1. In the previous post, I deleted a key code when I found a bug in the segmentation line of the image selector. But it doesn't matter. I wrote a separate post this time
On 2csdn, big God hongyang has written it, but according to the method he wrote, I tried to find some problems in grid layout. I can't remember the specific problems (I don't d ...
Posted on Fri, 03 Apr 2020 00:28:17 -0700 by JP128
// Character definition
char c1 = 'a';
char c2 = '1';
char c3 = 'in';
// Automatic boxing
Character c = c1;
// Automatic dismantling
c1 = c;
//Determine whether it is a letter
//Judge whether it is a number
//Judge whether it is blank
//Determine wheth ...
Posted on Thu, 02 Apr 2020 22:56:05 -0700 by kpowning
After android system 6.0, the access to mac address is added. The access is as follows according to common methods:
WifiManager wifiMan = (WifiManager)context.getSystemService(Context.WIFI_SERVICE) ;
WifiInfo wifiInf = wifiMan.getConnectionInfo();
But in this case, all the mac addresses obtai ...
Posted on Wed, 01 Apr 2020 08:23:50 -0700 by fizix
1.S5700 switch configuration
1.1 create eth trunk
1.2 add member interface to eth trunk
1.3 verify configuration results
1.4 switch configuration file
2 configuration of server network card
2.1 network card em1 configuration
2.2 network card em2 configuration
2.3 virtual bond0 configuration
2.4 binding takes ef ...
Posted on Tue, 31 Mar 2020 14:51:54 -0700 by Sware
1, Unsupervised learning Fundamentals
Using unlabeled data to learn the distribution of data or the relationship between data and data is called unsupervised learning
The biggest difference between supervised learning and unsupervised learning is whether the data is labeled
The most commonly used scenarios of unsupervised learning are Clusterin ...
Posted on Mon, 30 Mar 2020 05:45:56 -0700 by Bou
In Ruby, how do you call class methods from instances in this class? Say I have
# Class method.
# Instance method.
Truck.default_make # gets the default via the class's method.
# But: I wish to avoid mentioning Truck. Seems I'm repeating myself.
Posted on Wed, 18 Mar 2020 07:18:05 -0700 by wih
Experimental environment: RHEL 7
After the virtual machine installs RHEL7, ip add finds that only one network card lo enters/ect/sysconfig/network-scripts/directory finds that only ifcfg-lo does not have eth0, and then it is not feasible to configure an eth0 discovery by myself. I consult the data to solve this problem, as follows: ...
Posted on Tue, 17 Mar 2020 09:43:49 -0700 by devinemke
In this paper, we will open a brain hole to integrate and run the small program scheme on the basis of Flutter project.
First look at the effect as follows:
New Flutter sample project
Installation of Flutter
For the installation of Flutter, please refer to https://flutterchina.club/get-s ...
Posted on Tue, 17 Mar 2020 02:44:28 -0700 by nikkieijpen
Dependency injection (DI) and inversion of control (IoC) are the same thing described from different perspectives, that is, by introducing IoC containers and using dependency injection to achieve decoupling between objects
Dependency injection mode:
1. Construction method injection
2. setter method inje ...
Posted on Mon, 16 Mar 2020 03:30:02 -0700 by donturo
Introduction to NMAP
1. Query segment internal online hosts
2. Scan open services for online hosts
3. Target host details
4. NES Script Scan
5. Scan the local area network for Conficker worms
7. Mail Security Check
8. Database Security Check
8. Scan SNMP information ...
Posted on Fri, 13 Mar 2020 19:13:26 -0700 by jh_dempsey