PaddleDTX 1.1.0 中文文档
/testdata/executor/node1/conf/config.toml -f "01d3b812-4dd7-4deb-a48d- 4437312a164a,e02b27a6-0057-4673-b7ec-408ad060c952" -i fdc5b7e1-fc87- 4e4b-86ee-b139a7721391 -e "executor1,executor2" # 命令行返回 TaskID: a7dfac4 191c708b901f,f8439128-bebb-47c2-a04d-1121dbc087a4 ./paddledtx_test.sh start_vl_linear_predict -f cb40b8ad-db08-447f- a9d9-628b69d01660,2a8a45ab-3c5d-482e-b945-bc45b7e28bf9 -m 9b3ff4be- bfcd-4520-a23b-4aa6ea4d59f10 码力 | 57 页 | 1.38 MB | 1 年前3PaddleDTX 1.0.0 中文文档
/testdata/executor/node1/conf/config.toml -f "01d3b812-4dd7-4deb-a48d- 4437312a164a,e02b27a6-0057-4673-b7ec-408ad060c952" -i fdc5b7e1-fc87- 4e4b-86ee-b139a7721391 -e "executor1,executor2" TaskID: a7dfac43-fa51-4 191c708b901f,f8439128-bebb-47c2-a04d-1121dbc087a4 ./paddledtx_test.sh start_vl_linear_predict -f cb40b8ad-db08-447f- a9d9-628b69d01660,2a8a45ab-3c5d-482e-b945-bc45b7e28bf9 -m 9b3ff4be- bfcd-4520-a23b-4aa6ea4d59f10 码力 | 53 页 | 1.36 MB | 1 年前3PaddleDTX 1.0.0 中文文档
/testdata/executor/node1/conf/config. �→toml -f "01d3b812-4dd7-4deb-a48d-4437312a164a,e02b27a6-0057-4673-b7ec-408ad060c952"␣ �→-i fdc5b7e1-fc87-4e4b-86ee-b139a7721391 -e "executor1,executor2" TaskID: a7dfac43-fa5 01f, �→f8439128-bebb-47c2-a04d-1121dbc087a4 ./paddledtx_test.sh start_vl_linear_predict -f cb40b8ad-db08-447f-a9d9-628b69d01660, �→2a8a45ab-3c5d-482e-b945-bc45b7e28bf9 -m 9b3ff4be-bfcd-4520-a23b-4aa6ea4d59f10 码力 | 57 页 | 624.94 KB | 1 年前3PaddleDTX 1.1.0 中文文档
/testdata/executor/node1/conf/config. �→toml -f "01d3b812-4dd7-4deb-a48d-4437312a164a,e02b27a6-0057-4673-b7ec-408ad060c952"␣ �→-i fdc5b7e1-fc87-4e4b-86ee-b139a7721391 -e "executor1,executor2" # 命 令 行 返 回 TaskID: 01f, �→f8439128-bebb-47c2-a04d-1121dbc087a4 ./paddledtx_test.sh start_vl_linear_predict -f cb40b8ad-db08-447f-a9d9-628b69d01660, �→2a8a45ab-3c5d-482e-b945-bc45b7e28bf9 -m 9b3ff4be-bfcd-4520-a23b-4aa6ea4d59f10 码力 | 65 页 | 687.09 KB | 1 年前3Hyperledger Fabric 1.2 Documentation
workloads. This bifurcation of roles also limits the processing required for authorization and authentication; all peer nodes do not have to trust all ordering nodes, and vice versa, so processes on one impossible to change. 4.5.5 Authentication, Public keys, and Private Keys Authentication and message integrity are important concepts in secure communications. Authentication requires that parties who exchange to be sure that it hasn’t been tampered with by anyone else during transmission. Traditional authentication mechanisms rely on digital signatures that, as the name suggests, allow a party to digitally0 码力 | 335 页 | 4.48 MB | 1 年前3Hyperledger Fabric 1.3 Documentation
workloads. This bifurcation of roles also limits the processing required for authorization and authentication; all peer nodes do not have to trust all ordering nodes, and vice versa, so processes on one impossible to change. 4.5.5 Authentication, Public keys, and Private Keys Authentication and message integrity are important concepts in secure communications. Authentication requires that parties who exchange to be sure that it hasn’t been tampered with by anyone else during transmission. Traditional authentication mechanisms rely on digital signatures that, as the name suggests, allow a party to digitally0 码力 | 367 页 | 4.95 MB | 1 年前3Hyperledger Fabric 1.2 Documentation
workloads. This bifurcation of roles also limits the processing required for authorization and authentication; all peer nodes do not have to trust all ordering nodes, and vice versa, so processes on one is impossible to change. Authentication, Public keys, and Private Keys Authentication and message integrity are important concepts in secure communications. Authentication requires that parties who exchange to be sure that it hasn’t been tampered with by anyone else during transmission. Traditional authentication mechanisms rely on digital signatures that, as the name suggests, allow a party to digitally0 码力 | 497 页 | 6.59 MB | 1 年前3Hyperledger Fabric 1.3 Documentation
workloads. This bifurcation of roles also limits the processing required for authorization and authentication; all peer nodes do not have to trust all ordering nodes, and vice versa, so processes on one is impossible to change. Authentication, Public keys, and Private Keys Authentication and message integrity are important concepts in secure communications. Authentication requires that parties who exchange to be sure that it hasn’t been tampered with by anyone else during transmission. Traditional authentication mechanisms rely on digital signatures that, as the name suggests, allow a party to digitally0 码力 | 528 页 | 6.85 MB | 1 年前3Hyperledger Fabric 1.4 Documentation
workloads. This bifurcation of roles also limits the processing required for authorization and authentication; all peer nodes do not have to trust all ordering nodes, and vice versa, so processes on one impossible to change. 4.5.5 Authentication, Public keys, and Private Keys Authentication and message integrity are important concepts in secure communications. Authentication requires that parties who exchange to be sure that it hasn’t been tampered with by anyone else during transmission. Traditional authentication mechanisms rely on digital signatures that, as the name suggests, allow a party to digitally0 码力 | 461 页 | 7.37 MB | 1 年前3Hyperledger Fabric 1.1 Documentation
workloads. This bifurcation of roles also limits the processing required for authorization and authentication; all peer nodes do not have to trust all ordering nodes, and vice versa, so processes on one impossible to change. 2.4.5 Authentication, Public keys, and Private Keys Authentication and message integrity are important concepts in secure communications. Authentication requires that parties who exchange to be sure that it hasn’t been tampered with by anyone else during transmission. Traditional authentication mechanisms rely on digital signatures that, as the name suggests, allow a party to digitally0 码力 | 277 页 | 3.21 MB | 1 年前3
共 72 条
- 1
- 2
- 3
- 4
- 5
- 6
- 8