SUBSTRING_INDEX and GROUP_CONCAT of mysql

Today, a small module in the project is to query receivables for all projects. When I got this module, I didn't know what to do. Because I just graduated, I haven't done such a project, but I have to do it. Fortunately, I was born in this age of network information, so I used Google to query the solution, and finally got my own ...

Posted on Fri, 11 Jan 2019 00:18:11 -0500 by Zoxive

CentOS - CentOS 6.5 Installs RTL8111/8168B PCI EXPRESS Network Card and Solves Problems in Installation

For reprint, please indicate the source: http://blog.csdn.net/l1028386804/article/details/78265463 I. Finding and Analyzing Problems Recently, when the main board of the intranet server has been replaced, there will always be the following problems: after a period of time, the server will inexplicably fail to connect, excluding the problem o ...

Posted on Thu, 10 Jan 2019 12:06:11 -0500 by idontkno

Course Schedule && Course Schedule ||

Course Schedule && Course Schedule || For Course Schedule Problem description: There are a total of n courses you have to take, labeled from 0 to n - 1. Some courses may have prerequisites, for example to take course 0 you have to first take course 1, which is expressed as a pair: [0,1] Given the total number of courses and a list ...

Posted on Thu, 10 Jan 2019 01:45:10 -0500 by cravin4candy

C/C++ TCP/IP Protocol Cluster Checksum Computing Method (tcpip checksum)

This article will provide a really usable TCP/IP protocol checksum calculation, that is, it is not the theoretical TCPIP checksum calculation method, although I had a little headache about this pit (joke) This code abstract is purposely named as a small project of "tun/tap" virtual network card layer (link layer) fro ...

Posted on Thu, 10 Jan 2019 00:42:10 -0500 by gisan

MD5 Value Duplicate File Multiprocess check_md5.py - Performance Testing Tool Development

MD5 introduction Message Digest Algorithm MD5 Message digest algorithm The fifth edition) is a hash function widely used in the field of computer security to provide message integrity protection. The file number of the algorithm is RFC 1321(R.Rivest,MIT Laboratory for Computer Science and RSA Data Security Inc. April 1992). MD5 is ...

Posted on Wed, 09 Jan 2019 22:12:10 -0500 by tkj

Building K8S Cluster from scratch (2) -- Building K8S Cluster

First, let's start building K8S cluster Configure the yum source of K8S The official warehouse is not available. It is recommended to use Aliyuan's warehouse and add the kubernetes.repo warehouse by executing the following commands: cat <<EOF > /etc/yum.repos.d/kubernetes.repo [kubernetes] name=Kubernetes baseur ...

Posted on Wed, 09 Jan 2019 18:06:12 -0500 by sureshp

Chapter 3: TensorFlow Step 1 _TensorFlow Implementing Softmax Regression Recognition of Handwritten Numbers

3.2 Softmax Regression Recognition of Handwritten Numbers by TensorFlow MNIST(Mixed National Institute of Standards and Technology database) is a very simple machine vision data set. It consists of tens of thousands of handwritten digits with 28 pixels and 28 pixels only containing gray values. In the field of machine learning, recognition o ...

Posted on Wed, 09 Jan 2019 00:51:09 -0500 by mikesmith76

MySQL Error "Can Not Be Resolved:." and Reflections

In the morning, I found that mysql slave library is a bit unusual. After reading the slave library log, I also looked at the error log of the main library. This is a big surprise. What messy ip appears in the log, is it a password explosion? mysql Version 5.6.13 Centos6.7 error The log in mysql error log is like this 2017-06-04 09 ...

Posted on Tue, 08 Jan 2019 22:51:09 -0500 by Deb

android ijkplayer c layer analysis-prepare dness process and read thread (continued 2-read input source)

This chapter will briefly analyze how ijkplayer reads data sources from files or networks. Or the key point in read_thread function avformat_open_input function: int avformat_open_input(AVFormatContext **ps, const char *filename, AVInputFormat *fmt, AVDictionary **options) { ...... if (!s && !(s = avforma ...

Posted on Tue, 08 Jan 2019 21:18:10 -0500 by SieRobin

Revealing the first IaaS-oriented query language: ZStack Query Language (ZQL)

In order to simplify UI work and provide a more flexible resource query method for operation and maintenance personnel, ZStack introduced the first IaaS-oriented query language, ZStack Query Language, abbreviated as ZQL, in version 2.6. background IaaS manages a large number of data center resources. How to query these resources flexibly and ...

Posted on Mon, 07 Jan 2019 19:54:09 -0500 by david4ie