Week 3, Text Processing Tools, shell Scripting

Text Processing Tools 1,cut -d Specifies the separator.For example, -d: -d'' -f Specifies which column to choose.For example, -f1,3 --output-delimiter specifies the separator to display Tr-s compression-d deletion-c except 2. Percentage of disks fetched using tr and cut [root@glowing-bliss-1 data]# df -h | tr -s ' ' | cut -d' ' -f5 | tr -dc ...

Posted by ozone1 on Sun, 04 Aug 2019 18:29:17 +0200

Linux system: Elastic Search middleware built under centos7, common interface demonstration

Introduction of Middleware 1. Basic concepts Elastic Search is a Lucene-based search server. It provides a full-text search engine with distributed multi-user capabilities, based on RESTful web interface. Elastic search is a popular enterprise search engine developed in Java and released as open source under Apache license. 2. Distributed datab ...

Posted by justice1 on Sat, 03 Aug 2019 15:16:46 +0200

Nginx + Docker Manual Cluster Run EMQ

In the process of supporting customers, EMQ X learns that customers use Nginx for load balancing and that the Docker container manually joins the cluster to run the EMQ cluster. The main process is now recorded. Business Requirements Use Nginx as a reverse proxy Nginx needs to assign the address of the proxy server in advance Run EMQ using Doc ...

Posted by kishore_marti on Sat, 03 Aug 2019 05:14:43 +0200

Let's work together on a simple and rough grid layout control for the main interface of Tv applications!

This post has been really a long time ~~, and finally I can take a breath to write a good blog, this time is really busy, iteration is too tight.Okay, let's skip the crap and get to today's topic. Effect Fig. 1 Tv application: the home page of DangBei Market Figure 2 is our own simple and rough Tv application main int ...

Posted by Blackwind on Wed, 31 Jul 2019 18:55:39 +0200

POJ 1236 Network of Schools

POJ 1236 Network of Schools ) subject The topic is very long. In fact, the meaning of the topic is very simple. Give a digraph and ask You can walk through the whole picture from at least a few points Adding at least a few edges can make the graph strongly connected Analysis Direct Tarjian Tarji ...

Posted by mourisj on Wed, 31 Jul 2019 18:19:29 +0200

How to modify the network card name of CentOS 7.6

1. Background introduction In centos5, we used to name network devices like eth0. In centos6, we found that network devices had changed to em1. In version 7 of CentOS, we redefined the naming rules of network cards. Therefore, the modification of this naming rules still makes many people feel headache and unable to adapt to this random naming ...

Posted by bluemonster on Wed, 31 Jul 2019 17:20:55 +0200

Data Construction of Credit Card Scoring Model

Construction of Credit Card Scoring Model Background description At present, the total balance of user's age, credit card and personal credit line, the borrower's overdue in the past two years, forecast whether the borrower will anticipate the number of times, monthly income, debt ratio, family memb ...

Posted by djpic on Wed, 31 Jul 2019 10:41:06 +0200

Analysis of UDP Data Transferred by python Meteorological Equipment-Notes

Articles Catalogue Background II. Summary of Contents 2.1 Creation of UDP Communication Server ** DUP uses connectionless sockets** 2.2 16-digit data parsing 2.3 File Creation and Data Storage Analysis Background Recently, in a company's equipment, the built-in DTU sends 16-digit data messages ...

Posted by BSlepkov on Wed, 31 Jul 2019 08:06:39 +0200

Network Chat Room Based on Socket Programming

1. Project Profile: Network Chat Room Based on Socket Programming 2. Functional description: Multi-user registration, group distribution and private chat can be implemented: 3. Specific implementation process:Client implementation process: 1. The functions of the client can be further refined as follow ...

Posted by Bramme on Tue, 30 Jul 2019 22:06:13 +0200

< center>javascript proxy mode </center >

The so-called proxy pattern is to find a substitute object for an object in order to access the original object. The reason why we use proxy is that we don't want or want to operate directly on the original object. We use proxy is to let it do a series of operations for the original object. After these ...

Posted by Oxymen on Tue, 30 Jul 2019 16:37:38 +0200