docker installation documentation - beginners
1 uninstall the old version:
yum remove docker \
docker-client \
docker-client-latest \
docker-common \
docker-latest \
docker-latest-logrotate \
docker-logrotate \
docker-engine
2 installation environment
yum instal ...
Posted by kkonline on Tue, 15 Feb 2022 09:25:24 +0100
STM32+LWIP protocol stack implements MQTT protocol and mounts it to EMQ_X_CLOUD platform
introduction
In the previous articles, I mainly used LWIP protocol stack to implement httpd server and some applications. In this article, we will implement another MQTT protocol which is widely used in the Internet of things. I won't talk about the definition of MQTT protocol. I mainly remember that MQTT protocol is a subscription / publi ...
Posted by flipis on Tue, 15 Feb 2022 09:18:52 +0100
Eureka highly available Client retry mechanism: retryableeureka httpclient
Eureka highly available Client retry mechanism: retryableeureka httpclient
Here are a few questions I asked myself when I read the source code. First put them forward. I hope people who read this article will read them with questions, and then preliminarily introduce the EurekaHttpClient system. Later, I will talk about RetryableEurekaHt ...
Posted by goldfiles on Tue, 15 Feb 2022 08:59:35 +0100
Java foundation super detail
catalogue
preface
1, What is object-oriented?
2, Three characteristics of object-oriented
1. Packaging
2. Succession
3. Polymorphism
1. Heavy load
2. Rewrite
3. Abstract class
4. Interface
summary
preface
Last time we talked about Java's basic data types, operators and permission modifiers. This time, let's learn the most familiar ...
Posted by Ulujain on Tue, 15 Feb 2022 08:37:22 +0100
vulnhub's DC8 target
introduce
Series: DC (10 sets in total) Release date: September 8, 2019 Difficulty: Intermediate Flag: the ultimate goal of this challenge is to bypass two factor authentication, gain root privileges and read unique flags study:
sql injectionWebsite hanging horseexim4 right raising
Target address: https://www.vulnhub.com/entry/dc-8,367/ ...
Posted by hostcord on Tue, 15 Feb 2022 08:30:55 +0100
es6 nested array loop_ Some methods of flattening JS array
1 what is flattening?
I went to Wikipedia. There is no direct explanation about flattening, only an explanation of flattening organization.
First, let's talk about the organization opposite to flattening: Pyramid organization. As we all know, its hierarchical structure is a pyramid shape.
Flat organization, also known as horizontal organizat ...
Posted by yandoo on Tue, 15 Feb 2022 08:26:15 +0100
Design pattern [1.1] - how do you want to break the singleton pattern?
1. What is the single case?1.1 advantages1.2 disadvantages2. Several methods of destroying single case2.1 creating objects through constructors2.2 reflection call constructor2.3 the clonable interface is implemented2.4 single example of serialization failure3. Summary1. What is the single case?Singleton pattern: it is a kind of creation design ...
Posted by F1Fan on Tue, 15 Feb 2022 08:22:24 +0100
Platform management background and merchant menu resource management: access control design of platform management background
Access control design of platform management background
The access control design here is implemented by spring security, which is not much different from the implementation method of the access control part in Chapter 10 SSO design. The difference is that OAuth 2 is not required here, and a simpler method is used for the design of permission ...
Posted by arsitek on Tue, 15 Feb 2022 08:10:50 +0100
Extension end tecdat| [Video] CNN (convolutional neural network) model and R language implementation
Original link: http://tecdat.cn/?p=18149Original source: Tuo end data tribal official accountDriverless cars can be traced back to 1989. Neural networks have existed for a long time. What are the reasons for the upsurge of artificial intelligence and deep learning in recent years? [1 second] part of the answer lies in Moore's law and the signif ...
Posted by bdemo2 on Tue, 15 Feb 2022 08:09:51 +0100
Jenkins automation tutorial: installing Jenkins under Linux
Installing Jenkins in Linux Environment
First, you must install the java runtime environment before installing Jenkins
Download JDK
After entering the page, download the 64 bit package, jdk-8u181-linux-x64 tar. GZ and jdk-8u181-linux-x64 Rpm is OK. The following will introduce the installation methods of the two packages respectively. Select ...
Posted by dreglo on Tue, 15 Feb 2022 08:02:44 +0100