Hive basics 02

1, Hive table structure Format for creating table: CREATE [TEMPORARY] [EXTERNAL] TABLE [IF NOT EXISTS] [db_name.]table_name ( col1Name col1Type [COMMENT col_comment], co21Name col2Type [COMMENT col_comment], co31Name col3Type [COMMENT col_comment], co41Name col4Type [COMMENT col_comment], co51Name col5Type [COMMENT col_com ...

Added by phpnow on Fri, 18 Feb 2022 01:43:43 +0200

Crawler of subscription and redemption list of Minsheng Jiayin ETF fund (Minsheng Jiayin CSI 300ETF)

preface In April, he joined a data-oriented artificial intelligence enterprise in Nanjing as a python crawler intern. In addition to writing scripts for Python crawlers, this position also has a job of text markup. Text marking can be regarded as a process of sorting and cleaning data manually. Although it is boring, it is also an essential li ...

Added by ThermalSloth on Fri, 18 Feb 2022 01:36:54 +0200

(pre) simple and fast use of your linux

Simple and fast use of your linux 1 start to contact linux When you first came into contact with the Linux system, you came into contact with the mysterious command line and found that it was completely different from the graphical interface you normally contact. You were stunned. After reading this article, you can learn some simple common l ...

Added by akeane on Fri, 18 Feb 2022 01:32:22 +0200

Javabase java reflection mechanism - dynamic agent - jdk dynamic agent (source code)

Javabase java reflection mechanism Application of reflection: dynamic proxy Dynamic agent overview Principle of agent design pattern: Wrap the object with a proxy object, and then replace the original object with the proxy object. Any call to the original object must be operated through the proxy object. The proxy object determines whethe ...

Added by billshackle on Fri, 18 Feb 2022 01:30:02 +0200

WebAssembly + Dapr = next generation cloud native runtime?

Introduction: cloud computing has become a key infrastructure supporting the development of digital economy. Cloud computing infrastructure is also evolving. From IaaS to container as a service (CaaS), to Serverless container and function PaaS (fPaaS or FaaS), new computing forms have emerged one after another. Cloud native technology represent ...

Added by Brendan Nolan on Fri, 18 Feb 2022 01:27:12 +0200

top command of linux related commands

top command of linux related commands One of the things the backend people fear most is the sudden surge in server load, which may mean that eye-catching calls are coming soon. What to do in this case? The first reaction must be to log in to the server and click a top command to see Load Average. Today's article tells you how to look at this & ...

Added by pskZero7 on Fri, 18 Feb 2022 01:17:53 +0200

Docker deploys the SpringBoot project and connects MySQL and Redis

Server domain name binding If the newly purchased Tencent ECS is bound with the newly purchased domain name? There are three pre steps: buying a server, buying a domain name and filing. These three steps will not be mentioned one by one.The server binds the domain name. In other words, it is resolved to your server when the domain name is ...

Added by ranam on Fri, 18 Feb 2022 01:17:21 +0200

Responsibility chain design pattern of code refactoring

1, Responsibility chain model 1. What is the responsibility chain model In the Chain of Responsibility Pattern, each receiver usually contains a reference to another receiver. If an object cannot process the request, it passes the same request to the next recipient, and so on. Chain of responsibility model: multiple objects have the opportun ...

Added by Bisdale on Fri, 18 Feb 2022 01:12:59 +0200

Simple example of Electron

Electron can use pure JavaScript to call rich native APIs to create desktop applications. We can think of it as a node JS, which focuses on desktop applications rather than Web server-side. From the perspective of development, Electron application is essentially a node JS application. And node JS module is the same, and the application entry i ...

Added by hazy on Fri, 18 Feb 2022 01:02:30 +0200

[Vulnhub target series] DC3

essential information Kali:192.168.61.145  DC3:192.168.61.163 Experimental process Similarly, first find out the IP address of DC3 through arpscan scanning   sudo arp‐scan ‐‐interface eth0 192.168.61.1/24     It can be seen directly here that the IP address of DC3 is 192.168.61.163 Then we use nmap to scan the target It is found th ...

Added by zvonko on Fri, 18 Feb 2022 01:01:47 +0200