CESBG Cloud Enterprise Solution Business GroupWork: Fujin Precision Electronics (Tianjin) Co., Ltd. ---Foxconn group Tianjin plant CESBG Business Group ESSN/SRD/SW/ROMQA work, during the period mainly engaged in the HP Server G8 BIOS ROM test, Responsible for the BL420 and Mini-pooch cases, and try to G9 the UEFI BIOS Test automation Tool Code,issue tracking and validation feedback, familiar with the server hardware architecture and BIOS boot mechanis
Preface
---------------------
Recently, I was planning an LBS project, so I started with HTC G8 and Suwon 1700. I didn't know whether it was psychological or not. I suddenly found that the blog Park homepage was full of Android. At the beginning, I was very happy and felt like I had found a team. However, after studying Android and iPhone for a long time, I gradually found many problems with Android.
Which one makes money on Android and iPhon
should be noted that I am a cross-platform expert and do not like to use Windows only. I used to write code for UNIX platforms. What I wrote below is not verified, but I have tried not to use any windows things. I only use standard C or standard C ++. However, I have never tried to compile it in other systems or compilers. Therefore, if the descriptions below are incorrect, they will not be modified. I t ;? 7 N/B9 F, L: Q %}.} "X4 D * K' $ I9 C/N * PThe following code is still written in VC, be
sparafile "Initial. cn2"
4 J "J6 l r$ r'e M # I/B6 F ,[! N6 B0 P8 V3 H/z "V7 C I
# Determine whether the file initial. cn2 exists
9 p; J6 N2 O0? +] 1 y Assign nreturn fileexists (sparafile)
'F * _ % u % ^-Z % i8 G8 P If EQ nreturn 1
'{/L # f) I) G1 D .{ # Open this file if it exists
8 S7 '"H6 j0' 3 C! C Fileopen sparafile
, S # Y: J "O! M "F # U2 t # Formatting and reading from a file
Data To store the data list in strlist.
) T8 y "d
working methods 8E 'g8 ~! } + S: D8 sSuccessful people follow the best working spirit and methods. Successful users must consider the feasibility, possible costs, the proportion of resources invested and output, and the inevitable and possible risks of failure in advance. THINKING CLEARLYOnce a decision is made, the matter should be done and a new job should be started immediately. In addition, they share the same characteristics that once they are i
give the series and the maximum and minimum values!
Finally, the histogram of 2g-r-b is obtained:
Use OTSU to binarization 2g-r-b Grayscale Images:
# Convert to u8 type and perform otsu binarization gray_u8 = np. array (gray-minVal)/(maxVal-minVal) * 255, dtype = np. uint8) (thresh, bin_img) = cv2.threshold (gray_u8,-1.0, 255, cv2.THRESH _ OTSU) cv2.imshow ('bin _ img ', bin_img)
Then we get a good binary image:
Use this as the mask to obtain the color plant image:
# Obtain the color
brief introduction to my device list:
Router: H3C SR6604
Firewall: H3C SecBlade FW Firewall
Core switches: H3C7506, H3C7503, Huawei S6506, Huawei 5700
Specific operations:
Mirror the optical port of H3C7506 connected to the SR6604 router to the port connecting H3C7506 to the Bandwidthd server.
For example, you can create an image on the optical port to mirror traffic from G8/0/1 to G8/0/12.
Interface Gig
Replacement: S/S1/S2 (replace the next S1 with S2)5. Replace All:%S/S1/S26. Replace the current line only: s/s1/s2/g7. Replace some lines: n1,n2 s/s1/s2/g8, search mode for/string, search for the next n, search for the previous n9, make bookmarks MX, but do not see bookmark tags, and can only use lowercase letters10. Move to the key next to ' x,1 ' at a label11. Move to the location where you last edited the file.PS:. Represents an arbitrary characte
replacements1. The cursor looks backwards for keywords # org#2, the cursor forward to find the keyword * org*3. The current line looks for charactersfx/Fx/tx/Tx4. Basic substitution s/s1/s2 (replace next s1 to s2 )5. Replace All%s/s1/s26, only replace when the forwards/s1/s2/g7. Replace some linesn1,n2 s/s1/s2/g8, search mode for /string , search the next place for n , search the previous place forN9, make bookmarks mx , but do not see bookmark marks
Replacement: S/S1/S2 (replace the next S1 with S2)5. Replace All:%S/S1/S26. Replace the current line only: s/s1/s2/g7. Replace some lines: n1,n2 s/s1/s2/g8, search mode for/string, search for the next n, search for the previous n9, make bookmarks MX, but do not see bookmark tags, and can only use lowercase letters10. Move to the key next to ' x,1 ' at a label11. Move to the location where you last edited the file.PS:. Represents an arbitrary characte
Replacement: S/S1/S2 (replace the next S1 with S2)5. Replace All:%S/S1/S26. Replace the current line only: s/s1/s2/g7. Replace some lines: n1,n2 s/s1/s2/g8, search mode for/string, search for the next n, search for the previous n9, make bookmarks MX, but do not see bookmark tags, and can only use lowercase letters10. Move to the key next to ' x,1 ' at a label11. Move to the location where you last edited the file.PS:. Represents an arbitrary characte
the cursor to the last lineEnter the uppercase letter GGo back to the first lineInput GGGo to the line with the specified line numberEnter line number GExample: 5g,8gMove cursor up or downMethod One: ↑↓←→Method Two: HJKL5. Edit the text contents of the operationDelete Current line: DDDelete n rows starting from the current line: DNDUndo the action you just made: URedo the action you just made: Ctrl+rCopy Current line: yyPaste to the next line in the current row: lowercase letter PPaste to the p
keywords * or g*3. The current line looks for characters FX, FX, TX, TX4. Basic Replacement: S/S1/S2 (replace the next S1 with S2)5. Replace All:%S/S1/S26. Replace the current line only: s/s1/s2/g7. Replace some lines: n1,n2 s/s1/s2/g8, search mode for/string, search for the next n, search for the previous n9, make bookmarks MX, but do not see bookmark tags, and can only use lowercase letters10. Move to the key next to ' x,1 ' at a label11. Move to t
The Prum filter is actually made up of a very long binary vector and a series of random mapping functions, and the Prum filter is used to retrieve whether an element is in a set
AdvantagesPrum filters have space and time advantages. The Prum filter storage space and insert/query time are constant. In addition, the Hash function is not related to each other and is conveniently implemented by hardware. The Prum filter does not require the storage element itself, and has an advantage in certain sit
access by adding such a mechanism to the operations that involve querying the data.The following is a description of Memcached's compilation process in Linux x86_64 environments.The parameters of the working machine are as follows:Cpu:intel Xeon 5110Memory: DDR2 1g*4Host model: ProLiant DL140 G3Operating system: Red Hat Enterprise Linux Server Release 5.4 version x86_64Kernel version: 2.6.18GCC version: 4.1.2g++ version: 4.1.21. Download Memcached So
The first method: System DMESG information inside[[email protected] ~]# grep ' DMI '/var/log/dmesgdmi 2.8 present. DMI:HP ProLiant dl380p Gen8, BIOS P70 12/20/2013The second method:Install the Dmidecode package and use the Dmidecode command to view it;[[email protected] ~]# rpm-qf/usr/sbin/dmidecodedmidecode-2.11-2.el6.x86_64[[email protected] ~]# dmidecode |grep-a4 ' System Information ' System Information manufacturer:hp Product name:proliant dl380p
HP HP DL160 G6 RAID and Server2003 system installation method
HP ProLiant DL160 G6 Server
Manually install the Windows Server 2003 system and manually install all drivers
(Pictures from Xin Pengcheng)
Hardware environment: DL160G6
Software Environment: Windows Server 2003 SP2
Array card: HP Smart Array b110i SATA RAID Controller
Other equipment: U disk
Operation Steps:
1. If you need an integrated array card to do the array, first F10 into th
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.