C and C + + exceptions and handling methods
C language error handling method
1. Return value (if else statement judgment error)
2. errno (linux system call)
3. goto statement (local jump in function)
C + + exception
1. Exception syntax
2. Exception thrown
Posted on Fri, 05 Jun 2020 05:11:20 -0400 by Swerve1000
1. Introduction to Cacti
2. The function and characteristics of cacti
3. Data types of cacti monitoring
2, Install and configure Cacti monitoring server
1. Configure LAMP environment
2. Install SNMP and RRDTOOL tools
3. Deploy English cacti to connect mariadb
4. Client accessing English cacti's WEB interface
5. Deploy ...
Posted on Fri, 05 Jun 2020 04:57:50 -0400 by lzylzlz
After analyzing the role of elastic search, it is found that direct expansion of Data nodes is the simplest and can meet the demand.Note: the original ES cluster 3 node dim role is enabled by default.
Original node information
[root@188_33_centos ~]# curl 192.168.188.33:9200/_cat/nodes
192.168.188.33 51 98 3 0.23 0.20 0.17 dim - es- ...
Posted on Fri, 05 Jun 2020 04:46:44 -0400 by despyz
pix2pixHD train your own dataset (win10)
1, Environmental requirements
2, Environment configuration
3, Source download
4, Make your own dataset
1. Image input size:
2. Data set with instance:
3. Data set without instance:
5, Training and testing (me, no_ instance，win10)
1. Training procedure trai ...
Posted on Fri, 05 Jun 2020 03:39:09 -0400 by gmccague
Author: Luo Yuzhe, intelligent software research center, Institute of software, Chinese Academy of Sciences
In the last issue, we introduced the common interrupt related functions in the ARM Linux kernel. In this issue, we will introduce the bottom half mechanism in the ARM Linux kernel.
1, ARM Linux ...
Posted on Thu, 04 Jun 2020 11:14:59 -0400 by Zamees
yum install haproxy
haproxy profile configuration
Here I attach a written configuration file, and I will explain the points that need to be changed
# log 127.0.0.1 local0 info #[err warning info debug] / / log location
log 127.0.0.1 local3
maxconn 6 ...
Posted on Thu, 04 Jun 2020 10:29:07 -0400 by BostonMark
Now information disclosure is more and more serious, and a strong password is the first step to prevent the disclosure of personal sensitive information. Liang Xu once shared an article about how to judge whether your password is secure enough. Click the following link to check:
In the era of information disclosure, how to make your password mo ...
Posted on Thu, 04 Jun 2020 09:32:18 -0400 by gamblor01
Memory pool summary
Classic memory pool implementation
std::allocator of standard library
Class template declaration
Implementation of memory pool in SGI STL
Classic memory pool implementation
reference resources:https://www.ibm.com/developerworks/cn/linux/l ...
Posted on Thu, 04 Jun 2020 09:11:08 -0400 by crazytoon
Continuous Integration (CI) is a kind of software development practice. In Continuous Integration, developers integrate their development results at least once a day. After each integration, it will be tested by automatic build (including static scan, security scan, automatic test and other processes) to find errors in development. This ...
Posted on Thu, 04 Jun 2020 08:57:37 -0400 by DarkReaper
Since you need to install tesseract offline, you think of deploying tesseract as a docker image.Container-based mirroring using docker commit.
The general idea is to pull a basic centos image first, then boot it and enter the container to install tesseract before commit is mirrored.Then mirror save as a tar package.This allows offline installa ...
Posted on Wed, 03 Jun 2020 21:15:29 -0400 by leeue