October 11, 2014
After the 11th holiday, we would like to report some summary information about EC2 maintenance updates and some effective measures to improve system availability. In September 30, we restarted less than 10% of EC2 instances to prevent any security risks related to xen security notification (XSA-108.
According to the relevant security notification disclosure mechanism of xen, we are obligated to comply with the confidentiality r
route, I developed 3 requirements for nearby tweets:
Get user feedback . After receiving a small amount of user feedback, I quickly released the first version of the nearby tweets, using this interesting, useful project to test the big shot. Through this revision I want to get as much user feedback as possible in the design process. Use Twitter,uservoice and other resources to conduct private and public testing.
The nearby tweets are built to be more robust . Although the focus is the
The new HTML5 standard allows you to embed a data-*-like attribute in a common element tag to enable access to some simple data. It is unlimited in number and can be modified dynamically by JavaScript, and CSS selectors are also supported for styling. This makes the data property particularly flexible and very powerful. With this property, we are able to make data presets or storage more orderly and intuitively. The following describes the actual application of the HTML5 Dataset storage, as well
storageAssigning a data property to a single element stores it, for example, this is a span element whose content is the name of a piece of music, and we have more information on how to pre-provision the song directly in its HTML tag, and it looks like this can be written on the HTML source:
Data-date= "2013"Data-genre= "Electronic"Data-album= "Settle (Deluxe)"data-artist= "Disclosure"Data-composer= "Howard Lawrence Guy Lawrence" >Latch (fe
rapid development.
In addition, the acceleration of the service access process will also lead to the National E-government application system and the development of government information resources integration. China Webmaster Information Network (www.chinahtml.com)
Trend four: The public affairs information open work goes to the depth
Government Information disclosure is the traditional advantage of governmental websites, which plays an important r
counterintuitive, shocking fact:
Willpower and cognitive processing ability derive energy from the same resource pool.
The 7-digit participants chose the cake, not only because their brains needed more calories, but also because the memory task depleted their willpower to resist the temptation of the cake. So we should make sure that we use scarce, easy-to-consume cognitive resources on the right things. The core task is to reduce resource leaks .Reduce cognitive
how Cisco switches Find loops and workaroundsHow can I intuitively and quickly determine if a Cisco switch has a loop? and quickly locate the switch loop location? This becomes a problem?Loop view there is currently no best way to visually view only through some information. There are many prevention loop commands in the Cisco environment in addition to spanning trees. The loop generates a broadcast storm that can seriously cause contact blocking, the switch sends a hint when the loop occurs, an
=0xceLIBRARY OBJECT HANDLE:HANDLE=62D064DC mtx=0x62d06590 (0) cdp=0Name=scott. EMPLOYEES
We See the Library object lock was being requested in Shared mode (request=s)Name of the The object is SCOTT. EMPLOYEESWe see that the object lock of the library is being requested in shared mode (request=s)
The name of the object is called Scott.employeesUse the ' handle address ' to find the process which is holding the lock on your resource by doing a search on
format a20Col table_name format a30Select value from v \\$ parameter where;Exit;End'
If [-z "$ TAB_OWNER"]; thenEcho "no object exists, please check again"Exit 0ElseEcho $ TAB_OWNERFi
Let's first implement similar functions of show alert.We can define an alias at the system level.Alias cdt = 'cd' ksh ~ /Cdt. sh''
$ Pwd/Home/ora11g$ Cdt$ Pwd/U02/dg11g/diag/rdbms/dg11g/DG11G/trace
In this case, you can view the trace logs and alert logs.A few more aliases are used,For example, you need to go to t
downloaded from Ftp: // ftp.navya.com/pub/vikas. The downloaded file is often compressed format (such as: xtacacsd-4_1_2_tar.gz), save the downloaded file to a specific directory, such as/usr, and then decompress.
# Gunzip xtacacsd-4_1_2_tar.gz
# Tar xvf xtacacsd-4_1_2_tar
2. xtacacsd compilation and Installation
First go to the/usr/xtacacsd-4.1.2 directory,
Then, modify the statements in the Makefile file:
......
MYLIBS =-lcrypt
......
BINDIR =/var/adm/tacacs; directory where xtaca
the CLI session, enter [Exit].
>?
Exec commands:
Enable Turn on privileged commands
Exit Exit from the EXEC
Help Description of the interactive help system
Ping Send echo messages
Session Tunnel to module
Show Show running system information
Terminal Set terminal line parameters
> Enable
#
# Conft
Enter configuration commands, one per line. End with CNTL/Z
(Config )#?
Configure commands:
Address-violation Set address violation action
Back-pressure Enable back pressure
Banner Define a login bann
advantage of using snapshots is that you can back up data at any time.8. Local hard disk backup Vs. Network BackupNetwork Backup may put pressure on network I/O devices. Like hard disk I/O devices, using a network to transmit a large amount of data can also cause some problems. When network backup is considered, the backup creation time varies depending on different situations. The best way is to back up the hard disk to the local server. After the backup is complete, copy it to the tape for ar
You may want to reduce the scope of each database by considering caching.Cache is divided into persistent cache, time cache, and dependent cache.1. Persistent cacheif (cache["Cache"]!=null){ }else{Cache.Insert ("Cache", "Test");}2. Time Cache. Time Expiration Cache Auto Emptyif (cache["Cache"]!=null){}else{The third parameter is basically a null time of seconds. The following indicates that the cache is emptied after 10 seconds.Cache.Insert ("Cache", "Test", Null,datetime.now.addseconds (Ten),
to download the entire CRL. is able to receive requests to check certificate revocation status, which increases the speed of certificate revocation status checks, reduces network bandwidth, and enhances scalability and fault tolerance by enabling array configurations for online transponders.
Public key-based applications and services. This is related to applications and services that support public key cryptography, in other words, applications and services must be able to support public key
current configuration information (Information in RAM) 51cto # show startup-config \ view the information of the saved disk (Information in NVRAM) 51cto # show ip route \ view route table information 51cto # show cdp neighbors \ check which cisco devices are connected to this vro 51cto # erase startup-config \ recover the vro to the factory configure 51cto # reload \ restart vro password recovery 1 start up press Ctrl + Break2 run confreg 0x21423 run
Configure snmp for Cisco devices 1. Configure IOS devices (routers) config terminal enter global configuration status Cdp run enable CDPsnmp-server community gsunion ro configure the read-only string of this vro as gsunionsnmp-server community gsunion rw configure the read/write string of this vro as gsunionsnmp-server enable traps allow the router to send all types of SNMP traps to www.2cto.com snmp-server host IP-address-server traps trapcomm. Speci
Arm supports 16 coprocessors. During program execution, each coprocessor ignores commands belonging to the ARM processor and other coprocessors. When a coprocessor hardware cannot execute commands belonging to her coprocessor, an undefined exception interrupt occurs. In the exception Interrupt Processing Program, the hardware operation can be simulated by software. For example, if the system does not contain the vector floating point generator, you can select a floating-point computing software
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.