Tag:range
-
Best practice of building FTP service on Tianyi cloud virtual machine
After Tianyi cloud users set up an FTP server on the virtual machine, they configured and opened port 21 in the VPC security group, but found that they still could not connect to the FTP service from the external network. This is because FTP protocol has its particularity. This paper will introduce the difficulty of […]
-
Oeasy teaches you to play VIM – 46 – # range control
Scope control Recall the last lesson This time we mainly look at the command line The first is to choose one[range]This range Then carry out corresponding operations :11,30d :2,7y You can also specify registers :”a3,40y :”aP You can even copy or cut content in one line :12,30t50, copy lines 12-30 to 50 :3,6m30, move lines […]
-
Neural network compression method: introduction to the concept of model quantization
In the past decade, deep learning has played an important role in solving many problems that were previously considered unsolvable, and the accuracy of some tasks is equal to or even higher than the human level. As shown in the figure below, deeper networks have higher accuracy, which is also widely accepted and proved. Using […]
-
InnoDB lock algorithm
Three algorithms of row lock Record lock: lock on a single record Gap lock: gap lock, which locks a range, but does not include the record itself Next key lock: gap lock + record lock, lock a range and lock the record itself. The locking technology using next key lock is called next key locking. […]
-
Specific use of go range
catalogue What can go language for… Range} do? How to use for… Range? Array array Slice slice Channel What is the return value of for… Range ? and can it be used for any data structure? If the return value of for… Range , is not needed, how can I handle it? Array effect Effect […]
-
(10) Advanced MySQL SQL optimization (InnoDB lock gap lock)
1. General When we retrieve data with range conditions instead of equal conditions and request shared or exclusive locks, InnoDB will lock the index entries of existing data records that meet the conditions; For records whose key value is within the condition range but does not exist, it is called “gap”. InnoDB will also lock […]
-
Oeasy teaches you to play VIM – 58 – # block visualization
Block visual editing Recall the last lesson Last time we learned about row visualization mode Row visual modeV It can also cooperate with variousmotion oSwitch head and tail The beginning and end of the constituency areMark mark ‘Starts with ‘< The ending is’ > It can be replaced and deleted in the selection :'<,’>s/shiyanlou/oeasy/gBatch replacement […]
-
New input attribute range usage record in HTML5
After two days, I have no computer, no TV, no mobile phone and no traffic. I am used to such a noisy rhythm. Returning to such a clean environment is tantamount to washing. At the same time, I am a little scared. It seems that I can’t do anything. If I am separated from this […]
-
[share] IOS development – detailed explanation of datepicker
Uidatepicker is a controller class that encapsulates uipickerview, but it is a subclass of uicontrol, which is specially used to accept the input of date, time and duration. The columns of the date picker will be automatically configured according to the specified style, so that developers do not have to care about the underlying operations […]
-
[programming art] analysis of Darknet linked list search option_ find_ XX interface
Welcome to my official account, to get more notes. O_o >_< o_O O_o ~_~ o_O This article introduces the linked list lookup option in Darknet_ find_ Implementation of XX related interfaces. a large number of linked list operations will be used in Darknet, as written last time《[programming art] […]
-
You don’t know go const
brief introduction Constants can be said to exist in every code file. Using constants has many advantages: Avoid magic literals, that is, numbers, strings, etc. that appear directly in the code. You can’t read the code at a glance. In addition, possible inconsistencies in the use of literal quantities can be avoided. When their values […]
-
Inversion of control (IOC container) – getting started with Autofac
Note: This article is an original article. Any form of reprint and quotation (including but not limited to the above forms) must be approved by the author first, otherwise all consequences will be borne by the author. brief introduction Autofac is a fascinating Net} IOC container. It manages dependencies between classes. Applications can also be […]