I am a programmer and a person. I may:
There's a loud name.
Born on a certain day
It's a man.
I can walk.
I can still run.
Still hop ...
Posted by greencoin on Sat, 18 May 2019 19:07:21 +0200
1: File operation
1. Determine whether the file exists
2. Determine whether it is a file
3. Create and delete files
4. Create a directory
2: I\O Flow Operation
1. (1) OutputStream with byte streams
1. (2) Write using a character output stream (Writer)
2. Read data using by ...
Posted by illzz on Sat, 18 May 2019 13:23:52 +0200
1 Application Technology
2 Implementation process
2.1 CMDB Asset Management
2.1.1 Asset Input
Fill in the form on the front page.
Submit data to Django background.
Write to Mysql database through Django Orm o ...
Posted by herbal_lavender on Sat, 18 May 2019 08:39:29 +0200
Today, Zhongshan company lets the dispatching arrangement batch be seen remotely, because it is the same source program, making the formal library will not report errors, making the test library will report errors, thinking of the problem of data or database settings, so it debugs the source program, and the program will report errors when it c ...
Posted by RedRasper on Sat, 18 May 2019 05:25:08 +0200
Current limiting is one of the three powerful tools to protect high concurrent systems, and the other two are cache and degradation. Current limitation is used to limit concurrency and requests in many scenarios, such as second-kill snap-up, protection of their own systems and downstream systems from being overwhelmed by huge traff ...
Posted by Tux-e-do on Sat, 18 May 2019 05:21:07 +0200
For Android programmers, adb is frequently used in their daily work. Now, we summarize the commonly used adb commands in their work, which is convenient for inquiry and also for your reference. Viewing application memory usage, power consumption, startup time, wakelock, running monkey commands played a small role in previous application per ...
Posted by plasmahba on Sat, 18 May 2019 05:02:03 +0200
The dictionary in Redis is implemented using a hash table as the underlying implementation, where a hash table has multiple nodes and each node holds a key-value pair.
In Redis source files, the implementation code for the dictionary is in dict.c and dict.h files.
Redis's database is implemented ...
Posted by randomfool on Fri, 17 May 2019 22:33:11 +0200
Beginners tend to ignore exception handling in the program, thinking that the program is always running in a cared-for environment, without any wind or rain, because we are the most knowledgeable people of our program. So we know what he likes, what he can eat and what he can't eat. But one day he returned to ...
Posted by spartan789 on Fri, 17 May 2019 14:49:32 +0200