Android Recyclerview grid layout divider

1. In the previous post, I deleted a key code when I found a bug in the segmentation line of the image selector. But it doesn't matter. I wrote a separate post this time On 2csdn, big God hongyang has written it, but according to the method he wrote, I tried to find some problems in grid layout. I can't remember the specific problems (I don't d ...

Posted on Fri, 03 Apr 2020 00:28:17 -0700 by JP128

Java characters and strings

character // Character definition char c1 = 'a'; char c2 = '1'; char c3 = 'in'; // Automatic boxing Character c = c1; // Automatic dismantling c1 = c; //Determine whether it is a letter Character.isLetter('a'); //Judge whether it is a number Character.isDigit('a'); //Judge whether it is blank Character.isWhitespace(' '); //Determine wheth ...

Posted on Thu, 02 Apr 2020 22:56:05 -0700 by kpowning

Get android mobile mac address

After android system 6.0, the access to mac address is added. The access is as follows according to common methods: WifiManager wifiMan = (WifiManager)context.getSystemService(Context.WIFI_SERVICE) ; WifiInfo wifiInf = wifiMan.getConnectionInfo(); return wifiInf.getMacAddress(); But in this case, all the mac addresses obtai ...

Posted on Wed, 01 Apr 2020 08:23:50 -0700 by fizix

centos7 Lacp+802.3ad configuration

1.S5700 switch configuration 1.1 create eth trunk 1.2 add member interface to eth trunk 1.3 verify configuration results 1.4 switch configuration file 2 configuration of server network card 2.1 network card em1 configuration 2.2 network card em2 configuration 2.3 virtual bond0 configuration 2.4 binding takes ef ...

Posted on Tue, 31 Mar 2020 14:51:54 -0700 by Sware

Unsupervised learning and sklearn Library

1, Unsupervised learning Fundamentals Using unlabeled data to learn the distribution of data or the relationship between data and data is called unsupervised learning The biggest difference between supervised learning and unsupervised learning is whether the data is labeled The most commonly used scenarios of unsupervised learning are Clusterin ...

Posted on Mon, 30 Mar 2020 05:45:56 -0700 by Bou

Ruby: calling class methods from instances

In Ruby, how do you call class methods from instances in this class? Say I have class Truck def self.default_make # Class method. "mac" end def initialize # Instance method. Truck.default_make # gets the default via the class's method. # But: I wish to avoid mentioning Truck. Seems I'm repeating myself. end end ...

Posted on Wed, 18 Mar 2020 07:18:05 -0700 by wih

Linux version 7, only lo network card without en0 or eth0 network card after virtual machine installation

Experimental environment: RHEL 7 After the virtual machine installs RHEL7, ip add finds that only one network card lo enters/ect/sysconfig/network-scripts/directory finds that only ifcfg-lo does not have eth0, and then it is not feasible to configure an eth0 discovery by myself. I consult the data to solve this problem, as follows: ...

Posted on Tue, 17 Mar 2020 09:43:49 -0700 by devinemke

In depth applet Series II: mixed programming of Flutter and applet

background In this paper, we will open a brain hole to integrate and run the small program scheme on the basis of Flutter project. First look at the effect as follows: New Flutter sample project Installation of Flutter For the installation of Flutter, please refer to https://flutterchina.club/get-s ...

Posted on Tue, 17 Mar 2020 02:44:28 -0700 by nikkieijpen

Spring's dependency injection DI

Dependency injection (DI) and inversion of control (IoC) are the same thing described from different perspectives, that is, by introducing IoC containers and using dependency injection to achieve decoupling between objects Dependency injection mode: 1. Construction method injection 2. setter method inje ...

Posted on Mon, 16 Mar 2020 03:30:02 -0700 by donturo

NMAP Implements Security Checks on Enterprise Environments

Article Directory Introduction to NMAP Common Commands 1. Query segment internal online hosts 2. Scan open services for online hosts 3. Target host details 4. NES Script Scan 5. Scan the local area network for Conficker worms 7. Mail Security Check 8. Database Security Check 8. Scan SNMP information ...

Posted on Fri, 13 Mar 2020 19:13:26 -0700 by jh_dempsey