Linux Command rpm Command

Catalog What is rpm? install upgrade uninstall query check Database Maintenance What is rpm? The full name of rpm, The RPM Package Manager, is the package manager of the RHEL operating system with the suffix.Rpm. RPM commands are used to install, uninstall, upgrade, query, list and check RPM packages on Linux systems. install rpm -ivh PAC ...

Posted on Mon, 18 May 2020 09:48:43 -0700 by loki1664

Crud operation of Android SQLite database (case)

Article catalog 1. Summary of knowledge points 2. Case introduction 3. Layout file 4. Code 4.1 entity class: 4.2 create database 4.3 CRUD operation 5. Extension 5.1. Difference between getWritableDatabase() and getReadableDatabase(): 5.2. Interface description of SQLiteDataBase object ...

Posted on Sun, 17 May 2020 03:20:04 -0700 by exploo

Centos7 installation and deployment of zabbix monitoring software

catalog Deploy monitoring server Deploy monitoring server Zabbix Server Web page validation settings Deploy monitoring server 1, Install LNMP environment The Zabbix monitoring and management console needs to be displayed through Web pages, and MySQL is also needed to store data, so you need to prepare the basic LNMP ...

Posted on Sun, 17 May 2020 00:56:21 -0700 by mol

Detailed explanation of common sql statements in MySQL database operation add, delete, change, query, comment, fuzzy query, multi table linkage, regular expression, etc

catalog 1. Single line comments in SQL statements 2. Multiline comment 3. Create a new database 4. Delete database 5. Create table 6. Delete data table in MySQL 7.MySQL insert data 8.MySQL query data 9.MySQL UPDATE records 10.MySQL DELETE statement delete records 11.MySQL LIKE clause fuzzy query 12.MySQL UNION operator union query ...

Posted on Sat, 16 May 2020 03:43:33 -0700 by terandle

Kong extends jwt plug-in to add blacklist verification

Kong Jwt plugin with blacklist extend Official jwt plug-in , keep token expiration and signature verification, add query redis blacklist database according to jti, and implement forced offline. Extended functions Optimize the configuration parameters, delete the token obtained from cookie, support the token obtained from url and header, ...

Posted on Fri, 15 May 2020 07:15:22 -0700 by Consolas

Spring Cloud Cognitive Learning: Ribbon Use

Catalog Ribbon Load Balancing Simple steps to use: 1. New module for load balancing 2. Modify the module code: 3. Start module 4. Modify the consumer module Load balancing algorithm: Custom load rules: (viii)Connect Last Spring Cloud Cognitive Learning (1): Introduction to Spring Cloud and Eureka Use (viii)The previous article introduc ...

Posted on Thu, 14 May 2020 21:34:05 -0700 by kool_samule

Summary of common database commands

1. Create database: mysql> create database test ; // Create a database in mysql. The ID of the database is test. [root@host] # mysqladmin -u root -p create test; / / create a database under linux. The database ID is test. 2. Delete database: mysql> drop database test ; // Delete the database in mysql. The ID o ...

Posted on Thu, 14 May 2020 08:30:58 -0700 by baldwinw

C ා data operation series - 5. Introduction to ef core

0. Preface The previous chapter introduced the ORM framework briefly, and wrote a tool class similar to orm. This chapter will introduce the Core version of Entity Framework, a famous ORM framework in the C ා world. The non Core version of Entity Framework has been updated to 6 generations, which is a proven ORM framework. Here is a brief intro ...

Posted on Thu, 14 May 2020 03:05:51 -0700 by rebelo

The implementation of flash restful API and the basic permission control based on flash httpauth

This series of tutorials is divided into four stages 1.flask restful web service 2.flask restful api 3.flask Httpauth to realize authority control 4.uwsgi Manage flask applications  In the first two articles, we have studied the development and implementation of basic web services and restful api. After the implementation of interface develop ...

Posted on Thu, 14 May 2020 02:22:01 -0700 by Javizy

What exactly is the Bloom filter? It's clear from this lecture

I don't know when it started, but the original obscure Bloom filter got a big reputation. In the interview, the interviewer asked how to avoid cache penetration. Your first reaction might be the Bloom filter. Cache penetration = Bloom filter became the standard match, but it's not clear what Bloom filter is and how to use it. Let's talk about ...

Posted on Wed, 13 May 2020 09:59:45 -0700 by broann