Docker(6): Docker Swarm of Docker's Three Swordsmen

In practice, it is not enough to use a single Docker node in the production environment, so it is imperative to build a Docker cluster. However, in the face of many container cluster systems such as Kubernetes, Mesos and Swarm, how do we choose? Among them, Swarm is Docker's native, but also the simplest, easiest to learn, the ...

Added by chmpdog on Sat, 18 May 2019 13:52:01 +0300

Python Crawler Crawling Dynamic Page Ideas + Crawling Jingdong Example

brief introduction Sometimes, when we naively download HTML pages using urllib libraries or Scrapy, we find that the elements we want to extract are not in the HTML we download, although they seem to be readily available in browsers. This shows that the elements we want are dynamically generated through js events under some of our operations. F ...

Added by phast1 on Sat, 18 May 2019 10:14:26 +0300

Multitask-protocol

I. Concepts of the protocol Protocol, also known as micro-threading, fiber.The English name is Coroutine. Collaboration is another way of multitasking in python, but takes up less execution units (understood as required resources) than threads. The general understanding is that a function in a thread can store informatio ...

Added by Xanthis on Sat, 18 May 2019 04:28:50 +0300

Android Media Server Agent Solution

Android Media Server Agent Solution [NT_PROXY] Android Media Server Agent Solution background Analysis problem analysis In-depth analysis of Android proxy process programme background In white list mode, IQI app can not play video, but can display video pictures, video advertisements and so on. If you switch to ...

Added by kingconnections on Sat, 18 May 2019 02:47:13 +0300

Chrome 75 loads native support images lazily

With the improvement of browser performance, the front-end also pays more and more attention to user experience, and one of the most important indicators affecting user experience is the rendering speed of the first screen. We often deal with styles, scripts, pictures, audio, video and other resources, such as compression and merging of styles ...

Added by mhenke on Sat, 18 May 2019 02:44:39 +0300

Docker Series: Docker Network Management

Network is the most complex part of virtualization technology, and of course it is also an important part of Docker application. Docker uses Linux's Namespace for resource isolation, which includes network resources, and network isolation is achieved through Network Namespace. A network Namespace provides an independent network environment, in ...

Added by Trip1 on Sat, 18 May 2019 01:15:06 +0300

NS3 Network Simulation: DataRate Attribute

Foreword Preface This is not a correspondent, but also to see the magic of this communication! Because SRTP project is a communication project, so this period of time, has been in contact with the NS3-related knowledge, come in and have a brief chat with you... text First, we need to create a point-to-point channel in th ...

Added by bubbasheeko on Fri, 17 May 2019 17:32:04 +0300

Graph of Data Structure

Graph of Data Structure 1. introduction Graph structure is also a kind of non-linear data structure. There are many examples of graph structure in life, such as communication network, traffic network, interpersonal network and so on, which can be reduced to graph structure. Each node of the graph structure can be related to each ot ...

Added by simn_stv on Fri, 17 May 2019 14:35:30 +0300

Error Handling Scheme for RxJava2

Recently, retrofit2 + rxKotlin2 was used to write interface access, trying to smoothen the code as much as possible, so when the status code returned by excuse is "unsuccessful" (e.g. code!= 200), it is unified in the onError method with network errors. The idea is always good, but in practice, onError failed to catch exceptions, res ...

Added by hush on Fri, 17 May 2019 11:39:34 +0300

Building IKEv2 VPN on strongswan in Aliyun CentOS 7

1. Install Strngswan yum install strongswan systemctl enable strongswan systemctl start strongswan 2. Creating Certificates strongswan pki --gen --outform pem > ca.key.pem strongswan pki --self --in ca.key.pem --dn "C=CN, O=iSoft, CN=iSoft wendell CA" --ca --lifetime 3650 --outform pem > ca.cert.pem strong ...

Added by Miri4413 on Fri, 17 May 2019 00:50:07 +0300