Micro Navigation Network - Website Inclusion - Automatically Included URLs, Site-wide Navigation Network
Join for free

heat:

serial number:26734

Classification:Movie video

join in:2025-01-20 16:04:32

Click to enter:2025-05-15 01:51:51

Registration:-

name:-

SEO Update time
2025-05-15T01:51:54

Baidu weight:Baidu weight0
Baidu Mobile:Baidu Mobile0
360 Weight: 360 Weight 0
Sogou weight:Sogou weight0
Code Craftsman

Visit the website

http://exwckv.top

report / Report an error
seo Comprehensive information
SEO information Visit from Baidu IP:- | Mobile visit IP:- | Outbound link: 0 | Site link: 0
IP Internet speed: IP Address: - Address: - | Internet speed: 381 milliseconds
ALEXA Ranking World rankings:- | Estimate IP:- | Estimate PV:-
Registration information - | name:- | Created: Unknown
Included Baidu 360 Sogou Google
Query 0 0 0 0
Computer keywords Mobile phone keywords Page friendly Home page location index Recent collection
0 0 Excellent computer - 0 0
Server information Protocol Type - Page Type - Server Type - Program support - Connection ID - Message sending - GZIP Test - Source file size - Compressed size - Compression rate -
Website snapshot

Code Craftsman Code Craftsman shares best practices, design patterns and programming skills to help developers grow H o m e A r c h i v e s  2 0 2 5 0 1 3 1 rear end ► Database database table building specification reference Alibaba J a v a Development Manual: Local download naming specification basic rules: Disable reserved words: d e s c 、 r a n g e 、 m a t c h 、 d e l a y e d etc. Please refer to M y S Q L Official reserved words. Positive example: Expressing logically deleted field names i s _ d e l e t e d , 1 Indicates deletion, 0 means not deleted. Use lowercase letters or numbers: The beginning of a number is prohibited, and only numbers are prohibited between two underscores. A positive example: a l i y u n _ a d m i n , r d c _ c o n f i g , l e v e l 3 _ n a m e Counterexample: A l i y u n A d m i n , r d c C o n f i g , l e v e l _ 3 _ n a m e Yes or not: , Must be used i s _ x x x The data type is u n s i g n e d t i n y i n t ( 1 means yes, 0 means no). The table name does not use plural numbers: The table name should only represent the entity content in the table, and should not represent the number of entities, corresponding to D O Class names are also singular, which conform to expression habits. Naming specification: It is best to name a table with "business name" _ The role of the table”. A positive example: a l i p a y _ t a s k / f o r c e _ p r o j e c t / t r a d e _ c o n f i g Field name index: The primary key index name is p k _ field name;The unique index name is u k _ field name;The normal index name is i d x _ Field name. illustrate: p k _ Right now p r i m a r y k e y ; u k _ Right now u n i q u e k e y ; i d x _ Right now i n d e x abbreviation of . Required fields for table specifications: Required three fields for tables: i d , g m t _ c r e a t e , g m t _ m o d i f i e d 。 Description: Among them i d Must be the primary key, type u n s i g n e d b i g i n t 、 In a single table, the step size is 1. g m t _ c r e a t e , g m t _ m o d i f i e d All types are d a t e _ t i m e Type, the former present means active creation, and the latter past participle means passive update. Share 2 0 2 5 0 1 3 1 Network and Security O w a s p Reference Share2 0 2 5 0 1 3 1 Network and Security ► W A F W A F M o d S e c u r i t y refer to M o d S e c u r i t y G i t H u b M o d S e c u r i t y Chinese Community Sharing2 0 2 5 0 1 3 1 Network and Security ► W A F W A F Changting Lei Pool Reference Thunder Pool S a f e L i n e G i t H u b S a f e L i n e Manually install the official document environment dependency 1 core C P U / 1 G B Memory / 5 G B disk L i n u x system D o c k e r 2 0 . 1 0 . 1 4 Version or above D o c k e r C o m p o s e 2 . 0 . 0 Manual installation of thunder pool installation above version D o c k e r Download the Thunder Pool Mirror. Local download creates a custom thunder pool installation directory, such as: m k d i r p / d a t a / s a f e l i n e , And enter the current directory. download d o c k e r c o m p o s e Orchestrate scripts. w g e t h t t p s : / / w a f c e . c h a i t i n . c n / r e l e a s e / l a t e s t / c o m p o s e . y a m l Create in the installation directory. e n v file and write the following content. 1 2 3 4 5 6 7 8 9 S A F E L I N E _ D I R = / d a t a / s a f e l i n e I M A G E _ T A G = l a t e s t M G T _ P O R T = 9 4 4 3 P O S T G R E S _ P A S S W O R D = y o u r p a s s w o r d S U B N E T _ P R E F I X = 1 7 2 . 2 2 . 2 2 2 I M A G E _ P R E F I X = s w r . c n e a s t 3 . m y h u a w e i c l o u d . c o m / c h a i t i n s a f e l i n e A R C H _ S U F F I X = R E L E A S E = R E G I O N = S A F E L I N E _ D I R : Thunder pool installation directory, default / d a t a / s a f e l i n e 。 I M A G E _ T A G : Thunder pool mirror version, default to l a t e s t 。 M G T _ P O R T : The default is 9 4 4 3. P O S T G R E S _ P A S S W O R D : The initialization password for the database required by the thunder pool is required. Please generate a random one. S U B N E T _ P R E F I X : The network segment of the internal network of the Leichi Pool, just keep the default 1 7 2 . 2 2 . 2 2 2 I M A G E _ P R E F I X : Prefix of the thunder pool mirror source, it is recommended to select the appropriate source according to the server geographical location. A R C H _ S U F F I X : The suffix of the thunder pool architecture, A R M The server needs to be configured as a r m R E L E A S E : Update channel, L T S The version needs to be configured as l t s implement d o c k e r c o m p o s e u p d Share 2 0 2 5 0 1 3 1 Network and Security ► Password Manager Password Manager V a u l t w a r d e n refer to V a u l t w a r d e n W i k i Chinese version V a u l t w a r d e n Installation and installation d o c k e r download v a u l t w a r d e n / s e r v e r Mirror: Use locally D o c k e r C o m p o s e deploy v a u l t w a r d e n , 1 2 3 4 5 6 7 8 9 1 0 1 1 1 2 1 3 v a u l t w a r d e n : i m a g e : v a u l t w a r d e n / s e r v e r : 1 . 3 2 . 7 c o n t a i n e r _ n a m e : v a u l t w a r d e n v a u l t w a r d e n n e t w o r k s : v w n e t w o r k p o r t s : 8 0 : 8 0 v o l u m e s : / r o o t / v a u l t w a r d e n / d a t a : / d a t a # Mount the local directory into the container / d a t a Directory, used to persist data e n v i r o n m e n t : W E B S O C K E T _ E N A B L E D = f a l s e # Optional: Enable W e b S o c k e t support S I G N U P S _ A L L O W E D = t r u e # Optional: Disable registration (if you only want to use it yourself or control user registration) # More environment variables can be added according to your needs, such as setting an administrator token, etc. to access h t t p : / / l o c a l h o s t : 8 0 Ready to use v a u l t w a r d e n 。 use N g i n x Reverse proxy implementation H T T P S ( Optional ) use D o c k e r C o m p o s e deploy v a u l t w a r d e n and n g i n x 1 2 3 4 5 6 7 8 9 1 0 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9 2 0 2 1 2 2 2 3 2 4 2 5 2 6 2 7 2 8 2 9 3 0 3 1 v e r s i o n : 3 s e r v i c e s : # The name of the service v a u l t w a r d e n : i m a g e : v a u l t w a r d e n / s e r v e r : 1 . 3 2 . 7 c o n t a i n e r _ n a m e : v a u l t w a r d e n v a u l t w a r d e n # r e s t a r t : a l w a y s n e t w o r k s : v w n e t w o r k v o l u m e s : / r o o t / v a u l t w a r d e n / d a t a : / d a t a # Mount the local directory into the container / d a t a Directory, used to persist data e n v i r o n m e n t : W E B S O C K E T _ E N A B L E D = f a l s e # Optional: Enable W e b S o c k e t support S I G N U P S _ A L L O W E D = t r u e # Optional: Registration is prohibited (if you only want to use it yourself or control user registration) # More environment variables can be added according to your needs, such as setting an administrator token, etc. n g i n x : i m a g e : n g i n x : 1 . 2 7 . 3 c o n t a i n e r _ n a m e : v a u l t w a r d e n n g i n x n e t w o r k s : v w n e t w o r k p o r t s : 8 0 8 5 : 4 4 3 v o l u m e s : / r o o t / v a u l t w a r d e n / n g i n x / c o n f . d / d e f a u l t . c o n f : / e t c / n g i n x / c o n f . d / d e f a u l t . c o n f : r o / e t c / l e t s e n c r y p t / l i v e / e x w c k v . t o p / f u l l c h a i n . p e m : / e t c / n g i n x / c e r t s / f u l l c h a i n . p e m : r o / e t c / l e t s e n c r y p t / l i v e / e x w c k v . t o p / p r i v k e y . p e m : / e t c / n g i n x / c e r t s / p r i v k e y . p e m : r o n e t w o r k s : v w n e t w o r k : d r i v e r : b r i d g e Configuration n g i n x of d e f a u l t . c o n f document. 1 2 3 4 5 6 7 8 9 1 0 1 1 1 2 1 3 1 4 1 5 1 6 1 7 1 8 1 9 2 0 2 1 2 2 2 3 2 4 2 5 2 6 # / e t c / n g i n x / c o n f . d / d e f a u l t . c o n f s e r v e r s e r v e r } Share 2 0 2 5 0 1 3 1 Backend ► database m y s q l Permission Management Reference m y s q l Read all the article on user permission management M y S Q L User permission management, it's so good! m y s q l The data level global: acting on the entire m y s q l The server is the one you installed m y s q l All services are valid. Database: It acts on a database, for example t e s t database. Database object: an object in a database, such as a table, a view, a stored procedure, etc. Detailed permission analysis S E L E C T : Query data, s e l e c t Permission is executing u p d a t e / d e l e t e The statement contains w h e r e It is also necessary under conditions. I N S E R T : Insert data, execute i n s e r t Need when stating. U P D A T E : Update data, execute u p d a t e Need when stating. D E L E T E : Delete data, execute d e l e t e Need when stating. Represents permission to allow deletion of row data. D R O P : Permissions to delete databases, tables, and views, including t r u n c a t e t a b l e Order. C R E A T E : Permissions to allow creation of new databases and tables. A L T E R : It represents permission to modify the table structure, but it must be required c r e a t e and i n s e r t Permission cooperation. in the case of r e n a m e Table name, a l t e r and d r o p Original table, c r e a t e and i n s e r t Permissions to new tables G r a n t o p t i o n : Allow users to authorize them to other users. This permission is required when repaying to the administrator. Share 2 0 2 5 0 1 3 1 Backend ► Database related concept reference m y s q l Understand a tutorial an animation M y S Q L Index principle! Database-related concept primary key: A row of data uniquely identifies the table, cannot be empty, and cannot be repeated. Make sure that each row of data is unique. Index: is a data structure used to speed up database queries and performance. Adding an index is to add a directory to the field for easy reference. Indexing can speed up the query of fields. The index takes up extra space. The index will increase the time for data insertion, update, and delete operations. Stored procedures: is a group S Q L A collection of statements is used to implement some complex functions, such as addition, deletion, modification and search, or some business logic. Fast performance. Stored procedures can improve security. Debugging is difficult. Poor transplantability. Version management control troubles. Share 2 0 2 5 0 1 3 1 Backend ► Basic concepts of operation and maintenance rights management system User: Sometimes it is also called an account, which represents the user of this system, that is, the actual personnel. Permissions: It means whether you have the right to do this, such as viewing the revenue of the software and uploading the code. Role: A collection of permissions. Generally, an employee needs several permissions for work, but they are all programmers or finances. Then the same type of person needs the same permissions. Collect these permissions to be the role. User group: A collection of users, when there are fewer employees, but when there are many employees, they need it. For example, if there are 10 employees and they need to do the same thing, then build a group and put all these 10 employees in this group. In this way, you don’t have to care about these 10 employees anymore, just give group permissions directly. Share 2 0 2 5 0 1 3 1 Backend ► D o c k e r Install D o c k e r refer to L i n u x Basic Tutorial L i n u x Detailed commands search Alibaba Cloud E C S document w i n 1 0 system D o c k e r hint D o c k e r E n g i n e s t o p p e d Solve the whole process record L i n u x Install D o c k e r Commonly used commands a p t g e t u p d a t e Update package index with Alibaba Cloud E C S D e b i a n 1 2 . 8 6 4 As an example Alibaba Cloud E C S D o c k e r Installation documentation a p t g e t u p d a t e Update package index a p t g e t i n s t a l l a p t t r a n s p o r t h t t p s c a c e r t i f i c a t e s c u r l s o f t w a r e p r o p e r t i e s c o m m o n Install the necessary dependencies to add Alibaba Cloud source to your instance, this source contains D o c k e r Package, which facilitates you to install and update using commands D o c k e r 。 ( Choose one of two ) If your instance network can access the public network. a p t g e t y i n s t a l l a p t t r a n s p o r t h t t p s c a c e r t i f i c a t e s c u r l s o f t w a r e p r o p e r t i e s c o m m o n 1 2 3 s u d o c u r l f s S L h t t p s : / / m i r r o r s . a l i y u n . c o m / d o c k e r c e / l i n u x / d e b i a n / g p g | s u d o a p t k e y a d d s u d o a d d a p t r e p o s i t o r y y d e b [ a r c h = $ ( d p k g p r i n t a r c h i t e c t u r e ) ] h t t p s : / / m i r r o r s . a l i y u n . c o m / d o c k e r c e / l i n u x / d e b i a n $ ( l s b _ r e l e a s e c s ) s t a b l e s u d o a p t g e t u p d a t e use V P C Network access address. 1 2 3 4 s u d o a p t g e t y i n s t a l l a p t t r a n s p o r t h t t p s c a c e r t i f i c a t e s c u r l s o f t w a r e p r o p e r t i e s c o m m o n s u d o c u r l f s S L h t t p : / / m i r r o r s . c l o u d . a l i y u n c s . c o m / d o c k e r c e / l i n u x / d e b i a n / g p g | s u d o a p t k e y a d d s u d o a d d a p t r e p o s i t o r y y d e b [ a r c h = $ ( d p k g p r i n t a r c h i t e c t u r e ) ] h t t p : / / m i r r o r s . c l o u d . a l i y u n c s . c o m / d o c k e r c e / l i n u x / d e b i a n $ ( l s b _ r e l e a s e c s ) s t a b l e s u d o a p t g e t u p d a t e s u d o a p t g e t y i n s t a l l d o c k e r c e d o c k e r c e c l i c o n t a i n e r d . i o d o c k e r b u i l d x p l u g i n d o c k e r c o m p o s e p l u g i n Install D o c k e r Community version, container runtime c o n t a i n e r d . i o , as well as D o c k e r Build and C o m p o s e Plugin. s u d o s y s t e m c t l s t a r t d o c k e r s u d o s y s t e m c t l e n a b l e d o c k e r set up D o c k e r Automatic start d o c k e r v Check D o c k e r Is it installed normally? D o c k e r C o m p o s e d o c k e r c o m p o s e v e r s i o n Check if it has been installed. Click the above to install it. W i n d o w s Install D o c k e r D o c k e r E n g i n e s t o p p e d Question Check whether the service is on W i n d o w s + R enter s e r v i c e s . m s c Find D o c k e r D e s k t o p S e r v i c e Service, if the status is stopped, the service needs to be restarted. examine C P U Is virtualization enabled normally? C t r l + S h i f t + E s c Open Task Manager to view C P U Whether the virtualization is enabled normally. examine H y p e r V Is it normal? Turn on or turn off W i n d o w s Function. turn up H y p e r V , Check all normally D o c k e r Configure mirror repository search D o c k e r Configuration file. D e b i a n : / e t c / d o c k e r / d a e m o n . j s o n , If no, create a file. W i n d o w s : Setting it directly D o c k e r E n g i n e Modify and add configuration information. 1 2 3 Restart D o c k e r service to enable the configuration. D e b i a n : s u d o s y s t e m c t l d a e m o n r e l o a d : Reload the configuration file. s u d o s y s t e m c t l r e s t a r t d o c k e r : Restart d o c k e r Serve. Share 2 0 2 5 0 1 3 1 Network and Security ► D D O S D D O S What is the reference cyber bully only D D o S Bullying a small website?I'll let the high defense server teach you how to be a human being! D D O S What is it? To put it simply, D D O S It means that hackers operate multiple computers and constantly send requests to your server, making your server unable to handle it, resulting in your server crashing. Share 1 2 3 … 5 Next page » Classification A n d r o i d W i n d o w s T a b b y Front-end front-end framework H e x o rear end D o c k e r S p r i n g B o o t Database server software N g i n x V i m Operation and maintenance development tools I D E I D E A Game development C o c o s C r e a t e J S B Network and Security D D O S S S L W A F Security Group Password Manager Algorithm R S A Network mode software installation development environment software design and development specification design mode label G i t J a v a M a v e n Tag Cloud G i t J a v a M a v e n Archive January 2 0 2 5 December 2 0 2 4 Latest articles Database table building specifications O w a s p W A F M o d S e c u r i t y W A F Changting Leichi Password Manager V a u l t w a r d e n © 2 0 2 5 Qingfeng P o w e r e d b y H e x o Zhejiang I C P Preparation 2 0 2 5 1 4 7 4 5 9 1 H o m e A r c h i v e s

Site summary

about exwckv.top illustrate:
exwckv.top Activist submission by netizens was compiled and included by Micro Navigation Network. Micro Navigation Network only provides exwckv.top The basic information of the public is free to show to the public. exwckv.top What is IP Address: - Address: -, exwckv.top Baidu weight is 0, Baidu mobile weight is 0, Baidu included 0, Baidu included 0, 360 included 0, Sogou included 0, Google included 0, Baidu visit traffic is about - between, Baidu mobile visit traffic is about - between, exwckv.top The registration number is -, the filing person is -, there are 0 keywords included by Baidu, 0 keywords on the mobile phone, and the site has been created so far unknown.

Content statement:

1、 The content included in this site is from big data collection and the copyright belongs to the original website!
2、 If the contents included on this site infringe upon your interests, please contact us to delete them!
3、 This site does not accept violation information. If you find any violation content, please contact us to clear it!
4、 Address of this article: https://www.wl200.cn/links/8dfa5884ad35e1633b00.html, Please keep the copyright link for copying!


Warm tip: Make a friendly link to this website on your website, and you can automatically include it once and automatically rank first in this website!
You may also like

Shenyang Beauty School _ Shenyang Hairdressing School _ Shenyang Makeup School-Shenyang Baobang Beauty and Hairdressing School

Shenyang Baokang Beauty and Hairdressing School was founded in 2019. It is a comprehensive modern vocational skills training school integrating beauty, hairdressing, makeup, manicure and semi-permanent beauty. The school takes teaching quality as the foundation, takes cultivating outstanding beauty talents as its responsibility, and serving the society and giving back to the society. Over the past 30 years, it has cultivated hundreds of thousands of outstanding students, spread all over the country, and has become an elite in the industry. Shenyang Baokang Beauty and Hairdressing School is famous at home and abroad.

NetChuang Agent - a high-quality and comprehensive Internet entrepreneurship project sharing platform and money-making side job recommendation

The entrepreneurial platform that focuses on sharing entrepreneurial projects and recommends money-making side jobs. It aims to help people with entrepreneurial ideas find suitable projects. The platform is committed to providing high-quality Internet entrepreneurship projects and providing comprehensive practical tutorials. You can learn about comprehensive and high-quality entrepreneurial projects, master entrepreneurial experience, and find various money-making side jobs. We are your knowledge platform for you to obtain entrepreneurial projects and learn entrepreneurial experience.Online Creation Agent, let you become an agent for starting a business!

Civil Servant Examination Materials Network - Make valuable civil Servant Examination Review Materials Network

Civil Servant Examination Information Network ( www.gwyzk.com) It is committed to creating the best civil service examination review materials website. It is created by a dedicated data compilation team to provide civil servant candidates with the latest and most authoritative civil service review materials. The Civil Service Examination Material Network helps you pass the civil service examination in one go.

German Itemap

Yitep is the largest company in Europe that specializes in scientific and technological development and research and development of HVAC products. The perfect combination of independence to system products can make the system truly energy-saving, comfortable and healthy.Comfort, energy saving, environmental protection, safety and durability are the life goals of each of us. Yitep will accompany you to achieve your life goals. While improving the quality of life, it can better create value for China's energy conservation and environmental protection.

China Coal Mine Network-Coal Mine Equipment | Coal mine equipment | Coal mine materials | Smart Mines |AI mine |5G Coal mine

China Coal Mine Network ( https://www.cmem.cn) It is a comprehensive portal for information release and transactions of China's mining-related enterprises, mainly providing mining equipment, coal mine equipment, coal mine consumables, coal mine materials, explosion-proof electrical appliances, coal mine safety information exchange platform (large coal miners, hydraulic support, comprehensive excavators, scraper transporters and other large coal mine equipment).

Xingmei Rubber Network - Professional rubber product company introduction solution release platform

Starmei Rubber Network (www.xm1000.com) It brings together many rubber suppliers, covering rubber products such as rubber, natural rubber, silicone rubber board, etc.; it provides you with professional rubber products and enterprise profile solution release platform.

Jinxiang Life: A website that issues coupons

Jinxiang Life - the first stop of coupon discount live broadcast on Tmall, Taobao, and JD!Thousands of products are updated every day, pure manual screening and inspection, limited time and limited quantity sale, 10% off for the whole venue!

Automobile Alliance-share the latest popular car review network

Automobile Alliance is committed to building the first domestic passenger car alliance website, which includes information on car models of all levels: SUV, Micro cars, small cars, compact cars, medium cars, large cars, luxury cars, sports cars, second-hand cars are all on China Automobile Network.

Random articles
Cross-border e-commerce brand overseas Internet information platform

Cross-border e-commerce brand overseas Internet information platform

Youming.com is a cross-border e-commerce brand overseas Internet information platform, focusing on providing users with Internet information and cross-border e-commerce knowledge and other practical information.We integrate high-quality service resources in the industry, such as independent site construction and mini program development, and are committed to individuals and enterprises understanding the development of the Internet.Read the information and go to Youming.

Latest news 2024-12-20 15:44:38

The way to get rich by using crochet and hand-woven clay to monetize the ropes and plastic clay to make money by making money by using crochet and hand-woven

The way to get rich by using crochet and hand-woven clay to monetize the ropes and plastic clay to make money by making money by using crochet and hand-woven

How to make money, young people want to find a field that they are good at and have low cost to do side jobs. Doing handicrafts may be a track with low threshold and relatively easy to cash out. There are a wide range of types of handicrafts and various styles. Whether it is high-end, atmospheric and high-end intangible cultural heritage such as paper cutting and velvet flowers, or two-dimensional fashion items such as scattered and cream glue, or elegant ancient jewelry such as tangled flowers and rope weaving, they can be classified into this category. In a broad sense, all manual items can be classified into handicrafts, small...

Latest news 2024-12-25 23:08:32

Taobao announced the top ten products in 2024, black myth, Wukong concept products, etc.

Taobao announced the top ten products in 2024, black myth, Wukong concept products, etc.

Webmaster's Home, ChinaZ.com,12 On the 23rd of the month, the list was announced today. This list reflects the interests of consumers in the past year, including the Ugly Fish Slippers that were popular with Quan Hongchan during the Olympics, the first domestic low-orbit travel space ticket pre-sale on the Double 11 Taobao live broadcast room, the first-class energy-efficient air conditioner promoted by government subsidies, as well as the phenomenon-level domestic game masterpieces, Black Myth, Wukong, related concept products, Black Myth, Wukong, as China 3 A Game masterpiece, the global game of the year...

E-commerce knowledge 2024-12-26 19:53:20

Book 2025  Officially announced 19.05 hours long battery life of 16, the new Core processor Redmi  REDMI

Book 2025 Officially announced 19.05 hours long battery life of 16, the new Core processor Redmi REDMI

Fast Technology News December 26, Redmi REDMIBook The notebook was officially announced today, and will be available for the beginning of the year. Turbo4 New product launch conference, it is reported that REDMIBook162025 The first batch of equipped with brand new Intel Core processors, supports long battery life, has 19.05 hours, and is suitable for Xiaomi Pengpai OS2, Support Xiaomi Pengpai Zhilian as a reference. RedmiBook162024 Equipped with a piece of 2.5 K120Hz Refresh rate screen, support sRGB、40...。

E-commerce knowledge 2024-12-26 19:54:25

Ascend  AI  Platform training reasoning!China Unicom Yuanjingwen Shengmao model open source truly understands Chinese

Ascend AI Platform training reasoning!China Unicom Yuanjingwen Shengmao model open source truly understands Chinese

Announced that China Unicom Data Intelligence Company has created the first Chinese native China Unicom Yuanjingwen biographical model that realizes training and inference completely on domestic software and hardware platforms. It is officially open source. This model has achieved many independent innovation breakthroughs, first in architecture, through SDXL The fusion of composite language encoding module in the architecture realizes the precise semantic understanding of long Chinese text, multi-attribute correspondence and Chinese characteristic vocabulary, and the generation effect of corresponding images has been greatly improved, followed by Ascend AI On a large-scale computing power cluster, Chinese...

Latest news 2024-12-26 21:01:29

The solemn statement of Zhonglan Electronics is seriously inconsistent with the facts

The solemn statement of Zhonglan Electronics is seriously inconsistent with the facts

According to the news from Kuai Technology on December 26, the official released a solemn statement today, which mentioned that Taiwan Economic Daily published a news report titled "The Taiwan factory is welcome to transfer orders", which contains a large amount of false information about the operation of Liaoning Zhonglan Electronic Technology Co., Ltd. After being reprinted by many online platforms, this article has had a serious impact on the company's development layout and brand image. At present, relevant departments have been requested to intervene in the investigation and handling, and will investigate the online platforms and individuals who write, publish and reproduce related false reports in accordance with the law...

Latest news 2024-12-26 21:01:45

Chasing BYD!Toyota proposes to increase yield to 20%

Chasing BYD!Toyota proposes to increase yield to 20%

According to media reports, the company proposed to turn it into the company. ROE, The target of 20% is twice the current level, far higher than the average level of listed companies in Japan, 9% in 2023, and the top level among large car companies around the world. Toyota plans to innovate its business model by providing after-sales surcharge services and other methods, actively give back to shareholders, and pay attention to capital efficiency, although Toyota did not disclose that it has achieved 20%. ROE The specific time of the market is expected to be in its fiscal year 2024 ROE 11%...

Latest news 2024-12-26 21:02:00

Find X8  Codenamed Mount Everest!  OPPO Ultra  The image dust settles

Find X8 Codenamed Mount Everest! OPPO Ultra The image dust settles

It's different from the ordinary RGB The latter can only capture images in the visible band, while a multispectral camera can capture a larger spectral range, including visible, infrared and ultraviolet bands, which allows a multispectral camera to provide more than normal RGB The camera has more information,...

Latest news 2024-12-26 21:02:52