HTML5 video (custom video player source code)
video object
Compatibility:
safari browser does not support webm format
Chrome browser supports webm format
ie8 and the following do not support video tags. ie9 supports video tags, but mp4 format
Firefox supports video in ogv format
Compatibility writing
<video controls>
<source src="data/demo.ovg">
&l ...
Posted by mandred on Wed, 13 May 2020 08:33:48 -0700
CentOS7 -- Kickstart + PXE for unattended batch installation configuration
What is Kickstart Installations?
Kickstart Installations for unattended automatic installation
Kickstart files, which are ready before installation, can be used to automatically perform the installation. It can be saved on a single server system and supports one to many: that is, a single file installs CentOS on multiple computers
All Kickst ...
Posted by w.geoghegan on Wed, 13 May 2020 03:41:01 -0700
Crawl the data of Tianya forum to see what everyone is talking about
preface
The text and pictures of this article are from the Internet, only for learning and communication, not for any commercial purpose. The copyright belongs to the original author. If you have any questions, please contact us in time for handling.
When we browse the web, the browser will render and output HTML, JS, CSS and other information; ...
Posted by pck76 on Wed, 13 May 2020 00:41:54 -0700
Square root of LeetCode 69. x
My LeetCode: https://leetcode-cn.com/u/ituring/
My LeetCode source code [GitHub]: https://github.com/izhoujie/Algorithmcii
Square root of LeetCode 69. x
subject
Implement the int sqrt(int x) function.
Calculates and returns the square root of X, where x is a non negative integer.
Because the return type is an integer, the result only retains ...
Posted by turtlefox on Tue, 12 May 2020 02:03:54 -0700
The nearest common ancestor of a binary tree
My LeetCode: https://leetcode-cn.com/u/ituring/
My LeetCode source code [GitHub]: https://github.com/izhoujie/Algorithmcii
The nearest common ancestor of a binary tree
subject
Given a binary tree, find the nearest common ancestor of two specified nodes in the tree.
The definition of the nearest common ancestor in Baidu Encyclopedia is: " ...
Posted by Confusion101 on Tue, 12 May 2020 01:49:51 -0700
Python example: one click bulk matting
Have you ever wanted to pick out the characters in one photo and then put them together in other pictures, so that even if you are in the end of the world, I can visit here?
Professional people can use PhotoShop's "magic wand" tool to matting, and non professional people can use a variety of beauty APP to achieve, but after all, their ...
Posted by goaman on Tue, 12 May 2020 01:09:48 -0700
pg database security configuration
Safety configuration instruction
[TOC]
Database security configuration is one of the important links of database management. Security configuration mainly includes password, network access control, audit, etc. Next, we will explain how to realize the password related security configuration in Hangao database.
1 password encrypted storage
The pa ...
Posted by zavin on Tue, 12 May 2020 01:04:56 -0700
Machine Learning Basics - Neural Network (Debugging Optimization) (Random Initialization, Gradient Detection)
1: Random Initialization
When we use gradient descent or other advanced optimization algorithms, we need to select some initial values for the parameter theta.For advanced optimization algorithms, we assume by default that we have set the initial value for the variable theta:
Similarly, for the gradient descent method, we also need to initi ...
Posted by crazychris on Mon, 11 May 2020 18:12:09 -0700
Create the correct pose for thread pool, please give it a meaningful name
Why do we need to specify meaningful thread names when creating threads or thread pools?
The ultimate goal is to facilitate backtracking.
In our daily development, a project will create many thread pools for resource isolation, but if we do not have a good name, it will be difficult to locate when there is a problem.
public class Demo5 {
...
Posted by arn_php on Sun, 10 May 2020 22:11:34 -0700
Redis realizes distributed lock (design mode application practice)
I've seen all kinds of codes that use redis to implement distributed locks on the network. They are either wrong or fragmented. There is no complete example. Let me summarize two mechanisms of redis to implement distributed locks this weekend
Spin lock and exclusive lock
In view of the different ways of implementing locks, the policy pattern ...
Posted by Shiki on Sun, 10 May 2020 20:10:38 -0700