cron of Go daily

brief introduction cron A library for managing timing tasks, using Go to achieve the effect of crontab command in Linux. We introduced a similar Go library before—— gron . gron code is small, which is better for learning. But its function is relatively simple, and it is no longer maintained. If there is a need for timed tasks, cron ...

Posted by vchris on Sat, 27 Jun 2020 09:10:13 +0200

docker distributed warehouse harbor

Article catalog docker distributed warehouse harbor 1. Official introduction to harbor function 2. Install Harbor 2.1 solving dependent environment 1. Install docker 2. Install docker compose 2.2 and configure harbor startup 2.3. Harbor later modification configuration 3. Use harbor and upload i ...

Posted by schilly on Sat, 27 Jun 2020 08:24:42 +0200

Pandas of Python data analysis: time series

CSDN Course recommendation: towards data scientist: take you to play Python data analysis, lecturer Qi Wei, CTO of Suzhou Yantu Education Technology Co., Ltd., member of the master's Steering Committee of applied statistics major of Suzhou University; published "learn python with the old: easy introduction", "learn python wit ...

Posted by thegman on Sat, 27 Jun 2020 06:52:12 +0200

[SpringCloud Learning Notes 6] Getting Started and Using Config

Getting started with Config and using it 1. Introduction and Introduction to Config SpringCloud Config provides centralized external configuration support for microservices in the microservice architecture, and Configuration Server provides a centralized external configuration for all environments o ...

Posted by Cobby on Sat, 27 Jun 2020 02:42:32 +0200

[Distributed Lock] 03-Redisson for RedLock principles

Preface You've learned the principles of Redission reentrant locks and fair locks before, and then you'll see how Redission implements RedLock. RedLock principle RedLock is a redis-based distributed lock that guarantees the following features: Mutual exclusion: At any time, only one client can hold a lock; avoid deadlocks: When the clie ...

Posted by Shendemiar on Sat, 27 Jun 2020 02:29:15 +0200

A tutorial of using redis in golang

Original link: https://blog.csdn.net/wangshubo1989/article/details/75050024/ Life goes on, go go go!!! Previously, I introduced how to use sqlite3 in golang: <Go practice - go language operates sqlite database (The way to go)> Today I want to share with you how to use redis database in golang. ##What is redis Official website:https:/ ...

Posted by phynias on Fri, 26 Jun 2020 10:36:55 +0200

Development of Gobang based on Blazor ⚫⚪ Games

Today is the Dragon Boat Festival on the fifth day of may in the lunar calendar. Here, I wish you all a happy Dragon Boat Festival! Dragon Boat Festival is one of the ancient traditional festivals of the Chinese nation. Dragon Boat Festival is also called Duan five, Dragon Boat Festival. In addition, Dragon Boat Festival also has many other ...

Posted by Ancoats on Fri, 26 Jun 2020 09:14:15 +0200

Reconstruction of JAVA chat room -- a simple framework of CS mode

preface Since the beginning of data mining, I haven't written blog about technology for a long time. Recently, school JAVA The course design requires to realize a chat room. I think I wrote one last year, but I didn't realize some of the required functions, but looking at the original code, it seems that it's a little bit difficult to add func ...

Posted by samvelyano on Fri, 26 Jun 2020 04:17:25 +0200

The growth path of Java back-end architect -- Java network programming Netty

Java network programming Netty Analysis of Netty core source code Source code analysis of Netty startup process The overall understanding of the Demo source startup class of Echo program Source code analysis of NioEventLoopGroup ServerBootstrap creation and build process Source code analysis of bin ...

Posted by fresch on Thu, 25 Jun 2020 13:58:26 +0200

The simplest Spring Security tutorial in history: successful login to SuccessHandler advanced usage

  So that is what it is. We are lucky to know how to configure the page that is successfully logon after the login and how to specify the system to jump to an address. Yes, it's so simple. The Spring Security framework helps us do most of the work, but we can use it with a little configuration. How ...

Posted by JUMC_Webmaster on Thu, 25 Jun 2020 13:09:20 +0200