django advanced more: https://docs.djangoproject.com/en/3.0/

Model ORM (relationship object mapping) 1. field AutoField(Field) # int Auto increment column, parameter must be filled primary_key=True BigAutoField(AutoField) # bigint Auto increment column, parameter must be filled primary_key=True //If there is no auto increment column in the model, a column named id will b ...

Posted by Dakkar on Tue, 03 Mar 2020 08:46:59 +0100

docker builds nextcloud private cloud disk

Knowledge background Nextcloud is a branch of ownCloud, which was created after Frank caliche, the original developer of ownCloud, left. NextCloud is an open source network hard disk system. Anyone can get the NextCloud program freely, and build a private and free network hard disk in the home or ...

Posted by cardio5643 on Tue, 03 Mar 2020 08:27:27 +0100

Redis as a single machine cache usage recommendation

  Preface Prepare to introduce redis as a single machine cache in the project because the cache middleware used in the original project cannot be used in the native Kirin operating system.        Configuration optimization recommendations Configure the redis service to start the daemon Redis does not run as a daemon by default, it can run in th ...

Posted by MK27 on Tue, 03 Mar 2020 02:44:07 +0100

linux entry series 16 -- Samba and NFS of file sharing

The previous article "linux introduction series 15 - vsftp services for file transfer" explained file transfer, and this article continues to explain the knowledge of file sharing. File sharing is very common in life and work. For example, different members of the same team need to maintain th ...

Posted by Ammar on Mon, 02 Mar 2020 05:31:31 +0100

Thousands of duplicate submissions in an instant, and I'm holding them with SpringBoot+Redis

In actual development projects, an exposed interface often faces a large number of requests submitted in an instant. If you want to filter out duplicate requests and cause harm to your business, you need to achieve power! Let's explain the concept of idempotency: Any multiple executions will have the same impact as a single execution.In ...

Posted by Sheen on Sat, 29 Feb 2020 05:01:13 +0100

Technology sharing calculation method of MySQL field length limit

Author: kay is good at Oracle, mysql, PostgresSQL and other database fields. He is good at Oracle, MySQL performance optimization, database architecture design, database fault repair, data migration and recovery. He is keen on studying MySQL database kernel source code and sharing technical articles. He has Oracle OCP certification and works i ...

Posted by foo on Thu, 27 Feb 2020 11:04:37 +0100

Architect's internal mental skill, detailed explanation of the template model of workflow standardization in the workplace

Template pattern, also known as Template Method Pattern, refers to defining the skeleton of an algorithm and allowing subclasses to provide implementation for one or more steps. The template method enables the subclass to redefine some steps of the algorithm without changing the structure of the algorithm. 1, Application scenario of template me ...

Posted by Jr0x on Wed, 26 Feb 2020 14:58:28 +0100

EL&JSTL of Web core

primary coverage 1. JSP: 1. instruction 2. notes 3. Built in objects 2. MVC development mode 3. EL expression 4. JSTL label 5. Three tier architecture JSP: 1. instruction *Function: used to configure JSP pages and import resource files * format: <% @ instruction name property name 1 = pro ...

Posted by aaronlzw_21 on Wed, 26 Feb 2020 14:18:14 +0100

[shopping mall seckill project] - use mathematical graphic verification code to limit current

Seckill interface address hiding can prevent malicious users from calling the interface frequently to request operations, but it can't prevent robots. The ticketing software can still click the button frequently to request the seckill address interface maliciously In the scenario of high concurrency ...

Posted by mikem562 on Wed, 26 Feb 2020 07:13:13 +0100

Android's local data store (SQLite database)

Article directory I. concept 1, understand 2. Application scenario 2, Database operations 1. Create database 2. Data operation (add, delete, modify and query) 2.1 add statement Method 1: Method 2: 2.2 delete statement 2.3 UPDATE statement 2.4 query statement 3. Import of mobile database file ...

Posted by flash gordon on Tue, 25 Feb 2020 12:51:55 +0100