2.2.1 深入Go Module
深入Go Module 鸟窝 细节、使用、坑以及未来 鸟窝 • Go微服务框架rpcx作者 • Go并发编程实战课专栏作者 • 《Scala集合技术手册》作者 目 录 Go 版本管理历史 01 认识 Go Module 02 使用 Go Module 03 血泪史 04 Go Module 未来特性 05 Go版本管理历史 第一部分 Go版本历史 GOPATH /2012/go mod /2018/ go1.11,go1.12~go1.17 Go module历代变更 Go1.12 • GO111MODULE • 正式推出 • 影响go命令 Go1.13 • GO111MODULE未 如预期去掉 • GOPROXY • 影响go命令 Go 1.14 • go命令全面支持 module,可以产 品使用 • 支持- mod=vendor • GOINSECURE GO111MODULE默 认为on • 又是一堆go命令 不兼容 • retract • -e • 禁止特殊import path Go 1.17 • Lazy module loading • // Deprecated: comment • 不包含go directive,默认 为go 1.11 • 又是一堆go命令 不兼容 认识 Go Module 第二部分0 码力 | 46 页 | 3.85 MB | 1 年前3Go Module在又拍云的实践
0 码力 | 28 页 | 12.85 MB | 1 年前3Rancher Kubernetes Cryptographic Library FIPS 140-2 Non-Proprietary Security Policy
reproduced and distributed in its entirety without modification. Rancher Kubernetes Cryptographic Library FIPS 140-2 Non-Proprietary Security Policy Document Version 1.1 January Policy Rancher Kubernetes Cryptographic Library Page 2 of 16 References Ref Full Specification Name Date [140] FIPS 140-2, Security Requirements for Cryptographic Modules 12/3/2002 [140AA] Derived Test Requirements 1/4/2011 [140IG] Implementation Guidance for FIPS 140-2 and the Cryptographic Module Validation Program 8/28/2020 [SP 800-38A] NIST SP 800-38A, Recommendation for Block0 码力 | 16 页 | 551.69 KB | 1 年前3深度学习与PyTorch入门实战 - 43. nn.Module
nn.Module 主讲人:龙良曲 Magic ▪ Every Layer is nn.Module ▪ nn.Linear ▪ nn.BatchNorm2d ▪ nn.Conv2d ▪ nn.Module nested in nn.Module 1. embed current layers ▪ Linear ▪ ReLU ▪ Sigmoid ▪ Conv2d ▪ ConvTransposed2d0 码力 | 16 页 | 1.14 MB | 1 年前3Hyperledger Fabric 1.1 Documentation
com/package/windows-build- tools] for more details. Once this is done, you should also install the NPM GRPC module with the following command: npm install --global grpc Your environment should now be ready to go decentralized and collaborative, the information recorded to a blockchain is append-only, using cryptographic techniques that guarantee that once a transaction has been added to the ledger it cannot be modified Bitcoin, ordering happens through a process called mining where competing computers race to solve a cryptographic puzzle which defines the order that all processes subsequently build upon. Hyperledger Fabric0 码力 | 422 页 | 4.84 MB | 1 年前3Hyperledger Fabric 1.2 Documentation
execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 497 页 | 6.59 MB | 1 年前3openEuler OS Technical Whitepaper Innovation Projects (June, 2023)
protocol is a driver module running in the openEuler OS kernel, consisting of the mounting parameter management module at the NFS protocol layer and the multipathing management module at the transport layer deployment and tuning Deployment and tuning documents in scripts Mass dependency installation scripts Module file auto-generation Mass tuning patches One-click performance profiling Cross-platform performance directory structure in the industry to manage massive dependencies and automatically generates module files. • HPCRunner implements one-click compilation and operation, CPU/GPU performance profiling0 码力 | 116 页 | 3.16 MB | 1 年前3Hyperledger Fabric 1.3 Documentation
execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of pluggable membership service provider is responsible for associating entities in the network with cryptographic identities. An optional peer-to-peer gossip service disseminates the blocks output by ordering0 码力 | 528 页 | 6.85 MB | 1 年前3Hyperledger Fabric 1.2 Documentation
execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of windows-build-tools page for more details. Once this is done, you should also install the NPM GRPC module with the following command: 3.1. Prerequisites 13 hyperledger-fabricdocs Documentation, Release0 码力 | 335 页 | 4.48 MB | 1 年前3Hyperledger Fabric 1.3 Documentation
execution. Avoidance of a cryptocurrency reduces some significant risk/attack vectors, and absence of cryptographic mining operations means that the platform can be deployed with roughly the same operational cost pluggable identity management protocols such as LDAP or OpenID Connect, key management protocols or cryptographic libraries, the platform has been designed at its core to be configured to meet the diversity of decentralized and collaborative, the information recorded to a blockchain is append-only, using cryptographic techniques that guarantee that once a transaction has been added to the ledger it cannot be modified0 码力 | 367 页 | 4.95 MB | 1 年前3
共 1000 条
- 1
- 2
- 3
- 4
- 5
- 6
- 100