With the acceleration of Internet plus Internet of things, the application of video surveillance has become more and more extensive. Among them, Hikvision Dahua and other brand cameras are frequently seen in the field of vision. Because last year also realized the video monitoring scheme on the smart site project, and the current live broadcast ...
Posted on Tue, 07 Apr 2020 03:43:13 -0700 by FramezArt
Written in the front
This article is an essay record of the author in setting up the ES learning environment. If it is for self-test, it can be carried out according to the content of the article. The following configuration should not be placed in the production environment.
Server: alicloud ECS
Operating system: Centos 8.0 64bit, install ...
Posted on Mon, 06 Apr 2020 07:12:08 -0700 by Bendude14
Retrofit is a type safe network request framework for Android and Java platforms. The network module of the project is encapsulated by retrofit framework;
In the development process, the third-party sdk is used, and the data output by the third party should be uploaded to the server, but the + output from the sdk is transmitted to the ...
Posted on Mon, 06 Apr 2020 01:39:32 -0700 by markstrange
Environment: k8s cluster with kubeadm mode not
1. Check the versions of kubeadm, kubelet and kubectl installed in the source system
[root@k8s-3 ~]# yum list kubeadm kubelet kubectl
//Loaded plug-in: fastestmirror
Loading mirror speeds from cached hostfile
* base: mirrors.nju.edu.cn
* epel: ftp.riken.jp
* extras: mirrors.nju.edu.c ...
Posted on Mon, 06 Apr 2020 01:00:14 -0700 by ldmccla
This article and the previous one: Python ADB runs shell scripts similar to，
The main technical point of the previous article is to say that text files such as shell s are "hidden" in Python code;
This article mainly talks about how to hide binary executable files such as tcpdump into Python code.
::: the App with online function of ...
Posted on Sun, 05 Apr 2020 21:37:31 -0700 by Billett
1. ipaddress Internet address
The ipaddress module provides classes that handle IPv4 and IPv6 network addresses. These classes support authentication, finding addresses and hosts on the network, and other common operations.
The most basic object represents the network address itself. You can construct an address by passing in a stri ...
Posted on Sun, 05 Apr 2020 20:07:15 -0700 by bluegreen1
My LeetCode: https://leetcode-cn.com/u/ituring/
My LeetCode source code [GitHub]: https://github.com/izhoujie/Algorithmcii
LeetCode 84. Largest rectangle in histogram
n nonnegative integers are given to represent the height of each column in the histogram. Each column is adjacent to each other and has a width of 1.
Find the maximum ar ...
Posted on Sun, 05 Apr 2020 15:39:18 -0700 by trrobnett
Internet of Things Devices
Wait and so on
Haikang camera, vehicle identification and other equipment
Red Gate Gate
Principle: Use JNI or JNA technology of java to invoke c driver to realize docking of device data.Distinguish deployment platforms ...
Posted on Sun, 05 Apr 2020 13:48:41 -0700 by romilbm
conclusion 1, How to distinguish [obj copy] from a deep copy or a shallow copy?
1. When the immutable type object calls copy copy, no new object will be generated, which belongs to shallow copy;
2. No matter other types of objects call copy or mutableCopy, new objects will be generated, which belong to deep copy (fol ...
Posted on Sun, 05 Apr 2020 13:33:11 -0700 by mikelmao
1. JDK Source Learning Method
1. Deductive deduction
Example: causal inference.
Because only BIO and NIO are available in JAVA, these two knowledge points can be used to explore the principles of network processing in all frameworks.
2. Inductive Summary
Example: Perhaps the right guess.
Of the 10 servers on-line, 3 always restart automatic ...
Posted on Sun, 05 Apr 2020 13:19:51 -0700 by strega