Go 101 (Golang 101) v1.21.0Code Packages and Package Imports §11. Expressions, Statements and Simple Statements §12. Basic Control Flows §13. Goroutines, Deferred Function Calls and Panic/Recover Go Type System §14. Go Type programming languages support several kinds of conditional and loop control flows, we can think of them as special operations. The syntax of these control flows is close to human language so that the code written variables (both as 0). 17. var a, b int 18. // A for-loop control flow. 19. for i := 0; i < n; i++ { 20. // An if-else control flow. 21. if rand.Intn(MaxRnd) < MaxRnd/2 { 22. a0 码力 | 610 页 | 945.17 KB | 1 年前3
Go 101 (Golang 101) v1.21.0Code Packages and Package Imports §11. Expressions, Statements and Simple Statements §12. Basic Control Flows §13. Goroutines, Deferred Function Calls and Panic/Recover Go Type System §14. Go Type System languages support several kinds of conditional and loop control flows, we can think of them as special operations. The syntax of these control flows is close to human language so that the code written (both as 0). 17 | var a, b int 18 | // A for-loop control flow. 19 | for i := 0; i < n; i++ { 20 | // An if-else control flow. 21 | if rand.Intn(MaxRnd) < MaxRnd/2 { 22 |0 码力 | 880 页 | 833.34 KB | 1 年前3
Cilium v1.8 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog kernel technology called BPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because BPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? BPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1124 页 | 21.33 MB | 1 年前3
Krita 5.2 Manualaffects the canvas size, and the Move Tool which only moves a given layer. However, if you want more control, Krita offers a Transform Tool. With this tool you can rotate and resize on the canvas, or put it or mask mode, your selected brush preset, Color Space, image size and provides a convenient zoom control. E – Floating Panel/Docker – These can be “popped” in and out of their docks at any time in order the Ctrl key before starting to drag the docker. Sliders Krita uses these to control values like brush size, opacity, flow, Hue, Saturation, etc… Below is an example of a Krita slider. The total range0 码力 | 1502 页 | 79.07 MB | 1 年前3
Hyperledger Fabric 1.4.8 Documentationperformance and confidentiality challenges faced by the order-execute model by separating the transaction flow into three steps: execute a transaction and check its correctness, thereby endorsing it, order transactions private data for prior transactions to which they now are entitled. Client access control to automatically enforce access control within chaincode based on the client organization collection membership without Network — to use with a simple smart contract and application. Transaction Flow A high level look at a sample transaction flow. Hyperledger Fabric Model A high level look at some of components and concepts0 码力 | 699 页 | 9.02 MB | 1 年前3
Hyperledger Fabric 1.4.9 Documentationperformance and confidentiality challenges faced by the order-execute model by separating the transaction flow into three steps: execute a transaction and check its correctness, thereby endorsing it, order transactions private data for prior transactions to which they now are entitled. Client access control to automatically enforce access control within chaincode based on the client organization collection membership without Network — to use with a simple smart contract and application. Transaction Flow A high level look at a sample transaction flow. Hyperledger Fabric Model A high level look at some of components and concepts0 码力 | 701 页 | 9.02 MB | 1 年前3
Hyperledger Fabric 1.4 Documentationperformance and confidentiality challenges faced by the order-execute model by separating the transaction flow into three steps: execute a transaction and check its correctness, thereby endorsing it, order transactions private data for prior transactions to which they now are entitled. Client access control to automatically enforce access control within chaincode based on the client organization collection membership without Network — to use with a simple smart contract and application. Transaction Flow A high level look at a sample transaction flow. Hyperledger Fabric Model A high level look at some of components and concepts0 码力 | 701 页 | 9.02 MB | 1 年前3
Hyperledger Fabric 1.4 Documentation
performance and confidentiality challenges faced by the order-execute model by separating the transaction flow into three steps: execute a transaction and check its correctness, thereby endorsing it, order transactions private data for prior transactions to which they now are entitled. Client access control to automatically enforce access control within chaincode based on the client organization collection membership without Network — to use with a simple smart contract and application. Transaction Flow A high level look at a sample transaction flow. Hyperledger Fabric Model A high level look at some of components and concepts0 码力 | 678 页 | 10.02 MB | 1 年前3
Cilium v1.10 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog technology called eBPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because eBPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? eBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1307 页 | 19.26 MB | 1 年前3
Cilium v1.11 DocumentationKernel Testing JIT Debugging Introspection Tracing pipe Miscellaneous Program Types XDP tc (traffic control) Further Reading Kernel Developer FAQ Projects using BPF XDP Newbies BPF Newsletter Podcasts Blog technology called eBPF, which enables the dynamic insertion of powerful security visibility and control logic within Linux itself. Because eBPF runs inside the Linux kernel, Cilium security policies can have resolved a particular DNS name? Why Cilium & Hubble? eBPF is enabling visibility into and control over systems and applications at a granularity and efficiency that was not possible before. It does0 码力 | 1373 页 | 19.37 MB | 1 年前3
共 613 条
- 1
- 2
- 3
- 4
- 5
- 6
- 62













