md5sum and random number creation in shell programming

1. What is md5sum MD5 full name is message digest algorithm. This algorithm calculates information of any length bit by bit, and generates a "fingerprint" (or "message digest") with a binary length of 128 bits (hex length is 32 bits). The possibility of different files generating t ...

Posted by damo87 on Sat, 15 Feb 2020 21:09:27 -0800

Introduction to yum package management

rpm can realize fast and simple installation of programs (compared with compilation and installation), but rpm can't solve dependency by itself, so many tools come into being to solve dependency automatically, among which yum is one of them. yum solution to dependency: There must be a file server where all the rpm packages and the package rel ...

Posted by jiggens on Sat, 15 Feb 2020 18:47:48 -0800

Creating and configuring replica cluster of MongoDB cluster under Linux

Case demonstration: 1, In the linux environment, create three nodes on one machine, and create a replica set for the purpose of testing 1. First create three different data storage folders [root@wugenqiang db]# cd /usr/local/mongodb/data/db [root@wugenqiang db]# mkdir rs0-0 [root@wugenqiang db]# mkdir rs0-1 [root@wugenqiang db] ...

Posted by harristweed on Sat, 15 Feb 2020 07:53:45 -0800

How to use Google's cloud computing resources (Google Colab) to train their own neural network and the application of model preservation and transplantation

The rise of deep learning has brought us new efforts and trial directions, and also brought higher requirements for the computing power of machines. GPU acceleration is the key to improve computing speed, but for most people, buying a good video card is too expensive. If you are not a local tyrant, i ...

Posted by blurredvision on Fri, 14 Feb 2020 05:35:54 -0800

Using fast and slow pointer to access the data of middle node of (bidirectional) linked list (bidirectional linked list with head node)

This paper mainly introduces the method of using fast and slow pointers to access the intermediate nodes. As for other operations of the linked list, it has been written before, which will not be introduced here #include<stdio.h> #include<stdlib.h> typedef struct student{ int score; char name[50]; }student_ ...

Posted by T_Hayden on Thu, 13 Feb 2020 13:59:53 -0800

Shell programming condition test if, for, case, select, while

shell programming condition test Shell Conditional Judgment InitialShell branch if statementShell Loop for StatementShell branch case statementSelect List Select LoopShell loop controls continue,break,exitShell loop while statement Shell Conditional Judgment Initial [] Represents a conditional test, ...

Posted by guxin1999 on Wed, 12 Feb 2020 18:42:12 -0800

Write binary, gesture must be Sao, save fields, save bandwidth, increase efficiency...

introduce Last week, I was confronted with a colleague about an interface. My front-end colleague asked me if I had written the interface document incorrectly, how many exception tags are on an order, and should I not return an array?Why only one number was returned. Because this interface is a call to other micro services, I am also confused. ...

Posted by joeman3429 on Wed, 12 Feb 2020 18:05:04 -0800

jq of linux tools

brief introduction In the daily development under linux, we often need to process and analyze the json format data. jq Is an open source JSON format data processing tool, it provides a lot of flexible syntax, very powerful. install macOS: brew install jq Ubuntu apt-get install jq Other reference Official website jq syntax Basic usage Suppose t ...

Posted by AudiS2 on Wed, 12 Feb 2020 09:42:18 -0800

#IT star is not a dream diagram kubernetes container exploration mechanism core implementation of state management

k8s builds a Manager component for the management of container exploration worker. This component is responsible for the management of underlying exploration worker, caching the current state of container, and synchronizing the current state of container. Today, we will analyze some of its core components 1. Implementation of core principles T ...

Posted by oracle259 on Wed, 12 Feb 2020 02:20:44 -0800

CoolFire lecture series lecture 1

Author: CoolFire [coolfires@hotmail.com] (2001-10-12 15:00:00) CoolHC Volume 1 By CoolFire Author E-Mail: coolfires@hotmail.com Lin Zhenglong, a famous hacker in Taiwan, is the leader of Chinese hackers. Won COG information security Lifetime Achievement Award in 2011Lin Zhenglong Baidu Encycl ...

Posted by random1 on Tue, 11 Feb 2020 22:57:36 -0800