GitHub access failed, solution < 2020 / 4 / 21 >

#Include < date: April 21, 2020 articles have been changed and updated to solve your problems more effectively <----------------------------------------------------------------------------------------------------------------------------------------------> Preface: I don't know what the reason is, GitHub is not very friendly in China ...

Posted by vikela on Mon, 01 Jun 2020 05:38:55 +0200

Using Kotlin reflection skillfully to name by value, debugging more quickly and save money

Pain spot We often define constants, such as 1 2 3 4 5 6 7 public interface ItemType { public static final int TYPE_TEXT = 0; public static final int TYPE_IMG = 1; public static final int TYPE_VIDEO = 2; public static final int TYPE_AUDIO = 3; public static final int TYPE_LINK = 4; } When we print to see ...

Posted by Sh0t on Mon, 01 Jun 2020 03:04:06 +0200

Visitor mode of behavior mode

1 General Visitor pattern is a behavior pattern, which is not commonly used. It can separate the algorithmic logic acting on the object from the object itself. 2 visitor mode When we need to operate on a group of similar types of objects, we can maintain the operation logic within each object separately, but this violates the principle of singl ...

Posted by markl999 on Sun, 31 May 2020 11:54:48 +0200

Source code analysis of shiro filter

I. configuration <!-- Shiro Of Web filter --> <bean id="shiroFilter" class="org.apache.shiro.spring.web.ShiroFilterFactoryBean"> <!-- Injection Security Manager--> <property name="securityManager" ref="securityManager"/> <!-- Set up login URL--> <property name="loginUrl" value="/login"/> ...

Posted by bdemo2 on Fri, 29 May 2020 18:11:48 +0200

Developing dynamic forms from 0 to 1

Tree sauce hope to bring the fun of the front end to you this article has been included github.com/littleTreem... Like star A kind of Cutting edge: there are a lot of forms in the application of the middle and background. The left hand is a form, and the right hand is a form. There is no end to it. If you use templates to write one b ...

Posted by BSlepkov on Fri, 29 May 2020 06:52:42 +0200

Implementation of chat tool based on Serverless and Websocket

It is not difficult for traditional business to implement Websocket. However, function calculation is basically event driven and does not support long link operation. If the function calculation is combined with the API gateway, can there be a Websocket implementation scheme? Implementation of Websocket with API gateway trigger WebSocket pro ...

Posted by markepic on Wed, 27 May 2020 09:47:32 +0200

Web service deployment deep learning model - Zhihu

The purpose of this article is to introduce how to use Web services to deploy deep learning model quickly. Although TF has TFserving to deploy the model, it can't do anything for python (if you want to use it, you need to transform the torch model, which is a bit troublesome); therefore, this article introduces a method of using Web services ...

Posted by urb on Wed, 27 May 2020 07:12:58 +0200

The strategic model of behavior model

1 General Strategy pattern is a kind of behavior pattern with low complexity. When there are many ways to complete a task, you can consider using strategy pattern. 2. Strategic mode In the strategy mode, we need to define a family of algorithms and put them into independent classes, each of which represents a method to complete the task. For ex ...

Posted by mezise on Sun, 24 May 2020 11:46:50 +0200

Install Docker.v19 and configure the Docker Compose orchestration tool

Bowen catalog 1. Introduction to Compose 2. Install Docker 1. Install version 19.03.9 Docker 2. Configure Mirror Acceleration 3. Install and use Docker Compose 1. Github Download Docker Compose 2. Docker Compose Download by Dow Cloud IV. Writing.yml Files 1..yml file to build simple Nginx services 2. Compoose+dockerfile to build a mirror 3. U ...

Posted by TubeRev on Fri, 22 May 2020 18:13:58 +0200

CentOS 6.X installs ddos deflate to defend against ddos Attacks

DDoS deflate is a very small tool for defense and mitigation of DDoS attacks. It can create a large number of IP address information of Internet connection by monitoring netstat, and prohibit or block these non IP addresses through IPTABLES. It must be downloaded and installed in the terminal account under root authority. The specific commands ...

Posted by vurentjie on Fri, 22 May 2020 16:45:29 +0200