ntpdate and ntpd are two time synchronization methods
narration
Reprinted from: ntpdate and ntpd two time synchronization methods - Fang Zhipeng's blog (fangzhipeng.com)
In order to avoid the time deviation caused by the long-term operation of the host, time synchronization is very necessary. Under Linux system, ntp server is generally used to synchronize the time of different machines. One m ...
Added by carlosx2 on Thu, 10 Feb 2022 05:37:14 +0200
Exploratory Data Analysis EDA (Exploratory Data Analysis) analysis with python
Exploratory Data Analysis EDA (Exploratory Data Analysis) analysis with python
show holy respect to python community, for there dedication and wisdom
Dataset related:
First, UCL wine dataset:
UCI data set is a commonly used standard test data set for machine learning. It is a database for machine learning proposed by the University of ...
Added by iacataca on Thu, 10 Feb 2022 05:31:49 +0200
Zero basic learning spring framework
Spring framework
1. spring official website
Official website: https://spring.io/
2. Spring framework
Framework: a series of jar packages and the programming method for realizing a certain function are agreed at the same time, which may be different from the original programming method! Each framework solves some specific problems!
Prob ...
Added by ctcmedia on Thu, 10 Feb 2022 05:29:35 +0200
Source code analysis | appcompatactivity setcontentview I was careless
HZWZNow young people stick the source code as soon as they come up. Is this suitable for a small vegetable melon like me? It's not suitable.backgroundThis is how the story beginsOne day, I found that I didn't write the layoutPrint as I wantWith an inexplicable beginning One day, two young people didn't talk about martial virtue You have to tell ...
Added by $0.05$ on Thu, 10 Feb 2022 05:25:19 +0200
Day14 File Operation
Day14 File Operation
Usage of hashlib
Characteristics of hash encryption
The hash algorithm produces an irreversible summary. (The original text cannot be obtained in ciphertext)Only the summaries of the same data from the same algorithm are consistentThe resulting summary is the same size (length) regardless of the size of the origi ...
Added by dsaba on Thu, 10 Feb 2022 05:20:09 +0200
MyBatis first day of study
MyBatis first day of study
Establishment of MyBatis basic environment (taking querying all data as an example)
pom
<dependencies>
<dependency>
<groupId>org.mybatis</groupId>
<artifactId>mybatis</artifactId>
<version>3.4.5</version>
</dependency>
<dependency>
<groupId& ...
Added by tave on Thu, 10 Feb 2022 05:19:23 +0200
Advanced java -- thread pool, Lambda expression
Advanced java (VII) -- thread pool and Lambda expression
Portal: ·Zhang Qi MAX·
##Learning objectives
-[] able to understand the concept of thread communication -[] be able to understand the waiting wake-up mechanism -[] be able to describe the operation principle of Java thread pool -[] be able to understand the advantag ...
Added by jiggens on Thu, 10 Feb 2022 05:11:11 +0200
MySQL: Centos7 install mysql-5.6.44-linux-glibc2 12-x86_ 64.tar. gz
1. Download the installation package from mysql official website
Download address: https://dev.mysql.com/downloads/mysql/5.6.html#downloads
Select the version in the screenshot below
2. Download and upload to linux or use wget
wget https://downloads.mysql.com/archives/get/p/23/file/mysql-5.6.43-linux-glibc2.12-x86_64.tar.gz
3. Installa ...
Added by mrvanjohnson on Thu, 10 Feb 2022 05:09:55 +0200
Use of logstash's mutate filter
1, Background
When we use logstash to read data from the outside, the values read by default are of string type. Suppose we need to modify the type of field value at this time. If we change from string to integer, or delete the field, modify the name of the field, give a default value to the field, we can use mutate filter at this time.
2 ...
Added by jester626 on Thu, 10 Feb 2022 05:10:35 +0200
H3C SSH Remote Management login configuration
1, Introduction to SSH
SSH is the abbreviation of Secure Shell. SSH is a security protocol based on the application layer. SSH is a reliable protocol designed to provide security for remote login sessions and other network services. Using SSH protocol can effectively prevent information disclosure in the process of remote management. SSH was o ...
Added by hanhao on Thu, 10 Feb 2022 05:00:55 +0200