Start Java again -- the foundation of multithreading

Multithreading process Mainstream computer operating systems support running multiple tasks at the same time, each task is usually a program, and each running program is a process or multiple processes. Characteristics of the process Independence Process is an independent entity in the system Can have their own independent resources Own its o ...

Posted on Tue, 22 Oct 2019 03:00:10 -0400 by giannis_athens

Support microblog billion level social platform, and beginners can play Redis cluster (practical part)

The previous article "supporting microblog billion level social platform, Xiaobai can also play with Redis Cluster (principle part)" introduces the relevant principles of Redis Cluster. This article will introduce the specific operation of building, configuration, operation and maintenance, expansion of Redis Cluster. Cluster buildin ...

Posted on Mon, 21 Oct 2019 20:41:10 -0400 by nathanblogs

Docker container cross host multi network segment communication solution

There are many solutions to realize the cross host network communication of Docker, such as through Deploying consumer service to realize cross host communication of Docker container However, the concept of MacVlan was born in this case. How Macvlan works: Macvlan is a network interface supported by Linux kernel. The required Linux build is ...

Posted on Mon, 21 Oct 2019 16:18:12 -0400 by coffeecup

Canvas operation of canvas

You can pay attention to me. I will always update the latest technical articles of Android. I. quick reference table of Canvas's common operation II. Basic operation of Canvas 1. Why does canvas operation need canvas operation? Canvas operations can help us to create graphics in a more understandable way. For example, how to draw a line segmen ...

Posted on Mon, 21 Oct 2019 16:08:57 -0400 by reli4nt

Scale gesture detection

For most Android engineers, zoom gesture needs less opportunities. It is most commonly used in the following application scenarios, such as: picture browsing, picture editing (map effect), web page zoom, map, text reading (adjusting text size by zooming gesture), etc. The application scenario is relatively narrow, but there will certainly be so ...

Posted on Mon, 21 Oct 2019 15:44:18 -0400 by Quilmes

Firewalld firewall advanced configuration - (real world chapter!!)

Experimental topology Experimental requirement 1. Intranet users of the company need to share the Internet through the gateway server2. Internet users need to visit the website server3. Only 192.168.10.0/24ping gateway and server are allowed.4. The website server and gateway server are managed remotely through SSH. For security, the SSH defa ...

Posted on Mon, 21 Oct 2019 13:10:15 -0400 by harlequeen

NAT network address translation -- Static NAT, port mapping (implementation!!)

NAT overview NAT (Network Address Translation) was proposed in 1994. When some hosts in the private network have been assigned to the local IP address (i.e. the private address only used in the private network), but now want to communicate with hosts on the Internet (without encryption), NAT method can be used How NAT works   with the ...

Posted on Mon, 21 Oct 2019 07:23:19 -0400 by joecooper

Podman User Guide

>Original link: Podman User Guide Podman was CRI-O Part of the project, later separated into a separate project called libpod . Podman's experience is similar to Docker's, except that podman has no daemon. When using Docker CLI in the past, Docker CLI will tell Docker Engine "I want to start a container" through gRPC API, and then ...

Posted on Sun, 20 Oct 2019 19:51:52 -0400 by ssmK

Packet analysis of TCP / IP Linux Data Link Layer

Packet analysis of Linux Data Link Layer Just take this article as learning notes. Beginners are welcome to criticize and correct any mistakes, but only to spray lightly. Generally speaking, after the Linux system intercepts the data packets, it will analyze them through the protocol stack according to the TCP/IP level. Then how can we directly ...

Posted on Sun, 20 Oct 2019 16:22:00 -0400 by soianyc

Version 5 - encapsulation of virtual machines

1. Install virtual machine 2. Set the basic configuration of virtual machine (1) delete files Because the mac address does not match, if the file is not deleted, an error will be reported when restarting the network. cd /etc/udev/rules.d/ rm -f 70-persistent-net.rules (2) set ip cd /etc/sysconfig/netw ...

Posted on Sat, 19 Oct 2019 17:33:48 -0400 by darklight