SVN – simple user manual

background Two new programmers were added to support the development of a branch because of the project’s need, so you need to create a branch in the original SVN and assign users and permissions to the new commer.         0. Get ready To use SVN on the Window system, we’d better install the 2 software of SVN separately: ServerEnd: VisualSVN Manager   ClientEnd: TortoiseSVN     1. Create new users Here, we operate on SVN’s server machine mountain with the tool Visual SVN Manager. The operation is very simple, as shown in the following figure: After entering the basi...

C# FileDialog file selection

1、SaveFileDialog OpenFileDialog openfile = new OpenFileDialog(); //Initial display file directory//openfile.InitialDirectory = @""; openfile.Title = "Please select the file to send."; //Filter file type openfile.Filter = "Text file |*.txt| executable file |*.exe|STOCK|STOCK.txt| all file types * * *."; if (DialogResult.OK == openfile.ShowDialog()) { //Assign the full path of the selected file to the text box. textBox1.Text = openfile.FileName; } 2、SaveF...

14, Linux shared memory shm_open opens shared memory file.

shm_openBrief introduction of function shm_open:To create a memory file, the path requires something like / filename, starting with / and then the filename, with no /. shm_openThe prototype and header files of the function are as follows: 1 NAME 2 shm_open, shm_unlink - create/open or unlink POSIX shared memory objects 3 4 SYNOPSIS 5 #include <sys/mman.h> 6 #include <sys/stat.h> /* For mode constants */ 7 #include <fcntl.h> /* For O_* constants */ 8 9 int shm_open(const char *name, int oflag, mode_t mode); 10 ...

Snowflake algorithm ID generation

Snowflake algorithm ID generation”. http://blog.csdn.net/w200221626/article/details/52064976 There are no rules for ID generated by UUID or GUID. SnowflakeThe algorithm is implemented by Twitter engineers in order to achieve incremental but not repeated ID. The top 41 are said to be able to support 1023 machines by 2088, the top 10 can support 1023 machines, and the last 12-bit serial number can generate 4095 self-increasing IDs in a millisecond. There are many ways of primary keys in data: database increment and program generation. Snowflake algorithm is commonly used in program gene...

[SCOI2008] coloring scheme

[SCOI2008] coloring scheme” (to be continued) Subject matter:A row;Row 1\(n\)A piece of wood,\(k\)Kinds of paint, each paint.\(c_i\)The barrel requires that the color of two adjacent blocks cannot be the same.\(\pmod{1e9+7}\) Solution.1 state:set up\(f[i][j]\)For the former\(i\)The block is painted, and the last piece is\(j\)colour transfer:$f[i][j] = \sum_{h=1,h \ne j } ^ {k}f[i-1][h] $ OK, I can’t record how much each barrel is used, hang up. Eh, this is this\(c[i]\)It’s a little small, and if two kinds of paint remain the same number of barrels, explain. state...

Java virtual machine learning (10): class loader (ClassLoader)

classloader Class loader (ClassLoader) is used to load class bytecode to Java virtual machine. In general, Java virtual machines use Java classes in the following way: Java source files are converted to Java after passing through JavacBytecode file (.Class file). The class loader is responsible for reading the Java byte code and converting it into an instance of the java.lang.Class class. Each of these instances is used to represent a Java class. The actual situation may be more complicated, for example.Java byte code may be generated dynamically by tools or downloaded through the network. ...

Java virtual machine learning (9): object reference intensity

Whether by counting algorithm to determine the number of object references, or by the root search algorithm to determine whether the object reference chain is reachable, to determine whether the object is alive or not is related to the “reference”. References are mainly divided into four types: Strong Reference, Soft Reference, Weak Reference and Phantom Reference, and the strength of the reference.Sharp decrease in turn. Strong reference:   This refers to a common occurrence in code, similar to “Object objectRef = new Obejct,” which will never be cleaned up by GC ...

Windows Server 2012 R2 domain controller deployment

1. Summary > keep default in server selection page.“Select server from the server pool, click next.       2.4  > because of the test environment, noWindows 2012The following servers, so keep the default forest and domain level for 2012 R2, which can be selected according to the environment in actual production; enter the directory restore password, which is the password used when restoring the domain control state       2.12