Streaming media server and Hikvision Dahua camera realize video monitoring and live broadcasting solutions

With the acceleration of Internet plus Internet of things, the application of video surveillance has become more and more extensive. Among them, Hikvision Dahua and other brand cameras are frequently seen in the field of vision. Because last year also realized the video monitoring scheme on the smart site project, and the current live broadcast ...

Posted on Tue, 07 Apr 2020 03:43:13 -0700 by FramezArt

Centos8 deployment elastic search 7.6.2 + kibana 7.6.2

Written in the front This article is an essay record of the author in setting up the ES learning environment. If it is for self-test, it can be carried out according to the content of the article. The following configuration should not be placed in the production environment. Server: alicloud ECS Operating system: Centos 8.0 64bit, install ...

Posted on Mon, 06 Apr 2020 07:12:08 -0700 by Bendude14

A Url encoded pit encountered in the use of Retrofit network framework

Retrofit is a type safe network request framework for Android and Java platforms. The network module of the project is encapsulated by retrofit framework; In the development process, the third-party sdk is used, and the data output by the third party should be uploaded to the server, but the + output from the sdk is transmitted to the ...

Posted on Mon, 06 Apr 2020 01:39:32 -0700 by markstrange

Summary of k8s add node operation exceptions

Environment: k8s cluster with kubeadm mode not Question: 1. Check the versions of kubeadm, kubelet and kubectl installed in the source system [root@k8s-3 ~]# yum list kubeadm kubelet kubectl  //Loaded plug-in: fastestmirror Loading mirror speeds from cached hostfile  * base: mirrors.nju.edu.cn  * epel: ftp.riken.jp  * extras: mirrors.nju.edu.c ...

Posted on Mon, 06 Apr 2020 01:00:14 -0700 by ldmccla

Running tcpdump tool in Python ADB

This article and the previous one: Python ADB runs shell scripts similar to, The main technical point of the previous article is to say that text files such as shell s are "hidden" in Python code; This article mainly talks about how to hide binary executable files such as tcpdump into Python code. ::: the App with online function of ...

Posted on Sun, 05 Apr 2020 21:37:31 -0700 by Billett

Python 3 standard library: ipaddress Internet address

1. ipaddress Internet address The ipaddress module provides classes that handle IPv4 and IPv6 network addresses. These classes support authentication, finding addresses and hosts on the network, and other common operations. 1.1 address The most basic object represents the network address itself. You can construct an address by passing in a stri ...

Posted on Sun, 05 Apr 2020 20:07:15 -0700 by bluegreen1

LeetCode 84. Largest rectangle in histogram

My LeetCode: https://leetcode-cn.com/u/ituring/ My LeetCode source code [GitHub]: https://github.com/izhoujie/Algorithmcii LeetCode 84. Largest rectangle in histogram subject n nonnegative integers are given to represent the height of each column in the histogram. Each column is adjacent to each other and has a width of 1. Find the maximum ar ...

Posted on Sun, 05 Apr 2020 15:39:18 -0700 by trrobnett

Internet of Things Development Docking

Internet of Things Devices Camera Card reader Gateway lpr Wait and so on Communication protocol Frame Selection Device SDK Haikang camera, vehicle identification and other equipment Dahua's camera Red Gate Gate Principle: Use JNI or JNA technology of java to invoke c driver to realize docking of device data.Distinguish deployment platforms ...

Posted on Sun, 05 Apr 2020 13:48:41 -0700 by romilbm

Understanding of attribute semantics copy and strong

conclusion 1, How to distinguish [obj copy] from a deep copy or a shallow copy? 1. When the immutable type object calls copy copy, no new object will be generated, which belongs to shallow copy; 2. No matter other types of objects call copy or mutableCopy, new objects will be generated, which belong to deep copy (fol ...

Posted on Sun, 05 Apr 2020 13:33:11 -0700 by mikelmao

008. Concurrent Container Class Map

1. JDK Source Learning Method 1. Deductive deduction Example: causal inference. Because only BIO and NIO are available in JAVA, these two knowledge points can be used to explore the principles of network processing in all frameworks. 2. Inductive Summary Example: Perhaps the right guess. Of the 10 servers on-line, 3 always restart automatic ...

Posted on Sun, 05 Apr 2020 13:19:51 -0700 by strega