How to detect whether the wechat domain name is blocked in real time
I believe that many businesses, including webmasters, companies, studios, etc., are promoting and sending domain names in wechat and QQ. But at the same time, there will be many problems. If you don't understand the rules of wechat, the domain name will be blocked. If you are blocked, you will be prompted, unable to open, easy to lose customers ...
Posted by mtucker6784 on Sun, 01 Dec 2019 23:48:05 -0800
Deep learning to recognize handwritten font
We still use MNIST handwritten font data set to see how we can use tensorflow to implement MLP.
data
Data downloading
Here we download the dataset through the tensorflow module.
import tensorflow as tf
import tensorflow.examples.tutorials.mnist.input_data as input_data
mnist = input_data.read_data_sets("MNIST_data/", one_hot ...
Posted by ccbayer on Sun, 01 Dec 2019 19:23:28 -0800
SpringBoot modify startup log output
Create the banner.txt file in the src/main/resources directory of the project, and the startup output of SpringBoot will be changed
Buddha log
${AnsiColor.BRIGHT_YELLOW}
${AnsiColor.BRIGHT_RED}_ooOoo_${AnsiColor.BRIGHT_YELLOW}
${AnsiColor.BRIGHT_RED}o8888888o${AnsiColor.BRIGHT_YELLOW}
${An ...
Posted by avatar.alex on Sun, 01 Dec 2019 18:12:30 -0800
RecyclerView -- give you a non-card sliding list
https://www.jianshu.com/p/519bb23987ca
What will you learn after reading this article?
RecyclerView adds a head, a tail, or a view somewhere in the list list
RecyclerView+SwipeRefreshLayout for drop-down refresh
Paging Load Data
List optimization scheme
Use Glide to load pictures, press the back key while sliding, and App c ...
Posted by severndigital on Sun, 01 Dec 2019 12:02:03 -0800
Network virtualization
Network virtualization technologyOpenVSwitch: virtual switchVLAN, VXLANVirtual router
What is VLAN?Virtual LAN: LAN refers to the range from broadcast frame to node, that is, the range of direct communication;
VLAN: MAC address basedPort implementation based on switchImplementation based on IP addressUser based implementation
Type of switch in ...
Posted by NathanLedet on Sat, 30 Nov 2019 21:00:43 -0800
Python? Faker creates fake data
Reprint: https://www.cnblogs.com/hellangels333/p/9039784.html
faker creates fake data
In our work, sometimes we need to forge some fake data. How to use Python to forge these seemingly true fake data?
Python has a package called Faker, which can be used to easily forge names, addresses, phone numbers and other information.
...
Posted by james182 on Sat, 30 Nov 2019 10:09:12 -0800
Analysis of filecoin Technology Architecture 7: protocol layer storage protocol of filecoin source code analysis
Author of this article: Yang Wei of Xianhe system; original works, reprint please indicate the source
Catalog
Link: 1 filecoin concept
Link: 2 filecoin common language understanding
Link: 3 filecoin development network usage
Link: 4 Analysis of top-level architecture of filecoin source code
Link: 5 heartbeat protocol of filecoin ...
Posted by ashleek007 on Sat, 30 Nov 2019 09:55:23 -0800
MySQL Blackhole: black hole engine
Check the output of SHOW ENGINES; or SHOW VARIABLES LIKE 'have%'; to see whether the previous mysql version supports this engine.
mysql> show engines;
+--------------------+---------+----------------------------------------------------------------+--------------+------+------------+
| Engine | Support | Comment ...
Posted by chriswheat on Sat, 30 Nov 2019 05:13:34 -0800
The initial learning process of Tensorflow -- a complete neural network sample program
This is a sample function that combines the previous studies, including the definition of data, the definition of variables, the forward propagation and back propagation of neural network. However, the loss function and back propagation algorithm will continue to learn further in the later study, which is currently written firs ...
Posted by raymedia on Fri, 29 Nov 2019 21:17:41 -0800
Best practice of eBCC performance analysis - a simple eBCC analysis network function's latency
0. Intro
BCC is a set of performance analysis tools based on ebpf of 4.x kernel;
eBCC, as the name implies, is the abbreviation of extended BCC. It is the extension of the BCC project by Alibaba kernel team on Aliyun Linux, including the existing tool set of BCC itself and some small tools newly developed by us. eBCC is based on the extension o ...
Posted by cristiano on Fri, 29 Nov 2019 11:55:34 -0800