLB uses a security policy which consists of protocols and ciphers. The certificate used can be provided by AWS Certificate Manager.
Connection draining enables the load balancer to complete in-flight requests made to instances that are de-registering or unhealthy.
ASG termination policy —
Load balancer does not create or terminate instances, that's done by auto scaling group.
Consumers must delete an SQS message manually after it has done processing the message. To delete a message, use the ReceiptHandle of a message, not the MessageId.
Incoming messages can trigger a lambda function.
We can use dead letter queues to isolate messages that can't be processed right now.
SQS does not encrypt messages by default.
Default visibility timeout for SQS is 30 seconds.
Each FIFO Queue uses —
For application with identical message bodies, use unique deduplication ID, while for unique message bodies, use content-based deduplication ID.
Both the default and maximum batch size for ReceiveMessage
call of SQS is 10.
Reducing SQS API calls —
DeleteMessage
requests in batch using DeleteMessageBatch
. Other batch actions are SendMessageBatch and ChangeMessageVisibilityBatch
.Message retention period in SQS — 1 minute to 14 days. The default is 4 days.
Limit on number of inflight messages — 120,000 for standard queue and 20,000 for FIFO queue.
Available protocols for AWS SNS —
We can add filter policies to individual subscribers in an SNS topic.
SNS message attributes are —
With Amazon SNS, there is a possibility of the client receiving duplicate messages.
API Gateway can integrate with any HTTP based operations available on the public internet, as well as other AWS services.
Integration types —
For connecting API Gateway to a set of services hosted in an on-premise network, we can use
API Gateway Throttling —
Throttling behaviors —
429 Too Many Requests
error.When it comes to throttling settings, you can override stage settings on an individual method within the stage. That is, there is an option for method level throttling to override stage level throttling.
Access control mechanisms for API Gateway —
API Gateway automatically protects the backend systems from DDoS attack.
Cache properties and settings —
Monitoring API Gateway usage — we can use CloudWatch or Access logging. Access logging logs who accessed the API and how the caller accessed the API, CloudWatch does not include this data.
Protect backend systems behind API gateway from traffic spikes —
Lambda functions can be run within a private VPC.
Lambda can read events from —
Services that can invoke Lambda functions —
AWS CodePipeline and AWS OpsWorks can't invoke lambda functions.
For failures we can configure lambda to send non-processed payloads to SQS Dead letter queue. Then we can configure SNS to send a notification if we want. Lambda does not have an in-built mechanism for notification upon failure.
A policy on a role defines which API actions can be made on the target, it does not define whether the source can access the target or not.
Each lambda function has an ephemeral storage of 512 MB in the tmp
directory.
AWS CloudWatch rule can be configured to trigger a lambda function. While configuration, the following can be used as input to the target lambda function —
The following CloudFront events can trigger lambda function —
Lambda function update has eventual consistency. Which means, for a brief window of less than a minute, it may execute either the old version or the new version.
We can use alias versions to point to another version. This can enable easier upgradation from the viewpoint of a consumer.
Limits —
tmp
directory storage: 512 MB.To grant cross-account permission to a function, we have to modify the function policy, not the execution role policy.
The console doesn't support directly modifying permissions in a function policy. You have to do it from the CLI or SDK.
If we run lambda functions inside a VPN, they use subnet IPs or ENIs. There should be sufficient ones otherwise it will get throttled.
ENI capacity = Projected peak concurrent executions * (Memory in GB / 3 GB).
The lambda console provides encryption and decryption helpers for encryption of environment variables.
By default, the a KMS default service key is used for encryption, which makes the information visible to anyone who has access to the lambda console. For further restriction, create a custom KMS key and use that to encrypt.
CloudWatch metrics for Lambda —
We can get the function version within the function using —
getFunctionVersion
from the Context object.AWS_LAMBDA_FUNCTION_VERSION
environment variable.Lambda Retry upon Failure Behavior —
Lambda traffic shifting —
We cannot route traffic to a NAT gateway or VPC gateway endpoints through a VPC peering connection, a VPN connection, or AWS Direct Connect. A NAT gateway or VPC gateway endpoints cannot be used by resources on the other side of these connections. Conversely, a NAT gateway // VPC gateway endpoints cannot send traffic over VPC endpoints, AWS VPN connections, Direct Connect or VPC Peering connections either.
Every route table contains a local route for communication within the VPC over IPv4. We cannot modify or delete these routes.
VPC endpoints always take precedence over NAT Gateways or Internet Gateways.
Network ACL rules are evaluated in order, starting with the lowest numbered rule. As soon as a rule matches, it is applied regardless of any higher numbered rule that may contradict it.
SSH connections are between port 22 of the host and an ephemeral port of the client. In fact, this is true for any TCP service.
Security groups are stateful, this means any connection initiated successfully will be completed.
We can create S3 proxy server for enabling use cases where S3 has to be accessed privately through VPN connection, AWS Direct Connect or VPC peering.
AWS reserves 5 IPs for every subnet, not for every VPC.
Instances in custom VPCs don't get public DNS hosts by default, we have to set the enableDnsHostnames
attribute to true. The enableDnsSupport
is to be set to true too, but that is done by default.
We can set a custom route table as the main route table.
We can add secondary CIDR ranges to an existing VPC. When a secondary CIDR block is added to a VPC, a route for that block with target as "local" is automatically added to the route table.
VPC peering connection route contains Target as pcx-xxxxxx
.VPN connection // Direct Connect connection route contains Target as vgw-xxxxxx
.
VPN is established over a Virtual Private Gateway.
There are two types of VPC Endpoints —
Difference between DirectConnect and VPN — DirectConnect does not involve the Internet, while VPN does.
AWS Direct Connect doesn't encrypt in transit data, while VPN does.
To establish a VPN connection, we need —
To setup AWS VPN CloudHub —
The allowed block size in VPC is between a /16 netmask (65,536 IP addresses) and /28 netmask (16 IP addresses).
The following VPC peering connection configurations are not supported —
We can move part of our on-premise address space to AWS. This is called BYOIP. For this, we have to acquire a ROA, Root Origin Authorization from the the regional internet registry and submit it to Amazon.
AWS DynamoDB is durable, ACID compliant, can go through multiple schema changes, and changes to the database does not result in any database downtime.
DynamoDB Global Tables can be used to deploy a multi region, multi AZ, fully managed database solution.
We can create secondary indexes for DynamoDB tables. Always choose DynamoDB when possible.
DynamoDB streams can be used to monitor changes made to a database, and they can trigger lambda functions.
We can turn on autoscaling for DynamoDB.
For write heavy use cases in DynamoDB, use partition keys with large number of distinct values.
DynamoDB Accelerator, DAX is an in-memory cache for DynamoDB that reduces response time from milliseconds to microseconds.
Launch types —
All types of instances, i.e. on-demand, spot and reserved can be used with ECS.
Docker containers and ECS are particularly suited for batch job workloads as they can get embarassingly parallel.
Amazon ECS enables you to inject sensitive data into your containers by storing your sensitive data in either —
AWS Elastic Beanstalk can be used to create —
It should not be used to create tasks which are run once or on a nightly basis, because the infrastructure is provisioned and will be running 24/7.
Elastic Beanstalk can be used to host Docker containers.
AWS Storage Gateways—
Amazon Cognito has two authentication methods, independent of one another —
AWS Directory Service options —
There is no default policy ever, anywhere. When permissions are checked, roles and policies are considered together, and in the default case there is no policy, so only the role is considered.
We can configure IAM policies that allows access to specific tags.
Connecting AWS SSO to On-Premise Active Directory —
For two-step verification, SSO sends code to registered email. It can set to be either —
Cross-account IAM roles allow customers to securely grant access to AWS resources in their account to a third party.
If our identity store is not compatible with SAML, we can develop a custom application on-premise and use it with STS.
Microsoft Active Directory supports SAML.
KMS master keys are region specific.
CloudHSM backup procedure — Ephemeral backup key (EBK) is used to encrypt data and Persistent backup key (PBK) is used to encrypt EBK before saving it to an S3 bucket in the same region as that of AWS CloudHSM cluster.
With AWS CoudHSM, we can control the entire lifecycle around the keys.
AWS KMS API can be used to encrypt data.
Kinesis stream data retention period — 24 hours (default) to 168 hours.
For Kinesis, we have to use VPC Interface Endpoint, powered by AWS PrivateLink.
Amazon Kinesis Scaling Utility is a less cost-effective solution compared to doing it with Cloudwatch alarms + API Gateway + Lambda function.
Kinesis data streams store the data, by default for 24 hours and upto 7 days. Whereas Kinesis Firehose stream the data directly into either —
Kinesis — If ShardIterator expires immediately and data is lost, we have to increase the write capacity assigned to the Shard table.
AWS EMR — AWS Elastic MapReduce, Hadoop based big data analytics.
AWS EMR is preferred for processing log files.
EMR can use spot instances as underlying nodes.
We can access the underlying EC2 instances in AWS EMR cluster.
AWS STS — The policy of the temporary credentials generated by STS are defined by the intersection of your IAM user policies and the policy that you pass as argument.
AWS VM Import // Export can be used to transfer virtual machines from local infrastructure to AWS and vice-versa.
AWS Trusted Advisor is a resource that helps users with cost management, performance and security.
We can create a CloudTrail log across all regions.
CloudFormation Drift Detection can be used to detect changes in the environment. Drift Detection only checks property values which are explicitly set by stack templates or by specifying template parameters. It does not determine drift for property values which are set by default.
AWS Server Migration Service (SMS) is an agentless service which makes it easier and faster for you to migrate thousands of on-premise workloads to AWS.
AWS Athena is a managed service which can be used to make interactive search queries to S3 data.
Amazon Inspector is a security assessment service, which helps improve security and compliance of applications.
AWS Opsworks is a configuration management service for Chef and Puppet. With Opsworks Stacks, we can model our application as a stack containing different layers.
By default, CloudTrail logs are encrypted using S3 server-side encryption (SSE). We can also choose to encrypt with AWS KMS.
Amazon ECS for Kubernetes (EKS) exists, it's a managed service.
Changes to CloudTrail global service event logs can only be done via the CLI or the SDKs, not the console.
For CloudFront query string forwarding, the parameter names and values used are case sensitive.
AWS Polly — Lexicons are specific to a region. For a single text appearing multiple times, we can create alias using multiple Lexicons.
Amazon Quicksight is a managed service for creating dashboards with data visualization.
AWS Athena pricing is based upon per query and amount of data scanned in each query. To reduce price —
AWS CloudSearch helps us add search to our website or application. Like Elasticsearch.
AWS Glue is a fully managed ETL service for data. It keeps a track of processed data using Job Bookmark. Enabling Job Bookmark will help to scan only changes since last bookmark and prevent processing of whole data again.
AWS X-Ray — Helps debug and analyze microservices architecture.
Reducing cost with AWS X-Ray — Sampling at a lower rate.
Amazon WorkDocs has a poweruser facility, which on enabling restricts sharing of documents to that user only.
AWS Data Pipeline can automate the movement and transformation of data for data-driven workflows. For example, transferring older data to S3 from DynamoDB.
Disaster recovery solutions —
With AWS Config, we can get a snapshot of the current configuration of our AWS account.
For queue based processing, scaling EC2 instances based on the size of the queue is a preferred architecture.
It's best practice to launch Amazon RDS instance outside an Elastic Beanstalk environment.
AWS Athena is simpler and requires less effort to set up than AWS Quicksight.
RI Coverage Budget reports number of instances that are part of Reserved Instance. For an organisation using default IAM policy, each member account owner needs to create a budget policy for individual accounts and not by master account.
Consolidated Billing in AWS Organisations combines usage from all accounts and billing is generated based upon total usage. Services like EC2 and S3 have volume pricing tiers where with more usage volume the overall charge decreases.
To automatically trigger CodePipeline with changes in source S3 bucket, use CloudWatch Events rule and CloudTrail trail.
Amazon Data Lifecycle Manager can be used for creation, retention and deletion of EBS snapshots.
With AWS Organizations, we can centrally manage policies across multiple AWS accounts. With Service Control Policies (SCPs), we can ensure security policies are in place.
AWS WAF is a web application firewall.
In AWS Managed Blockchain network, the format for resource endpoint is — ResourceID.MemberID.NetworkID.managedblockchain.us-east-1.amazonaws.com:PortNumber
.
When you want to keep your expenditure within a budget, use AWS Budgets, not AWS Cost Explorer.
Cloudwatch monitoring schemes —
Transferring data from an EC2 instance to Amazon S3, Amazon Glacier, Amazon DynamoDB, Amazon SES, Amazon SQS, or Amazon SimpleDB in the same AWS Region has no cost at all.
We can use signed URLs and signed cookies with Cloudfront to protect resources.
Amazon MQ is a message queue which supports industry standard messaging protocols.
Slower login time and 504 errors in front of Cloudfront can be optimized by —
AWS Shield is a service that protects resources against DDoS attacks to EC2, ELB, Cloudfront and Route53.
AWS IoT Core is a managed service that lets IoT devices connect and interact with AWS applications and resources.
The following storage have encryption at rest by default —
Perfect Forward Secrecy is supported by —
Enabling multiple domains to serve HTTPS over same IP address —- Generate an SSL cert with AWS Certificate Manager and create a Cloudfront distribution. Associate cert with distribution and enable Server Name Indication (SNI).
Classic Load Balancer does not support SNI, we have to use Application Load Balancer or Cloudfront.
The following services enable us to run SQL queries directly against S3 data —
By default, each workflow execution can run for a maximum of 1 year in Amazon SWF.
In AWS SWF, a decision task tells the decider the state of the workflow execution.
Third party SSL cert can be imported into —
AWS S3 This is personal study notes for AWS Certified Solution Architect Official Study Guide, Associate. common use cases backup and archive for on-premisesor cloud data content, media, software stor
2019年自己计划有个新开始,就是开始尝试写写博客啦。 首文献给AWS云服务认证主题~~~ 首先臭美一下,自己这次的AWS SAA考试分数比预想的要高一点,考试满分是1000分,自己拿到了893分,小开心一下。 言归正传,新版的考试Certified Solution Architect Associate “认证助理级解决方案架构师”所要求的是五大考点,他们的覆盖比例列举如下。 具体的考试介绍白
In this section, we will review a number of common problems developers often experience once they’ve started to work on relatively non-trivial projects using Backbone.js, as well as present potential
YeoWorks Ubuntu Solutions 是一个用 Bash 脚本编写的,专为 Ubuntu 入门用户提供的一站式问题修复工具,主要功能包括: 更新 Ubuntu 软件 安装附加扩展软件,包括 Ubuntu Tweak , Compiz 等等。 安装、删除 Gnome 3 解决定 FireFox 64 位问题 重装 Ubuntu 桌面环境 系统清理 修改用户、root 密码等等
Architect Architect is a set of tools which enhances ORMs written in Python with more features and simplifiesdifferent database related complex tasks. Features Supported ORMs Django >= 1.4 Peewee >= 2
刚到泉州医院,绝影就感觉对方领导气势是“咄咄逼人”,心中立刻有了“单刀赴会”的感觉。 医院领导他上次没有见过,充其量也就是见了放射科主任。大概是医院觉得一两百万的项目,还不值得领导出马。在很多单位,不同的领导是有不同的加码的,就像在银行,才存个一两千块,你就乖乖到后面取号排队吧。要是存上个一两百万,你就力马升级成VIP,排队?VIP还排什么对?人家有专门的VIP通道,你可以一边在里面玩QQ游戏一边
Enterprise Architect是一款计算机辅助软件工程(CASE)工具,用于设计和构建软件系统、业务流程建模及更多通用的建模。 EA并不仅仅是一个UML画图工具那么简单,它对整个项目开发过程有着非常好的支持。 比较亮点的功能: 1.UML建模--支持UML2.1 2.代码工程--按图生成代码,导入原有的代码成为UML图 3.项目管理程序--包括项目计划,任务进度,问题集等 4.文档生成和
NLP Architect 是一个开源的 Python 库,用于探索最先进的深度学习拓扑结构和技术,以优化自然语言处理和自然语言理解神经网络。NLP Architect 的设计是为了灵活地添加新的模型、神经网络组件、数据处理方法,并方便训练和运行模型。 特点 新颖的 NLU 模型展示了新颖的拓扑结构和技术 优化的 NLP/NLU 模型,展示了神经 NLP/NLU 模型的不同优化算法 面向模型的设计