Tag:Binary
-
Time:2021-1-18
This chapter mainly studies the coding methods of unsigned numbers, complements and floating-point numbers in the computer. By studying the actual coding methods of numbers, we can understand the range of values that can be represented by different types of data in the computer, the properties of different arithmetic operations, and know how the computer […]
-
Time:2021-1-17
Editor’s note: this week’s webassembly news is very rich. WebAssembly Accessing local files from a web browser through Wasi The web assembly system interface (Wasi) allows web assembly applications to access the file system. So now you can access local files from browser based applications. A self generated web assembly parser and serializer With wasmbin […]
-
Time:2021-1-4
Many front-end children’s shoes have a natural fear of binary, and feel that it is far away. This article will take you from the foundation to practice, and comprehensively grasp the binary operation that you may face in daily life. There are some knowledge points interspersed in the article, you can think more about it, […]
-
Time:2021-1-1
On line project configuration of Linux system cluster architecture (3) Write on the front So far, the installation and configuration of all the application projects have been described. Today, we will introduce the installation, configuration, master-slave synchronization and other related processes of the database How to install MySQL As for the installation and configuration of […]
-
Time:2020-12-31
You can do this by pressing_ The type property tells the compiler whether crite is a binary executable or a library_ Name can set the name of rate. example: //Writing lib.rs #![crate_type = “lib”] #![crate_name = “mylib”] pub fn public_function() { println!(“in lib”); } function:rustc lib.rsYou will find that thelibmylib.rliblibrary This work adoptsCC agreementReprint must […]
-
Time:2020-12-28
Why revise HTTP protocol Http / 1.1 has been applied to the web for 15 years, and the defects of the protocol begin to appear. Compared with the past, web pages now need to load more resources. Http1. X protocol stipulates that a TCP connection cannot launch multiple requests in parallel, which makes it difficult […]
-
Time:2020-12-22
Series articles: Row (1) from inside analysis of InnoDB InnoDB internal analysis page (2) Areas and segments of InnoDB’s internal analysis (3) Binary page analysis of inode structure Analysis of inode structure file of table’t ‘ Analysis of xdes entry structure file of table’t ‘ Analysis of a graph from theory preface File Header(38B): Space […]
-
Time:2020-12-20
preface Usually when writing a business, I often use itGET, POSTRequest to request the interface,GETThe related interface is relatively easy and basically error freePOSTForm submission is commonly used in,JSONIt’s easier to submit, but what about file uploads? You may be afraid of this step, because you may not be familiar with it, but the browserNetworkThere […]
-
Time:2020-12-18
When I look at the lexical analysis part of lua, I can see thatlislalphaThe definition of this macro, from the name, means “judge whether it is a letter”.In the lctype. H file, other macros are defined (for judgment) #define ALPHABIT 0 #define DIGITBIT 1 #define PRINTBIT 2 #define SPACEBIT 3 #define XDIGITBIT 4 #define testprop(c,p) […]
-
Time:2020-12-14
preparation: 1. Two virtual machines: centos5.5 is used here with IP addresses of 192.168.1.101 and 192.168.1.105; 101 is the master server and 105 is the slave server (the same version of MySQL has been installed);2. Local environment: LNMPNow, let’s get started. Let’s see what it sounds like to be a master-slave replica on a tall […]
-
Time:2020-12-13
preface Due to various reasons such as hardware, it is necessary to save about 1.7 million 2T microblog image data into mysql. Mongodb, the non relational database used to store microblog data, has stepped into numerous holes due to various unfamiliar with MySQL, and it took three days to complete the modification. For a long […]
-
Time:2020-12-10
This blog will elaborate and discuss the following contents: ●int The range of int varies between 16 bits or 32 bits according to different computers. Take 16 bits for example. The maximum value is 1111111111111, that is 65535. If 65536 occurs, it will overflow. ●Signed int Taking a 16 bit system as an example, […]