[AppleFamilyGroupTweet Create AppleScript scripts to control MacOS]
Windows - windows Linux-linux MacOS-osx 4. Launch vs Attach Launch refers to attaching debug sessions to the node debugging program that is started directly next (that is, following –inspect-brk=port). Specifically, debug port must correspond to –inspect-brk=port; Attach refers to attaching debug sessions to the corresponding port of the specified running node program in debug mode. If the node program is in debug mode, you need to provide the processId.
Recommended content IMESSGAE related
| Recommended content by the author ✈️@IMEAE | [iMessage Apple recommended software] *** Click to view the content information requested by the author |
|---|---|
| Recommended content by the author ✈️@IMEAE | [1. Family promotion, photo album promotion, calendar promotion content] *** Click to view the content information requested by the author |
| Recommended content by the author ✈️@IMEAE | [2.iMessagePush on behalf]*** Click to view the content information requested by the author |
| Recommended content by the author ✈️@IMEAE | [3.iMessage push system] *** Click to view the content information requested by the author |
| Recommended content by the author ✈️@IMEAE | [4.IM group messaging protocol push] *** Click to view the content information requested by the author |
| Recommended content by the author ✈️@IMEAE | [5.iMessage push device] *** Click to view the content information requested by the author |
-
Source Maps VS Code turns on source maps by default. If the compiled file is not in the same level directory, you need to configure the outFiles attribute to report where the debug adpater source file is.
-
Variable swap Paths and other values commonly used by VSCode can be used as variables.
{ "type": "node", "request": "launch", "name": "Launch Program", "program": "{workspaceFolder}", "args": ["{workspaceFolder} - the path to the folder opened in VS Code;
If user A (browser) uses Apache to access the Tomcat server, there is no doubt that TomCat cannot understand the content you request.
In other words, the browser has to send protocol data packets in different formats according to different server types. This is simply too much trouble! Since we are all accessing websites, why not use the same data format? Wouldn’t it be great if we reported data in this format every time we visit the website?
Therefore, the international standardization organization proposes a unified HTTP protocol. All browser companies must design their own programs according to the settings of the HTTP protocol. Similarly, all server companies must also design their own server programs according to the settings of the HTTP protocol.
In this way, Google browser can use similar data formats to access various servers. Not only that, but also IE and 360. Everyone gets along well and there will be no problems in communication.
transport layer The representative protocols of the transport layer are TCP and UDP. The important role of the transport layer is to control the reliability of the data transmission process. (Except UDP) Generally speaking, the functions of the transport layer are implemented by the operating system.
Just imagine, if Windows and Linux implement different transport layer protocols, they will not be able to communicate with each other due to different data formats.
Therefore, the consistency of the transport layer protocol is also necessary. It enables reliable transmission between different operating systems The International Organization for Standardization has proposed two unified standards, TCP and UDP.
Management method: For piles, it will automatically manage the lightning arrester. There is no need to control it; for the heap, the release event is made by the programmer, and MemoryLeak control can easily occur. Application size: Warehouse: In Windows, a warehouse is a data structure that extends to a lower location, which is a continuous storage area. The meaning of this sentence is that the maximum traffic flow of the warehouse and the maximum capacity of the warehouse are measured by the system. In Windows, the stack size is 2M (multiple words are 1M, the summary fixed size is limited to the effective virtual memory in the processor system. You can see that the space obtained is flexible and it is relatively large. Classperson space. /property/privatevargender:boolean=true/layout/buildingicsor(title: string, country: boolean): this() {println("construction")} companionobject {valinstance = ("yzq" , false) /* Contact the opening complement in the related tool * / Initialization {println ("companoninit1") }} / * Initialization code block * / Initialization
But there is no independent address space in the thread, and the thread has died. It is the entire process, so a multi-process program is more powerful than a multi-threaded program, but it costs money in the process. The cost is very high and the service is low. However, for more or less necessary, you have to make use of some scalar control.
VBoxManage modifyvm "Mac OS virtual machine name" --cpuidset 00000001 000106e5 00100800 0098e3fd bfebfbff
VBoxManage setextradata "Mac OS virtual machine name" "VBoxInternal/Devices/efi/0/Config/DmiSystemProduct" "iMac11,3"
package com.atguigu.gulimall.search.thread;
import java.util.concurrent.*;
Parameters passed to program debugging args: array // Start the program in this directory for debugging cwd: '{workspaceFolder}/.env' //Start the program's console console: 'internalConsole' | 'integratedTerminal' | 'externalTerminal' outputCapture: string } interface attach { // When using the processId attribute, the debug port is automatically determined based on the Node.js version (and protocol used) and cannot be configured explicitly. So don't specify the port attribute. processId: string3. Platform-specific properties Launch.json supports different property values for different operating systems args uploads values in Windows, stopOnEntry uploads values in MacOS
The core protocol of the collection layer is IP protocol (Internet Protocol). The IP protocol determines how to deliver the packet based on its destination IP address. If the data packet cannot be sent directly to the target host, then the IP protocol finds a suitable next hop router for it and delivers the data packet to the router for forwarding. Repeating this process multiple times, the data packet eventually reaches the target host, or is discarded due to transmission failure. It can be seen that the IP protocol uses a hop by hop method to determine the communication path. Another important protocol at the network layer is the ICMP protocol (Internet Control Message Protocol). It is an important supplement to the IP protocol and is mainly used to detect network connections. The message format used by the ICMP protocol is shown in the figure below.
In the above figure, the 8-bit type field is used to distinguish the message type. It divides ICMP messages into two categories: one is different error messages, which are mainly used to respond to network errors, such as target unreachable (type value 3) and redirection (type value 5); The other type is the interrogation message, which is used to query network information. For example, the ping program uses ICMP messages to check whether the target is reachable (type value is 8). Some ICMP messages also use an 8-bit code field to further subdivide different conditions. For example, a redirect message using a code value of 0 indicates network redirection, and a code value of 1 indicates host redirection. ICMP messages use a 16-bit checksum field to perform a Cyclic Redundancy Check (CRC) on all messages (including headers and content) to check whether the message is damaged during transmission. Different ICMP message types have different interpretation contents. For the ICMP message format, please refer to RFC 792, the standard document of the ICMP protocol. It should be pointed out that the ICMP protocol is not a network layer protocol in the strict sense, because it uses the services provided by the IP protocol at the same layer (generally speaking, the upper layer protocol uses the services provided by the base layer protocol).
{ "version": "0.2.0", "configurations": [ { "type": "node", "request": "launch", "name": "Launch Program", "program": "{workspaceFolder}/node_modules/gulp/bin/gulpfile.js", "args": ["myFolder/path/app.js"], "windows": { "args": ["myFolder\\path\\app.js"] }, "stopOnEntry": true, "osx": { "stopOnEntry": false println("personit2, gender: {gender}")} /Initialization code block/{Initialize println("personit") title:
Recommended content IMESSGAE related
| Recommended content by the author ✈️@IMEAE | [iMessage Apple recommended software] *** Click to view the content information requested by the author |
|---|---|
| Recommended content by the author ✈️@IMEAE | [1. Family promotion, photo album promotion, calendar promotion content] *** Click to view the content information requested by the author |
| Recommended content by the author ✈️@IMEAE | [2.iMessagePush on behalf]*** Click to view the content information requested by the author |
| Recommended content by the author ✈️@IMEAE | [3.iMessage push system] *** Click to view the content information requested by the author |
| Recommended content by the author ✈️@IMEAE | [4.IM group messaging protocol push] *** Click to view the content information requested by the author |
| Recommended content by the author ✈️@IMEAE | [5.iMessage push device] *** Click to view the content information requested by the author |
Map<String, Object> configs = new HashMap<>(); // Set up the accelerator address adopted by the initial connection to Kafka configs.put(ProducerConfig.BOOTSTRAP_SERVERS_CONFIG, "http://192.168.235.132:9092"); //Set the serialization class of key configs.put(ProducerConfig.KEY_SERIALIZER_CLASS_CONFIG, "org.apache.kafka.common.serialization.IntegerSerializer"); //Set a custom serialization class configs.put(ProducerConfig.VALUE_SERIALIZER_CLASS_CONFIG, OrderSerializer.class); configs.put(ProducerConfig.ACKS_CONFIG,"all"); KafkaProducer<Integer, Order> kafkaProducer=new KafkaProducer<Integer, Order>(configs); //define order For the heap, frequent new/depleted memory space will inevitably lead to non-sustained memory space, resulting in a large amount of fragmentation, which reduces the efficiency of the program. For the stack, there is no such problem, because the stack is the first queue, it is one of them, so it will never have a storage block from the middle of the stack. Allocation: The heap is dynamically allocated and there is no physical allocation stack. There are two paradigms of allocation: dynamic allocation and dynamic allocation. Static allocation is a compiler implementation of this type of deflection variable.
Alloca supports dynamic allocation, but dynamic allocation and stack stacking are different. His dynamic allocation is not done by the new editor's wishes. Allocation efficiency: The stack is a data structure provided by the mechanical system. The computer provides support: allocating the address of the stack, special instructions in the stack, and determining that the stack is provided by the C/C++ function library, and its system is very complex. 5. Tool-c memory management? When you create an object into a new AlloCleplication method, the object's retention electroscope value is 1 and is set to auto-publish. Is there any overall operation to ensure that the object has been cleared? If you complete during this time, you need to save it and make sure it completes. If you have a reserved object, you need to (eventually) publish or automatically release the object. You must preserve the method and the quantities used.