SSHLogin to server and restart VNC service with command line.
$service vncserver start
The following are the following:
Starting VNC server: no displays configured [FAILED]
Solve:
$vim /etc/sysconfig/vncservers
View configuration files and modify the following two lines of configuration file parameters as follows:
VNCSERVERS=”2:shim”VNCSERVERARGS[2]=”-geometry 1360×768 -nolisten tcp -localhost”$source /etc/sysconfig/vncservers
Restart service, client connection server is normal.
TensorFlow™ It is an open source software library for high performance numerical computation. With its flexible architecture, users can easily deploy computing to multiple platforms (CPU, GPU, TPU) and devices (desktop devices, server clusters, mobile devices, edge devices, etc.). TensorFlOw @ was originally developed by researchers and engineers on the Google Brain team, which is part of Google’s AI division, to provide strong support for machine learning and in-depth learning, and its flexible numerical computing core is widely used in many other scientific disciplines.field
Next, w...
fis3 Static resources store windows: C:\Users\Administrator\AppData\Local\.fis3-tmp
1、SaveFileDialog
OpenFileDialog openfile = new OpenFileDialog();
//Initial display file directory//openfile.InitialDirectory = @"";
openfile.Title = "Please select the file to send.";
//Filter file type
openfile.Filter = "Text file |*.txt| executable file |*.exe|STOCK|STOCK.txt| all file types * * *.";
if (DialogResult.OK == openfile.ShowDialog())
{
//Assign the full path of the selected file to the text box.
textBox1.Text = openfile.FileName;
}
2、SaveF...
Snowflake algorithm ID generation”.
http://blog.csdn.net/w200221626/article/details/52064976
There are no rules for ID generated by UUID or GUID.
SnowflakeThe algorithm is implemented by Twitter engineers in order to achieve incremental but not repeated ID.
The top 41 are said to be able to support 1023 machines by 2088, the top 10 can support 1023 machines, and the last 12-bit serial number can generate 4095 self-increasing IDs in a millisecond.
There are many ways of primary keys in data: database increment and program generation. Snowflake algorithm is commonly used in program gene...
[SCOI2008] coloring scheme” (to be continued)
Subject matter:A row;Row 1\(n\)A piece of wood,\(k\)Kinds of paint, each paint.\(c_i\)The barrel requires that the color of two adjacent blocks cannot be the same.\(\pmod{1e9+7}\)
Solution.1
state:set up\(f[i][j]\)For the former\(i\)The block is painted, and the last piece is\(j\)colour
transfer:$f[i][j] = \sum_{h=1,h \ne j } ^ {k}f[i-1][h] $
OK, I can’t record how much each barrel is used, hang up.
Eh, this is this\(c[i]\)It’s a little small, and if two kinds of paint remain the same number of barrels, explain.
state...
classloader
Class loader (ClassLoader) is used to load class bytecode to Java virtual machine. In general, Java virtual machines use Java classes in the following way: Java source files are converted to Java after passing through JavacBytecode file (.Class file). The class loader is responsible for reading the Java byte code and converting it into an instance of the java.lang.Class class. Each of these instances is used to represent a Java class. The actual situation may be more complicated, for example.Java byte code may be generated dynamically by tools or downloaded through the network.
...
Whether by counting algorithm to determine the number of object references, or by the root search algorithm to determine whether the object reference chain is reachable, to determine whether the object is alive or not is related to the “reference”.
References are mainly divided into four types: Strong Reference, Soft Reference, Weak Reference and Phantom Reference, and the strength of the reference.Sharp decrease in turn.
Strong reference:
This refers to a common occurrence in code, similar to “Object objectRef = new Obejct,” which will never be cleaned up by GC ...