network. Page 4

ASP.NET Core on K8S in-depth learning (12) Ingress

This article has been added to the Index of.NET Core on K8S Learning Practice Series Articles , you can click to see mor...
22:39 10 May 2020

Install Oracle 11.2 silently under Centos7

Dependent packages (including 64 bit and 32-bit packages) ...
11:06 10 May 2020

Use of Maven (dependency conflict)

1.1Maven coordinate Coordinates: each jar pa...
8:10 7 May 2020

The magic of indexers: reading configuration files

GPS platform, website construction, software development, system operation and maintenance, find Senda network technolog...
0:05 6 May 2020

Cloning and serializing applications

Clone Before we start to learn about cloning,...
23:53 5 May 2020

Instructions for mysql5.7 General tablespace

Note: the content of the article originated from the network and was obtained through our own experiment; however, the r...
15:22 5 May 2020

Shell script introduction, structure, execution, date usage

Shell script introduction Shell is a program...
11:18 5 May 2020

Step by step to complete Kubernetes binary deployment -- flannel network configuration (single node)

Step by step to complete the binary deployment of Kubernetes (II) - flannel network configuration (single node) Preface ...
11:16 5 May 2020

Unix Domain Socket

add by zhj: Unix Domain Socket is the optimization of network socket, which is applicable to the situation that the serv...
9:12 5 May 2020

Volley tutorial (including instance demo)

Development data Looking up some materials, I...
6:49 5 May 2020

Spring boot + neo4j ☞ create a multi-point network

Based on the simple practice of the first two articles, we will continue to talk about the application of Neo4j, simulat...
2:52 5 May 2020

Data structure and algorithm series XIX (binary search 2)

1. Introduction 1.1. Why study data structure and algorithm? ...
0:51 5 May 2020

Java learning notes 40 (buffer stream)

Buffer stream: Among the various streams of reading and w...
18:55 4 May 2020

OkHttp Custom Retry Number

In this paper, OkHttp's Interceptor is used to implement a custom number of retries ...
13:05 28 April 2020

One of the shell scripts: Introduction to shell scripts

1. Introduction to shell scripts (1) Script cases and introduction: #!/bin/bash LOG_DIR=/var/log ROOT_UID=0 if ["$UID -n...
14:02 27 April 2020

Native node writes a static resource server

myanywhere Make a simple castration version ...
15:01 21 April 2020

Deep Dream Model and Implementation

Deep Dream is an interesting technology released by Google in 2015.In a trained convolution neural network, only a few p...
4:15 16 April 2020

Docker Dig Into Series | Swarm Multi-Node Actual

Docker has been on the market for many years, which is not a new thing. Many enterprises or development classmates have ...
21:15 16 March 2020

2D Game Development - sy2.Python-pygame

Python's pygame game development Use pygame m...
13:32 15 March 2020

Source reading of ONNX Runtime: implementation of model partition

Related reading:Source reading of ONNX Runtime: overview of model reasoning processSource reading of ONNX Runtime: Deter...
11:54 13 March 2020

Distributed hash table (DHT) in IPFS

The English part is extracted from the official documents, while the Chinese part is based on understanding translation ...
1:18 13 March 2020

OpenStack multi-node one-click deployment (super-detailed)

OpenStack Multi-Node One-Click Deployment in Experimental Environment (Ultra-Detailed) Preface ...
12:44 8 March 2020

Datawhale "hands on deep learning"

Hands on deep learning Day 1 linear regression Softmax and classification model Multilayer perceptron Basic knowledge...
10:03 14 February 2020

JAVA data structure -- adjacency table of graph storage structure

The data structure series is a note that I have learned to make, which will be continuously updated. The source code is ...
9:17 14 February 2020

The basis of cyclic neural network for hands-on deep learning

Cyclic neural network This section introduces...
6:45 14 February 2020

Regular expression and grep instruction in Shell programming

#In fact, regular expressions complete data filtering, reject the data defined by the unsatisfied regular expressions, a...
2:17 14 February 2020

L1 Linear Regression

linear regression The main content includes: ...
23:40 13 February 2020

Hands on deep learning: task01

task01 linear model, softmax and classification model, multi-layer perceptron 1, Realization of linear regression mode...
13:48 13 February 2020

Adore ng trojan in Rootkit

Rootkit is a kind of special malicious software. Its function is to hide the information of itself and specified files, ...
0:15 13 February 2020

Stateful set (stateful service) implementation of k8s

Statefullset introduction Problems encountered: ...
7:21 12 February 2020