DevOps: Deploying Java on Linux

Environment Requirements Four Ways to Deploy Java Services on Linux (Including Environment Dependencies and Start/Stop Instructions) This article provides four methods for deploying Java services, compatible with JDK 21, detailing the environment dependencies, start, stop, and restart operations for each method. The JAR file provided in this example has been automatically placed in the /root/resume/ … Read more

Linux Philosophy: Everything is a File

🌟 Linux Philosophy: Everything is a File In Linux and Unix operating systems, “Everything is a File” is a core design principle. It means that almost everything in the system is abstracted as a file, including regular files, directories, hardware devices, process information, network interfaces, and more. 📂 1. What is “Everything is a File”? … Read more

Installing JDK 8 on CentOS Linux

Preparation Server: CentOS Linux release 7.9.2009 (Core) JDK: jdk-8u301-linux-x64.tar.gz JDK 8 download link:https://www.oracle.com/java/technologies/downloads/#java8 Installation Connect to the server using Xshell. Upload to the server, you can use the command # rz upload, -y to overwrite files rz -y If prompted that the command ‘rz’ is not found, install it manually # rz is a file … Read more

Linux Power Management (2): Basic Concepts and Software Architecture of Conventional Power Management

Original: https://mp.weixin.qq.com/s/HJihdfu9zVYEuvHVV0WXwQ 1. Introduction Conventional power management methods in Linux systems include shutdown (Power off), standby (Standby or Hibernate), and reboot (Reboot). These methods were used during the era of PCs or servers before the widespread adoption of embedded Linux. In that primitive era of computer science, driven by Moore’s Law, humanity was focused on … Read more

From Assembly to Kernel Hacking: The Underlying Art of Linux System Calls

1. Overview of System Calls A system call is a set of interfaces provided by the operating system kernel to user-space programs, allowing user programs to request services from the kernel. It is a controlled communication mechanism between user space and kernel space. Why Do We Need System Calls? Permission Isolation: User programs run in … Read more

Zephyr Enthusiasts Monthly Issue 4 – 202504

This issue records the latest news and shareable content about Zephyr, published in the last week of each month. This magazine is open source (GitHub: lgl88911/Zephyr_Fans_Monthly[1]), and contributions, issue submissions, or recommendations for Zephyr content are welcome. Project Data Excluding merges, 367 authors pushed 1,770 commits to the main branch and 1,884 commits to all … Read more

How ZigBee Weaves the Internet of Things with Electromagnetic Waves

Thousands of sensors are performing a mysterious “electromagnetic ballet”—they are not ordinary components, but “industrial worker bees” equipped with ZigBee technology. This wireless protocol, inspired by the communication of bee colonies, is reconstructing the neural network of the industrial Internet of Things with low-power “swarm intelligence,” enabling cold machines to learn “wireless collaboration” and even … Read more

Comparison of Zigbee and Z-Wave Smart Home Protocols

What are Zigbee and Z-Wave? How do they differ? To ensure seamless collaboration among smart home devices, the smart home hub relies on wireless communication protocols—of which the two most mainstream standards are Zigbee and Z-Wave. These two standards began empowering smart living long before the concept of “smart home” became popular. Although both utilize … Read more

Case Study on the Rectification of Head-mounted Bluetooth Electrostatic Issues

Click the blue text to follow us Introduction There are various types of wireless Bluetooth headsets on the market, which offer excellent sound quality and convenient control features. Wireless Bluetooth headsets not only free our hands but also allow us to enjoy calls and music more freely. The sales of wired headsets are gradually declining, … Read more