; fromCollectionsImportCounter>>> Counter (a[1]) Counter ({')': 6186,'@': 6157,'(': 6154,']': 6152,'#': 6115,'_': 6112,'[': 6108,'}': 6105,'%': 6104,'!': 6080,'+': 6066,'$': 6046,'{': 6046,'': 6043,'*': 6034,'^': 6030,'\ n': 1221,'-': 4,'a': 1,'T': 1,'I': 1,'L': 1,'': 1,'y': 1,'>': 1,'u': 1,'e': 1,'Q': 1})It's kind of interesting.Because the HTML is too large, I open it directly with Urlopen () and then take the regular expression out of that part (of course, in order to show the superiority of
Http://kodango.com/useful-documents-about-shell$$ the shell itself PID (ProcessID)$! PID of the Shell's last running background process$? The return value of the last command that was run to check whether the previous command executed successfully.$* all parameter lists, as a whole.[email protected] all parameter lists. Alone as a whole.$# the number of arguments added to the shell.The file name of the Shell itself."Shell Learning Notes" $#,[email protected], explaining the meaning of $
Anonymous functions:calc=Lambda x:x*3print(Calc (3)) # return 9Higher order functions:
You can pass a function name as an argument to another function
The return value can contain a function name
Adorner :Essentially a function that adds additional functionality to other functions
Cannot modify the source code of the decorated function
Cannot modify the method of invocation of a decorated regret
Simple Adorner example-run time for statistical functions:Im
There are three different parameters to the function:
General parameters
Default parameters
Dynamic parameters# ######### define function ########## name is called the formal parameter of function func, abbreviation: Parameterdef func (name):Print (name)# ######### Execute function ########## ' Fuyuteng ' is called the actual argument of function func, abbreviation: argumentFunc (' Fuyuteng ') def func (name, age = 18print (" %s:%s (name,age)) # specify parameter func ( ' fuyuteng ", 19)
-rhel6
Uninstalling selinux is said to be a bug in selinux iN OS.
Then generate the key pair.
L configure the java environment and jdk
1. First, you must use the following command to download the rpm package. There are also many introductions on the Internet, because of the problem with the oracle.com website.
Wget -- no-cookies -- no-check-certificate -- header "Cookie: gpw_e24 = http % 3A % 2F % 2Fwww.oracle.com" http://download.oracle.com/otn-pub
generated in slave1.
The final solution is:
Http://eosrei.net/articles/2012/01/fixing-open-idrsa-failed-permission-denied-rhel6
Uninstalling selinux is said to be a bug in selinux iN OS.
Then generate the key pair.
L configure the java environment and jdk
1. First, you must use the following command to download the rpm package. There are also many introductions on the Internet, because of the problem with the oracle.com website.
Wget -- no-cooki
The distributed architecture is a centralized design.Master control machines connected to multiple processing nodesTherefore, it is critical to ensure the high availability of the master machine. Distributed locks are a good solution to this problem.Zookeeper is a Distributed Lock Management System for Highly Reliable metadata maintenance..
I. Application
1. Cluster Mode
In cluster mode, multiple zookeeper nodes are configured to start the zookeeper cluster. zookeeper will vote for a no
return in the generator function will trigger a stopiteration exceptionFunction:Zip (iter1[, iter2[, ...]) returns a Zip object that is used to generate tuples, and the number of tuples is determined by the smallest iteration objectEnumerate (iterable[, start]) generates an indexed enumeration object, returning an iterative type of index-value pair (Index-value pair), the default index is zero-based, or it can be specified with start (Sort custom labels)byte strings and byte arraysByte string b
Then the previous article "Yaf 0 Basic Learning Summary 1-YAF Framework Introduction" We have a general understanding of the YAF framework, but for programmers, those words are superficial, the most they want is to start tapping the code. Of course this is the most effective way to learn the YAF framework, the more you knock, the faster you will learn, the same for any language, and we have to install the YAF framework before writing the code.Compared
-Session communication methods, and implement interaction between services and desktop users in Windows 7 and Vista.
References
1. WTSSendMessage FunctionThe http://msdn.microsoft.com/en-us/library/aa383842 (VS.85). aspx
2. CreateProcessAsUser FunctionHttp://msdn.microsoft.com/en-us/library/ms682429 (v = VS.85). aspx
3. WTSSendMessage (wtsapi32)Http://www.pinvoke.net/default.aspx/wtsapi32/WTSSendMessage.html
4. WTSQueryUserToken FunctionThe http://ms
Lucas theorem: N is written in P-ary A[n]a[n-1]a[n-2]...a[0], and M is written in P-b[n]b[n-1]b[n-2]...b[0], then C (n,m) and C (A[n],b[n]) *c (a[n-1],b[n-1]) *c ( A[n-2],b[-2]) *....*c (a[0
Reprinted from: Cardiac Note (http://493420337.iteye.com/blog/593981)--------------------------------------------------------------------------------------------------------------- --------------------------------------------------Chomsky divides the method into four types, namely, type 0, 1, 2 and type 3. The concept of these types of grammar must be mastered and is a very important test center. For these
Topic:Number 0 to n (inclusive) in number 2 appears several times.Ideas:1, violent methods, the number of each number contains a few 2, and then summed up.2, Analysis: Consider the number of each digit n each occurrence 2 times, such as 123123;Consider 4123123 from left to r
The string $s = ' A, B, C (x, y ("Z", 2, 0)), D, E ';
Split into arrays, the difficulty is C (x, y ("Z", 2, 0)), is a whole.
Desired Result:
Array
' A ',
' B ',
' C (x, y ("Z", 2, 0)) ',
' D ',
' E ');
Reply to discussion
Preface
In Linux, all devices are regarded as files. Each time a file is opened, there is a file descriptor that represents the file to be opened. When the program starts, three I/O device files are opened by default: stdin, stdout, and stderr. The file descriptors 0, 1, and 2 are obtained respectively.
Instance
Now let's look at an example of testing the ttyname function (the ttyname function returns the p
From: Http://www.hivemq.com/blog/mqtt-essentials-part-6-mqtt-quality-of-service-levelsQuality of Servicewhat is quality of Service?The quality of Service (QoS) level was an agreement between sender and receiver of a message regarding the Guarant Ees of delivering a message. There is 3 QoS levels in MQTT:
At the most once (0)
At least once (1)
exactly once (2).
When talking about QoS th
Javascript Learning Guide 0---2
Okay. Pretty girls have read it. Let's continue with the content of the last lecture (the content of the previous section)Control statement:
First, I would like to sum up a total9
Expires/expires + CgogaWYg0 ++ expires/Cw + bAtLfWsfDOqtXivLi49r/Y1sbT777kvtm49sD919MKPHA + expires = "brush: java;"> var I = 10; if (I> 15) {alert ("I> 15")} else if (I
Var I
server available, giving up.VFS: Unable to mount root FS via NFS, trying floppy.VFS: cannot open root device "mtdblock2" or unknown-block (2, 0)Please append a correct "root =" Boot option; here are the available partitions:Kernel panic-not syncing: VFS: Unable to mount root FS on unknown-block (2, 0)
[Solution proces
$# is the number of arguments passed to the script. $ is the name of the script itself. $ is the first parameter passed to the shell script, and the second argument that is passed to the shell script is [email protected] is a list of all the parameters passed to the script $* is to display all parameters passed to the script in a single string, unlike positional variables, which can be more than 9 $$ is the current process ID number for the script to run? is to display the exit status of the las
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.