Introduction to iOS Multi-Thread Locks

How does thread security come about? Common examples are the operation of a non-thread-safe variable outside a thread within a thread. Thread security and synchronization must be considered at this time. - (void)getIamgeName:(NSMutableArray *)imageNames{//Suppose every entry is a thread. /*1.imageNames It is a variable outside the threa ...

Posted by hearn on Wed, 12 Jun 2019 16:28:37 -0700

Instruction Analysis of Lua5.3 Virtual Machine (1) Overview

Instruction Analysis of Lua5.3 Virtual Machine (1) Overview Summary Lua VM uses Register based VM. Instructions access operands in registers that have been allocated. Add a b C adds register b to the value in register c, and the result is in register a. Standard three-address instruction, each instruction has strong expressive ability, an ...

Posted by DjMikeWatt on Sun, 02 Jun 2019 15:30:37 -0700

Huawei server centos 6.5 dual network card binding operation steps

Recently, a batch of Centos 6.5 server network card binding operation has been completed. Because of the current network production environment, the operation is very cautious, but who knows there are still errors, the two servers directly ping is not working, ran to the computer room. All kinds of ups and downs. Therefore, I would like to shar ...

Posted by smilinmonki666 on Sat, 01 Jun 2019 12:40:15 -0700

Network Attribute Configuration

When we have a brand new computer, the first step is to download all kinds of software, watch videos, listen to music and so on. The key point here is to have a network. Nowadays, most personal computers are based on windows operating system. It is very simple to access network. It may be possible to access the Internet by plugging in the inter ...

Posted by baby_g on Fri, 24 May 2019 13:00:54 -0700

Mysql -- Basic Configuration, Authorization and Delete Permissions

Start or stop Start Mysql Server sudo /usr/local/mysql/support-files/mysql.server start Start the Mysql client sudo /usr/local/mysql/support-files/mysql.server stop mac preference settings start or close Configuration file settings Copy cnf files cp /usr/local/mysql/support-files/my-default.cnf /etc/my.cnf //Copy the default mysql conf ...

Posted by WinnieThePujols on Fri, 24 May 2019 11:31:12 -0700

Record a code rollback git reset

background Code commit and push to the remote warehouse, found that this submission of redundant files, such as no need for simple conflict-prone configuration files. Hope the remote code revokes this commit locally unchanged Re commit codeoperation First git log to view commit historySuch as: Now we need to cancel the three commits ( ...

Posted by Goins on Sat, 18 May 2019 15:37:09 -0700

iOS Extension - Objective-C Development Programming Specification

This article is mainly reproduced from: Objective-C-Coding-Guidelines-In-Chinese Objective-C coding specification, content from Apple, Google document translation, your coding experience and summary of other information. Summary Objective-C is an object-oriented dynamic programming language that is mainly used to write iOS and Mac applications. ...

Posted by Savahn on Fri, 17 May 2019 07:45:09 -0700

Examples of curl usage

This article will introduce the use of curl. According to the common scenarios, it will provide the demo code and server code for calling curl to realize the request, which is convenient for everyone to learn and use. 1. View the Web Source Code The curl command is followed by a web address, so you can see the source code of the web page. ...

Posted by davidcriniti on Thu, 16 May 2019 16:04:56 -0700

High Availability Load Balancing by lvs+keepalived

I. lvs 1. Noun Interpretation LVS is the abbreviation of Linux Virtual Server, which means Linux Virtual Server, is a virtual server cluster system. 2. Technical introduction of LVS The following quotation is from Baidu Encyclopedia [1] Technical Introduction LVS cluster adopts IP load balancing technology and con ...

Posted by raister on Thu, 16 May 2019 03:03:41 -0700

Use of sed command

Sed is a stream editor. It is a very useful tool in text processing. It can perfectly cooperate with regular expressions and has extraordinary functions. When processing, the currently processed rows are stored in a temporary buffer called pattern space, and then the contents of the buffer are processed with sed command. Afte ...

Posted by ricmetal on Wed, 15 May 2019 09:26:12 -0700