N skills to write more efficient Dockerfile | cloud effect engineer pointing North

Introduction: in the cloud native era, the construction and deployment of software are inseparable from Container technology. When it comes to containers, almost everyone subconsciously thinks of Docker. There are two very important concepts in Docker: Image and Container. The former is a static view, which packages the directory structure and ...

Posted by EcLip$e on Sun, 30 Jan 2022 16:19:56 +0100

System analysis of deleting irrelevant codes and their configuration in uboot

The first hurdle in learning embedded linux is uboot. Many friends feel helpless about this slightly complex MCU program. This is mainly because there will be many folders after extracting a uboot compressed package, which contains a lot of code. In addition, there are makefile, Kconfig, device tree and so on. I don't know where to start. If ...

Posted by rebelo on Sun, 30 Jan 2022 12:38:43 +0100

[uncover secrets] how can 12306 resist hundreds of millions of daily lives and millions of high concurrency?

Welcome to WeChat official account: Xiamen micro think network. Wechat (official website): https://www.xmws.cn/ During holidays, people who return home and go out to play in the first and second tier cities are almost faced with a problem: grab train tickets! Although tickets can be booked in most cases, I believe everyone has a deep unders ...

Posted by Sir Jos on Sun, 30 Jan 2022 08:07:46 +0100

Developing FPGA under linux

For more sharing, please visit my personal blog https://www.niuiic.top/ This paper introduces how to develop FPGA under linux. compiler Due to the particularity of FPGA, only commercial ides can be competent for the whole development process. Therefore, there is no need to find open source alternative products. It is most appropriate to dir ...

Posted by Brian Swan on Sun, 30 Jan 2022 07:03:02 +0100

Network management of docker

docker network host level explanation Docker Daemon will create a virtual bridge named docker0, which is used to connect the host and container, or connect different containers. veth pair is used for communication between different network namespaces. veth pair sends data from one network namespace to veth of another network namespace. ...

Posted by craigerjs on Sun, 30 Jan 2022 06:44:03 +0100

inotify+rsync details and sersync

Please indicate the source of Reprint: https://www.cnblogs.com/f-ck-need-u/p/7220193.html Chapter 2 Rsync (II): detailed description of inotify+rsync and sersync Classification: Linux services undefined The following is the rsync series:   1. Rsync (I): basic commands and usage   2. Rsync (II): detailed description of inotify+rsync and se ...

Posted by woodsy2k on Sun, 30 Jan 2022 02:15:43 +0100

pthread_ Problems and solutions of deadlock caused by canceling exiting thread

There are two kinds of thread termination in Posix: normal termination and abnormal termination. Thread actively calls pthread_exit() or return from the thread function will make the thread exit normally, which is a predictable exit method; Abnormal termination means that a thread exits under the intervention of other threads or due to its own ...

Posted by james_holden on Sun, 30 Jan 2022 01:47:42 +0100

Use proxy to achieve intranet penetration, configure intranet and Intranet databases to synchronize data with each other

1, Intranet penetration using proxy prepare Tutorial reference address: https://snail007.github.io/goproxy/manual/zh/#/ git address of proxy software: https://github.com/snail007/goproxy/releases Prepare two servers: One with fixed IP External network server, for example: 180.76.123.37 A server in Intranet environment, for example: 192 ...

Posted by mashnote on Sun, 30 Jan 2022 00:19:16 +0100

Construction of Haikang Ehome protocol server

I Haikang EHome agreement preview process 1.0 introduction EHOME protocol is a push mode protocol for communication between equipment and server. It is applicable to network camera, network ball machine, DVR, NVR, on-board DVR, on-board forensics system, individual soldier, alarm host and other equipment supporting EHOME protocol. Haikang ...

Posted by programming_passion on Sat, 29 Jan 2022 20:13:42 +0100

Linux system foundation -- permission management

Fundamentals of Linux system (6) – permission management 1. Basic concept of authority ☆ why set permissions 1) Data value in server 2) Employees have different job responsibilities and division of labor 3) Respond to external attacks 4) Internal management needs ☆ type of authority For fileFor directoryRead rIndicates that the file ...

Posted by adamgram on Sat, 29 Jan 2022 19:17:56 +0100