obviously work week, but I wrote a spit groove, in fact, I would like to say something, is not caught the opportunity ...2. Modification of the primary key ID policyOriginally is a long ID 18, is the use of idworker generated, and later found in the front end JS will be the last two automatically converted to 0, this is certainly not possible, because JS number type maximum support 16 bit,No way, can only change the strategy, no matter how many digit
can ping the network"If there's nothing else behind this line, it means you're on the Internet.Troubleshooting Network problems:Can not ping the outside network after the change, change the network mode,If NAT mode is changed to bridging mode, and vice versa.If you change the network mode to find or not ping,Use the Dhclient command to re-obtain the IP address, if you cannot ping theRecheck the network configuration file with the VI editor.#vi/etc/sysconfig/network-scripts/ifcfg-ens33 "NIC conf
12-Week Lesson (April 23)12.1 Lnmp Architecture Introduction12.2 MySQL Installation12.3/12.4 PHP Installation12.5 Nginx IntroductionExtendedWhy Nginx is more efficient than Apache httpd: Principle Article http://www.toxingwang.com/linux-unix/linux-basic/1712.htmlApache and Nginx working principle comparison http://www.server110.com/nginx/201402/6543.htmlComparison of mod_php and mod_fastcgi and PHP-FPM http
13th Week
The time spent
30h
Code Amount
420 rows
Blog Volume
3 articles
Know the point of knowledge
1. Use the TXT file to resolve the login interface to remember the password problem.2. The embedded browser is implemented with JavaFX, but several bugs are not resolved.3. Understanding the Runnable threading problem in Java, different threading causes the program to be ex
, and the other thread will get it.
Example: There are three public telephone booths, and three people can call. When someone came to call, there was a wait. To wait for the inside of the people out after the (inside the person out of this action, the equivalent of the signal, tell the outside people, to you call), outside the talent can go in, the next operation. Import Threading,timedef Run (n): semaphore.acquire () time.sleep (1) print ("Run the thread:%s\n"% n) semaphore.re
This week's lab class learned about graphic programming, from framing to specific graphic printing, font settings, and other modifications to the framework. Through this week's program experiment I summed up the knowledge points:The 1.setSize method is inherited by the parent class component Class (the ancestor of the GUI object).2.pack () Call the preferred size of the framework component, or we can replace it with the SetSize methodThe 3.Swing class library is placed in the javax.swing package
Tags: Linux notes12 weeks three sessions (April 25)12.10 Nginx Access Log12.11 Nginx Log Cutting12.12 static files do not log logs and expire time12.10 Nginx Access LogThe format of the configuration file is in the main configuration file.Search for log to find the following paragraph, which is used to define the format.Public network IP, in Baidu, search IP, view.Defining Access Log pathsOpen FileUnder}, add a row to read as follows:12.11 Nginx Log CuttingEdit FileAdd the following contentProce
to compare run timesA: Using BufferedReader is faster because it has a larger buffer and can reduce the number of operations on the file when used.2.2 WillPrintWriterIntoBufferedWriterTo see if the speed of writing to the file has improved. Record the elapsed time of both. Try to analyze the reason.A: Using BufferedWriter to write files is faster because of the use of buffering technology.4. Byte stream, binary file:DataInputStream,DataOutputStream、ObjectInputStream4.1 ReferencesDataStreamDirec
Week number
Professional Learning Goals
Study time
New Line of code
Blog post Volume
Humanities Learning
Knowledge Summary
1 1 Zhou NBSP;
master the definition and basic terminology of the graph in the data structure and the data type of the graph.
6
+
0
learn about ui knowledge.
understand the basic concept and basic operation of the dia
[Email protected] ~]# ls-l/usr/bin/ls-rwsr-xr-x. 1 root root 117656 Month 6 2016/usr/bin/lsBig "S" and Small "S" the difference is not very much because we grant ls when this command has special privileges, ls This command itself is owned by ordinary households X permissions, so the execution is not restricted[Email protected] ~]# ls-l/usr/bin/ls-rwxr-xr-x . 1 root root 117656 Month 6 2016/usr/bin/ls---------------------------------------------------------------------------------------------Dire
Name: Danny Date:2017/12/2
task date
lectures
Programming program
Read the textbook
prepare for exam
exam
daily statistics
Sunday
Monday
30
NBSP;
120
150
Tuesday
140
Week number
Professional goal Learning
Professional Learning Time
Blog post Volume
Learning in the Humanities
Knowledge and Skills Summary
13
No
Average 1 hours/day
1
How do you bring a team when you don't know how to talk?
Continue to prepare for level four, exercise, with Amazon discounted into a new batch of pre-bedtime reading. The rest is nothing.This weekend is going to
the file index node number ( Inode ). An index node represents a file;--file-type : With " - F "option is the same, but does not show" * ";- k : To KB (Kbytes) Displays the file size for the units;- L : Displays a list of the contents of the directory in a long format. The output information includes file name, file type, permission mode, number of hard connections, owner, group, file size, and last modification time of file, etc. from left to right .- M : With " , The name of each file and dir
the new requirements to draw Burndown chart.Hinder:In addition to solving the existing problems, there are new bugs.Burndown ChartNote: 5 tasks per day, the total is 1, each of 0.2, so in the Burndown chart, the actual line from the planned straight line distance represents the unfinished workload.Another November 3, 4th rest, so the time period is horizontal.Tasks not completed in today's scheduled tasks: 1, the longest and shortest chain control explicit button selection design and drawing.2.
This is an English article recommended by Dflying Chen last week. It feels good. You can take a note before reading it. Don't forget to read it.
Recommended in this week's ASP. NET technical article [05/06-05/12]
Summary
There are nine articles in this issue:
Powerful and free ASP. NET refactoring Tool
Use ASP. NET asynchronous programming model to create scalable applications
Tips and tricks f
High number
Infinite series: Can't keep up with the teacher's progress, not very understand
English
The four units of the text, four-level exercise: A large number of words, four-level proximity to feel a little difficulty
Data
Algorithms for graphs and graphs
Fundamentals of computer Networks
Build, WAN and access data for wireless networks
WEB Technology
Settings for the page
Tags: Ctrl cli input ant nal ati HTTP Arc ToolA: 1. Open run first; 2. Click Run Configuration; 3. Find the common, open it, 4. Under Common, click Input file, and then enter the ID (end of the file read, keyboard press CTRL + Z). Two: If it is ant Build, 1. Click Run; 2. Point external Tools, then select External Tools Configuration; 3. Double-click the ant build, locate common, tap, set. As for Ant's explanation, there is an article in the blog park that I think is very clear. Http://www.cnblo
T () method unexpectedly returned null. "); return jdksuppliedaddress; } catch (Exception e) {Unknownhostexception unknownhostexception = new Unknownhostexception ("Failed to determine LAN address:" + e); Unknownhostexception.initcause (e); Throw unknownhostexception; } }}Reference Blog Address: 772366024, access to useragent (user agent) methodThe useragent can be used to determine whether a user is currently operating on a desktop or mobile device, and c
Tags: grep egrep grep-e grep-v grep-n9.1 Regular Introduction on _grepEgrep is the extension of grep, with all grep functions;grep is used to filter the keywords;-R Traverse All subdirectories-V to reverse, meaning that in addition to the keywords in the row, the other lines show up;9.2 grep in' 0-9 ' means any number from 0 to 9;' "^0-9" means any number other than 0 to 9;' ^# ' denotes lines beginning with #;^ Put in brackets inside ' [^ keywords] ', indicating non;^ Put in front of the keywor
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.