GitHub access failed, solution < 2020 / 4 / 21 >
#Include < date: April 21, 2020 articles have been changed and updated to solve your problems more effectively
<----------------------------------------------------------------------------------------------------------------------------------------------> Preface: I don't know what the reason is, GitHub is not very friendly in China ...
Posted by vikela on Mon, 01 Jun 2020 05:38:55 +0200
Using Kotlin reflection skillfully to name by value, debugging more quickly and save money
Pain spot
We often define constants, such as
1
2
3
4
5
6
7
public interface ItemType {
public static final int TYPE_TEXT = 0;
public static final int TYPE_IMG = 1;
public static final int TYPE_VIDEO = 2;
public static final int TYPE_AUDIO = 3;
public static final int TYPE_LINK = 4;
}
When we print to see ...
Posted by Sh0t on Mon, 01 Jun 2020 03:04:06 +0200
Visitor mode of behavior mode
1 General
Visitor pattern is a behavior pattern, which is not commonly used. It can separate the algorithmic logic acting on the object from the object itself.
2 visitor mode
When we need to operate on a group of similar types of objects, we can maintain the operation logic within each object separately, but this violates the principle of singl ...
Posted by markl999 on Sun, 31 May 2020 11:54:48 +0200
Source code analysis of shiro filter
I. configuration
<!-- Shiro Of Web filter -->
<bean id="shiroFilter" class="org.apache.shiro.spring.web.ShiroFilterFactoryBean">
<!-- Injection Security Manager-->
<property name="securityManager" ref="securityManager"/>
<!-- Set up login URL-->
<property name="loginUrl" value="/login"/>
...
Posted by bdemo2 on Fri, 29 May 2020 18:11:48 +0200
Developing dynamic forms from 0 to 1
Tree sauce hope to bring the fun of the front end to you this article has been included github.com/littleTreem... Like star A kind of
Cutting edge: there are a lot of forms in the application of the middle and background. The left hand is a form, and the right hand is a form. There is no end to it. If you use templates to write one b ...
Posted by BSlepkov on Fri, 29 May 2020 06:52:42 +0200
Implementation of chat tool based on Serverless and Websocket
It is not difficult for traditional business to implement Websocket. However, function calculation is basically event driven and does not support long link operation. If the function calculation is combined with the API gateway, can there be a Websocket implementation scheme?
Implementation of Websocket with API gateway trigger
WebSocket pro ...
Posted by markepic on Wed, 27 May 2020 09:47:32 +0200
Web service deployment deep learning model - Zhihu
The purpose of this article is to introduce how to use Web services to deploy deep learning model quickly. Although TF has TFserving to deploy the model, it can't do anything for python (if you want to use it, you need to transform the torch model, which is a bit troublesome); therefore, this article introduces a method of using Web services ...
Posted by urb on Wed, 27 May 2020 07:12:58 +0200
The strategic model of behavior model
1 General
Strategy pattern is a kind of behavior pattern with low complexity. When there are many ways to complete a task, you can consider using strategy pattern.
2. Strategic mode
In the strategy mode, we need to define a family of algorithms and put them into independent classes, each of which represents a method to complete the task. For ex ...
Posted by mezise on Sun, 24 May 2020 11:46:50 +0200
Install Docker.v19 and configure the Docker Compose orchestration tool
Bowen catalog
1. Introduction to Compose
2. Install Docker
1. Install version 19.03.9 Docker
2. Configure Mirror Acceleration
3. Install and use Docker Compose
1. Github Download Docker Compose
2. Docker Compose Download by Dow Cloud
IV. Writing.yml Files
1..yml file to build simple Nginx services
2. Compoose+dockerfile to build a mirror
3. U ...
Posted by TubeRev on Fri, 22 May 2020 18:13:58 +0200
CentOS 6.X installs ddos deflate to defend against ddos Attacks
DDoS deflate is a very small tool for defense and mitigation of DDoS attacks. It can create a large number of IP address information of Internet connection by monitoring netstat, and prohibit or block these non IP addresses through IPTABLES.
It must be downloaded and installed in the terminal account under root authority. The specific commands ...
Posted by vurentjie on Fri, 22 May 2020 16:45:29 +0200