execute:
Use MySQL;
Select Host,user,password from user;
You can see that the ITBC user that you just created is already in the user table. The Host field represents the hosts that are logged on, their values can be IP, or the host name is available, and changing the value of the host field to% means that the ITBC user can log on to the MySQL server on any client machine, and it is recommended that you set it to% at development time.Update user Set host = '% ' where user = ' ITB
By default, Mysql cannot be accessed through a remote machine. You can enable remote access through the following configuration.
My Mysql environment is ubuntu + mysql5
1. Modify/etc/mysql/my. conf, bind-address, and specify as the actual IP address of the Local Machine. After modifying your my. con, it looks like the following:
[Mysqld]
#
# * Basic Settings
#
Default-character-set = utf8
Default-storage-engine = INNODB
Bind-address = 192.168.1.107
User = mysql
Pid-file =/var/run/mysqld. pid
Soc
By default, Mysql cannot be accessed through a remote machine. You can enable remote access through the following configuration.
My Mysql environment is ubuntu + mysql5
1. Modify/etc/mysql/my. conf, bind-address, and specify as the actual IP address of the Local Machine. After modifying your my. con, it looks like the following:
[Mysqld]## * Basic Settings#Default-character-set = utf8Default-storage-engine = INNODBBind-address = 192.168.1.107User = mysqlPid-file =/var/run/mysqld. pidSocket =/
root and execute the following command:
The Code is as follows:
Grant all on sonardb. * to sonar @ '%' identified by '123 ';Grant all on sonardb. * to sonar @ localhost identified by '20140901 ';
Sonardb replaces the name of the database you want to access. sonar is the username you want to use, and 123456 is replaced with your p
by copying files in different environments. The tools and usage modes in the team should be unified and best practice training should be given.
2. Use a better project to build the platform.Replace the existing ant with Maven. This has been carefully researched and compared, and I have the opportunity to detail it in subsequent articles. Maven has the biggest advantage over ant. It looks at the problem from the management point of view with Maven, while ant is mainly used to automate repetitive
on sonar for integration testing. As you can see, Sonar brings together the code coverage of the integration tests and the code coverage of the unit tests well. At present, the company requires all integration testing and end-to-end testing to collect code coverage, Icoco to help testers do a good job.Figure2Icoco Basic Work Flow1. If necessary, deploy the Web app to the server. The user needs to compile a
Enable Mysql remote access to bitsCN.com
By default, Mysql cannot be accessed through a remote machine. you can enable remote access through the following configuration.
My Mysql environment is ubuntu + mysql5
1. modify/etc/mysql/my. conf, bind-address, and specify as the actual IP address of the local machine. after modifying your my. con, it looks like the following:
[Mysqld]
#
# * Basic Settings
#
Default-character-set = utf8
Default-storage-engine = INNODB
Bind-address = 192.168
ensure code quality. From a practical point of view, the automated code Review is more static analysis of the codes, by scanning the code and contrasting the rules that are produced to produce the desired results. The desired result can be a quantitative quality report for the project as a whole, or a warning to be displayed in Xcode??。 This depends on what role the user is in.In practice, there are generally two roles that will focus on the results-engineers and management. Engineers need to b
processes, enhance project visibility, build team confidence in product development Elements1. A unified code base2. Build automatically3. Automated Testing4. Each person submits code to the code base skeleton every day5. Once each code is submitted, a build is triggered on the continuous integration server6. Ensure fast Build7. Automated testing of simulated production environments8. Everyone can easily get the latest executable application9. Everyone knows what's going on.10. Automated Deploy
Using ant to compile nutch2.xSee: 1. http://blog.javachen.com/2014/05/20/nutch-intro/2. wiki.apache.org/nutch/nutch2tutorialPrerequisites: Configure Ant (http://www.cnblogs.com/xxx0624/p/4172277.html)1. Download Nutch(ex: My is apache-nutch-2.2.1-src.tar.gz)Unzip, rename the Nutch folder (named Nutch), and then move the folder to the/home folder2. Compiling NutchCD Nutchant2.1 You may encounter this error:Trying to override old definition of task Javac [taskdef] Could not load definitions from
';
This allows MySQL to be accessed remotely from the root user.
Another way
MySQL By default is not accessible via remote machines and can be accessed by using the following configuration.
My MySQL environment is UBUNTU+MYSQL5.
1. Modify the/etc/mysql/my.conf, modify the bind-address, designated as the actual IP address of the machine, your My.con modified is probably as follows
The code is as follows
Copy Code
[Mysqld] ## * Basic Settings#Default-
What is ping? Often a netizen asked me this question, in fact, the word ping originally originated from the sonar detection system, intended to refer to the pulse signal from the sonar equipment. In the development of the Internet, the process of detecting the connectivity between two nodes in the network is very similar to the sonar detection process, so the nam
-gccapacity 3400 20 20Run (JDK1.8):
Parameters
Description
Ngcmn
Cenozoic Minimum capacity
Ngcmx
Cenozoic Maximum Capacity
Ngc
Current Cenozoic capacity
s0c
Size of the first surviving area
S1c
The size of the second surviving area
EC
The size of the Eden District
Ogcmn
Old age Minimum capacity
Ogcmx
Old age Maximum C
maximum amount of heap memory can be specified by-xx:maxdirectmemorysize, and when the threshold is reached, the System.GC is called to do a full GC to reclaim the Free State of the heap out of memory. [Heap of external memory garbage recycling] gzip causes Java Native memory leak caseAnother methodological article: Java uses heap memory to cause swap high #29https://github.com/nereuschen/blog/issues/29
java-xx:maxmetaspacesize=50m Metadataoomsimulator 100000000https://stackoverflow.com/questio
/data/test.dev/WEB-INF/{classes,lib}[[emailprotected] conf]# vim /www/data/test.dev/test/index.jspCompared to the program implementation advantages, no need to detect which node failure, automatic selection.Optimize---memoryJVM Heap Memory Architecture diagramMemory usageJstat[[emailprotected] conf]# jstat -gc 116986 S0C S1C S0U S1U EC EU OC OU MC MU CCSC CCSU YGC YGCT FGC FGCT GCT37376
compare the GC information output of the two tools in the same JVM. This JVM uses the concurrency token and purge collector (Concurrent mark and Sweep collector -XX:+UseConcMarkSweepGC ).First we look jstat at the output:
jstat -gc -t 4235 1s
Time s0c s1c s0u s1u EC EU OC OU MC MU ccsc CCSU ygc YGCT FGC fgct GCT 5.7 34048.0 34048.0 0.0 34048.0 272640.0 194699.7 1756416.0 181419.9 18304.0 17865.1 2688.0 2497.6 3 0.275 0 0.000 0.275 6.7
S0 current capacity in Survivor space in the Cenozoic (KB)
S1c
The size of S1 current capacity in Survivor space in the Cenozoic (KB)
s0u
S0 capacity usage in survivor space in the Cenozoic (KB)
T12
S1 capacity usage in survivor space in the Cenozoic (KB)
EC
Eden Space Current capacity size (KB)
EU
Eden Space capacity usag
default is the size of the system memory, and of course you can use-xx:maxmetaspacesize to set the maximum size, which is the same as the previous Max perm size. At the same time, when we set the-xx:maxmetaspacesize parameter, we can also implement the problem of Oom caused by Max Perm. We can achieve the famed OOM error by setting the Maxmetaspacesize argument to JVM and running of the sample program Prov IDed. Metaspacesize Default Initial Size: Metaspacesize (12Mbytes on the 32bit client
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.