Docker's Remote API can be secured via TLS and client certificate verification.
First of all you need a few certificates and keys:
- CA certificate
- Server certificate
- Server key
- Client certificate
- Client key
# undo: reverts the last command, as long as there is a registered handler | |
# for it. | |
# | |
# Usage: | |
# | |
# $ undo | |
# | |
# There are no options. | |
# | |
# There are by default registered handlers for the following commands: |
def train(X, Y, nn_architecture, epochs, learning_rate): | |
params_values = init_layers(nn_architecture, 2) | |
cost_history = [] | |
accuracy_history = [] | |
for i in range(epochs): | |
Y_hat, cashe = full_forward_propagation(X, params_values, nn_architecture) | |
cost = get_cost_value(Y_hat, Y) | |
cost_history.append(cost) | |
accuracy = get_accuracy_value(Y_hat, Y) |
# Make sure you grab the latest version | |
curl -OL https://github.com/google/protobuf/releases/download/v3.5.1/protoc-3.5.1-linux-x86_64.zip | |
# Unzip | |
unzip protoc-3.5.1-linux-x86_64.zip -d protoc3 | |
# Move protoc to /usr/local/bin/ | |
sudo mv protoc3/bin/* /usr/local/bin/ | |
# Move protoc3/include to /usr/local/include/ |
import os | |
import time | |
import pandas as pd | |
import pyarrow as pa | |
import chdb | |
import subprocess | |
# file size 117MB | |
data_path = '/home/Clickhouse/bench/hits_0.parquet' |
#!/usr/bin/env bash | |
# Names of latest versions of each package | |
export VERSION_PCRE=pcre-8.39 | |
export VERSION_ZLIB=zlib-1.2.8 | |
export VERSION_LIBRESSL=libressl-2.4.2 | |
export VERSION_NGINX=nginx-1.11.3 | |
# URLs to the source directories | |
export SOURCE_LIBRESSL=http://ftp.openbsd.org/pub/OpenBSD/LibreSSL/ |
package main | |
import ( | |
"bufio" | |
"log" | |
"net/rpc" | |
"os" | |
) | |
func main() { |
There is good news for you. I made a new repository with a single Dockerfile to build every combinations of versions of Ubuntu LTS and gcc you like
Find out more on https://github.com/alexandreelise/install-gcc
This article show you the ultimate way to set up a transparent proxy on Linux using clash and iptables to bypass the GFW in China.
We use:
You can go to github gist to download all files mentioned in this article.
+
in the lower right cornerApple ID