Principle and characteristics of LVS/NAT: https://blog.csdn.net/qq_35887546/article/details/104425264
1. Experiment preparation
This experiment needs three virtual machines and physical machines:
Virtual machine name
172.25.63.1 (internal network), 172.25.254.100 (external net ...
Posted by fcaserio on Fri, 21 Feb 2020 12:10:43 +0100
In the previous version, netty was used to implement a simple one-to-one RPC, which required manual service address setup and was more restrictive.
In this article, using zookeeper as a service registry, local service information is registered in zookeeper at service startup. When a client initiates a remote service call, the address of the ser ...
Posted by wilzy1 on Wed, 19 Feb 2020 18:51:56 +0100
Using zookeeper based on Java API
How to register event mechanism
watcher event type
What kind of operation will produce what kind of event?
Implementation principle of transaction
In depth analysis of the implementation principle of Watcher ...
Posted by jordz on Wed, 19 Feb 2020 15:25:28 +0100
lenet model introduction
lenet network construction
Image recognition using lenet - Fashion MNIST dataset
Convolutional Neural Networks
Limitations of using full connection layer:
The pixels adjacent to an image in the same column may be far apart in this vector. The patterns they form may be difficu ...
Posted by wazo00 on Wed, 19 Feb 2020 13:52:53 +0100
In the "encoder decoder (seq2seq)" section, the decoder relies on the same context vector to obtain the input sequence information in each time step. When the encoder is a cyclic neural network, the background variable is used to detect the hidden state of its final time ...
Posted by alchemist_fr on Wed, 19 Feb 2020 08:05:39 +0100
By Ananias Tsalouchidis
Translated by: Meng Wei
Original text: https://www.percona.com/blog/2020/01/07/how-securing-mysql-with-tcp-wrappers-can-cause-an-outage/
Protecting MySQL is always a challenge. There are general best practices for installing reinforcement, but the more complex your settings are, the more likely you are to encou ...
Posted by Solarpitch on Tue, 18 Feb 2020 11:08:40 +0100
Runtime type information allows you to discover and use type information while the program is running.
In Java, there are two main ways for us to recognize the information of objects and classes at run time: the first is "traditional" RTTI, which assumes that we have known all types at compile ...
Posted by p.utsav on Mon, 17 Feb 2020 09:50:32 +0100
At present, k8s mainly supports two kinds of resources: CPU and memory. In order to support the scheduling and allocation of other types of hardware resources that users need to allocate on demand, k8s implements the device plugin framework for resource integration of other types of hardware. For example, now machine learning uses GPU and othe ...
Posted by scheda on Mon, 17 Feb 2020 08:17:57 +0100
Now let's configure the network card binding in CentOS 7 and run the ip link command to view the available network cards
[root@localhost ~]# ip link
1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN mode DEFAULT group default qlen 1000
link/loopback 00:00:00:00:00:00 brd 00:0 ...
Posted by Bomas on Mon, 17 Feb 2020 06:52:07 +0100
The goal of this framework is to be a generic framework, and I want it to be big and complete, so I can use it directly as a foundation template for other projects in the future, so I want to continue adding some functionality to it, just write some demo in.For this article, I'll add a queue feature.
There are many queues, I choose nsq.The ...
Posted by sheckel on Mon, 17 Feb 2020 00:13:00 +0100