Docker(6): Docker Swarm of Docker's Three Swordsmen
In practice, it is not enough to use a single Docker node in the production environment, so it is imperative to build a Docker cluster. However, in the face of many container cluster systems such as Kubernetes, Mesos and Swarm, how do we choose? Among them, Swarm is Docker's native, but also the simplest, easiest to learn, the ...
Added by chmpdog on Sat, 18 May 2019 13:52:01 +0300
Python Crawler Crawling Dynamic Page Ideas + Crawling Jingdong Example
brief introduction
Sometimes, when we naively download HTML pages using urllib libraries or Scrapy, we find that the elements we want to extract are not in the HTML we download, although they seem to be readily available in browsers.
This shows that the elements we want are dynamically generated through js events under some of our operations. F ...
Added by phast1 on Sat, 18 May 2019 10:14:26 +0300
Multitask-protocol
I. Concepts of the protocol
Protocol, also known as micro-threading, fiber.The English name is Coroutine.
Collaboration is another way of multitasking in python, but takes up less execution units (understood as required resources) than threads.
The general understanding is that a function in a thread can store informatio ...
Added by Xanthis on Sat, 18 May 2019 04:28:50 +0300
Android Media Server Agent Solution
Android Media Server Agent Solution
[NT_PROXY]
Android Media Server Agent Solution
background
Analysis
problem analysis
In-depth analysis of Android proxy process
programme
background
In white list mode, IQI app can not play video, but can display video pictures, video advertisements and so on.
If you switch to ...
Added by kingconnections on Sat, 18 May 2019 02:47:13 +0300
Chrome 75 loads native support images lazily
With the improvement of browser performance, the front-end also pays more and more attention to user experience, and one of the most important indicators affecting user experience is the rendering speed of the first screen. We often deal with styles, scripts, pictures, audio, video and other resources, such as compression and merging of styles ...
Added by mhenke on Sat, 18 May 2019 02:44:39 +0300
Docker Series: Docker Network Management
Network is the most complex part of virtualization technology, and of course it is also an important part of Docker application. Docker uses Linux's Namespace for resource isolation, which includes network resources, and network isolation is achieved through Network Namespace. A network Namespace provides an independent network environment, in ...
Added by Trip1 on Sat, 18 May 2019 01:15:06 +0300
NS3 Network Simulation: DataRate Attribute
Foreword Preface
This is not a correspondent, but also to see the magic of this communication! Because SRTP project is a communication project, so this period of time, has been in contact with the NS3-related knowledge, come in and have a brief chat with you...
text
First, we need to create a point-to-point channel in th ...
Added by bubbasheeko on Fri, 17 May 2019 17:32:04 +0300
Graph of Data Structure
Graph of Data Structure
1. introduction
Graph structure is also a kind of non-linear data structure. There are many examples of graph structure in life, such as communication network, traffic network, interpersonal network and so on, which can be reduced to graph structure. Each node of the graph structure can be related to each ot ...
Added by simn_stv on Fri, 17 May 2019 14:35:30 +0300
Error Handling Scheme for RxJava2
Recently, retrofit2 + rxKotlin2 was used to write interface access, trying to smoothen the code as much as possible, so when the status code returned by excuse is "unsuccessful" (e.g. code!= 200), it is unified in the onError method with network errors. The idea is always good, but in practice, onError failed to catch exceptions, res ...
Added by hush on Fri, 17 May 2019 11:39:34 +0300
Building IKEv2 VPN on strongswan in Aliyun CentOS 7
1. Install Strngswan
yum install strongswan
systemctl enable strongswan
systemctl start strongswan
2. Creating Certificates
strongswan pki --gen --outform pem > ca.key.pem
strongswan pki --self --in ca.key.pem --dn "C=CN, O=iSoft, CN=iSoft wendell CA" --ca --lifetime 3650 --outform pem > ca.cert.pem
strong ...
Added by Miri4413 on Fri, 17 May 2019 00:50:07 +0300