Sorry. Because I was learning this one month ago, and I had solved the problem almost now. I thought I 'd leave it empty and record it. I didn't expect it to be forgotten in such a short time.
It's almost no good. It should be hot. Not much
The following is a self-experienced jrtplib for installing embedded Linux. It is different from installing jrtplib on a PC. Some errors may occur and it takes a lot of time to solve them. 1. Download and decompress the SDK. Here is the use of
I have been home for nearly 20 days. During this period of time, I can still afford my own resources. At least I read the books I brought back this time (I don't think it's a waste of time to watch TV ads ). Combined with self-reflection, I have
This afternoon, ubuntu (I am using Ubuntu 9.10) is very useful. It is a good operating system for Linux beginners. Since I have just been familiar with C ++, I cannot help writing C ++.ProgramEnthusiasm. So I wrote a very simple C ++ program.
Installation and setting of grads in UNIX, Linux, and Windows
Windows:
There are two versions of grads on Windows. The main difference is whether "X Server" is required. The following describes how to install x Win32 grads 1.8sl9 in WINXP (the
When using shared memory in Linux, The shmat function always encounters a problem according to the methods on books or on the Internet.
Tip:
Shmat Error
Permission denied
Sudo is required each time before it can run normally. If a
Document directory
Get boost Library
Compile and install
Source: http://blog.ehomy.net/archives/148
Work Platform: fedora 12Get boost Library
In Linux, two official compression versions are
How to use Linux as a proxy server (the simplest method is redhat9.0)
Configuration required:CPU: Pentium 133 MHzMemory: 32 MBDisk: 640 MBNIC: 2
1. install Linux, select the minimum installation, and remove all components except for configuring IP
Hadoop-0.19.0 code can be downloaded to Apache, the link is iis5, Linux installed Java version is 1.6.0 _ 16, and java_home =/usr/Java/jdk1.6.0 _ 16.
Practice Process
1. log on to localhost through SSH without password verification
Ensure that
When using the VI editor to edit long files, they are often dizzy and cannot find the content to be changed.
In this case, the search function is particularly important.
The method is as follows:
1. Enter "/string" in command mode, for example,
Long sys_clock_gettime (clockid_t which_clock, struct timespec * TP );
Which_clock parameter description
Clock_realtime
Clock_monotonic: Timing starts from the moment when the system is started, and is not affected by changes in the system
When you need a complex system, coordinate all aspects of the system, and flexibly support various mechanisms and policies, even simple problems will become complicated. Linux is such a complicated system. So we need to understand it, try to
Update X-Linux kernel and kernel version (2.6.35.7) on the roboard. My environment is: boot: syslinux, file system busybox
1. Because vortex86dx is used on the roboard, the config file uses the default i386 configuration file.
Make
As far as I know, in Linux, the char type is 1 byte, wchar_t is 4 bytes, and Unicode is 2 bytes.
Library C provides functions of the wchar_t type, such as wcslen and wcscpy. Therefore, the processing of char and wchar_t types is not hindered in
[Original article] Author: whq_ddd@163.com welcome reprint, reprint please specify the Source: http://blog.csdn.net/whqwhqwhq/article/details/6853084
Gcc-PG inserts a _ mcount routine function for each function call. The prototype of _ mcount
1. Download JDK1. log on to the official JDK download network of sun.Address: http://java.sun.com/javase/downloads/index.jsp2. Download jdk-1_5_0_07-Linux-i586-rpm.bin files Ii. Install JDK1. AddAdd executable permissions for jdk-1_5_0_07-linux-i586-
/* He copies the content of a linear address within a certain range by copying only the memory page */00150int copy_page_tables (unsigned long from, unsigned long to, Long SIZE)
00151 {
00152 unsigned long * from_page_table;
00153 unsigned long * to_
The previous article discussed several mechanisms of concurrency control, such as interrupt shielding, atomic operations, and spin locks. Next we will talk about another important mechanism of concurrency control: semaphores.
The usage of semaphores
The script for viewing Nic traffic in Linux (modified perfectly)
Fixed the problem where a negative number is displayed.Added bits/s statisticsAdded the final average sum.#! /Bin/bash# Osdba 2008.10.22 monitor the interface's network traffic.#
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service