Use Rust to speed up Python

Background For a long time, Python has been widely used because of its easy-to-use, GC, and powerful ecosystem. However, gradually people have also discovered its shortcomings. After all, the running speed of interpreted languages is not as fast as compiled languages. Moreover, due to the dynamic data in Python design The idea that all types […]

[Rust GUI]eframe (egui framework) code example

-2, eframe replacement You can use other bindings for egui, such as: egui-miniquad, bevy_egui, egui_sdl2_gl, etc. -1. Attention The egui library is equivalent to the core library and requires the use of the eframe framework to write the interface. eframe is rendered using egui_glow, which requires opengl2.0+. 0. Preparation 1. Install Visual Studio C++ Build […]

[2023.09.13]: Rust Lang, the inevitable ownership issue

The ownership issue of Rust was skipped when I was learning Rust because I knew it would be difficult to understand without scenarios. Unexpectedly, the scene appeared soon. When developing Yew application components, events and closures are involved, which naturally leads to ownership issues. Without further ado, let’s go directly into the code scene to […]

“Raspberry Pi 4B Home Server Construction Guide” Issue 21: Install the open source remote desktop service rustdesk, the internal network is silky smooth, and the external network is smoothly controlled

title: “Raspberry Pi 4B Home Server Construction Guide” Issue 21: Install the open source remote desktop service rustdesk, the internal network is silky smooth, and the external network smoothly controls Windows, macOS, and Linux devices tags: personal growth categories: Raspberry Pi doesn’t eat dust Some time ago, I transformed an old MacBook Pro into a […]

Generate trusted https certificate -use

Configuration to generate CA certificate General diagram: (1), create CA certificate through openssl Step 1:Create a secret key, which is the basis of the CA certificate, and everything after that All come from this secret key # Generate a 2048-bit key through the rsa algorithm openssl genrsa -out myCA.key 2048 The second step: is to […]

Nomad series-Nomad+Traefik+Tailscale integration to achieve zero trust security

Series of articles Nomad series of articles Traefik series of articles Tailscale series of articles Overview Finally, it’s time to get started: Nomad + Traefik + Tailscale integration for zero-trust security. it’s here: Nomad is responsible for container scheduling; (container orchestration tool) Traefik is responsible for ingress traffic; (Ingress tool) Tailscale enables cross-regional connectivity, 4-layer […]

When and How Can We Trust Predictions? Quantifying Unbi

Author: Zen and the Art of Computer Programming 1. Introduction With the rapid development of deep learning technology in recent years, the Transformer model sweeping the NLP field, and the emergence of a large number of annotated data sets and other factors, models based on deep learning are increasingly used in fields such as machine […]

Coroutines in Python and Rust

Coroutine Coroutines run simultaneously on different stacks, but only one coroutine runs at a time while its caller waits: F starts G, but G does not run immediately. F must explicitly restore G, and then G starts running. At any time, G may turn around and yield back to F. This pauses G and resumes […]