Graphql combat series

Former love introduction stay Graphql Series of Actual Warfare (Part I) We have completed the technical selection and bridged the graphql Gel gels In the project, and dynamic handwritten schema, through http://localhost 5000/graphql view effect. In this section, we automatically generate the basic query and update schema according to the databa ...

Posted by bird_man11 on Fri, 10 May 2019 09:00:20 +0200

Easy to express your girlfriend: Android version software (zero-based software can also be downloaded directly)

In our daily life, we often see some html webpages to express our girlfriend, but the Android side of the presentation software can be said to be basically no, the author searched the whole network, there is no one available, so it is recommended that the editor put my blog on the home page. Android can give people a sense of customization a ...

Posted by Mark W on Fri, 10 May 2019 04:24:04 +0200

python obfuscation compilation

Step 1 Programming Take the Queen N problem on github as an example """The n queens puzzle. https://github.com/sol-prog/N-Queens-Puzzle/blob/master/nqueens.py """ __all__ = [] class NQueens: """Generate all valid solutions for the n queens puzzle""" def __init__(self, size): # Store the puzzle (problem) size ...

Posted by vishi83 on Fri, 10 May 2019 01:02:03 +0200

LogStash is used to aggregate logs

elastic: https://www.elastic.co/ In order to facilitate centralized viewing of the business logs of multiple hosts, we use Filebeat, Redis, Logstash to collect: (1) Filebeat monitors the changes of log files and writes the new part into redis. The log of each line is the data of a list set of specified key s in redis. (2) LogStash monitors t ...

Posted by warran on Thu, 09 May 2019 22:00:03 +0200

java log desensitization framework sensitive, elegant print desensitization log

problem In order to ensure users'information security, sensitive information needs desensitization.In the process of project development, it feels very troublesome to deal with the log problem of sensitive information every time. Most of them are handled separately with tool classes, which is not conducive to the unified management in the futur ...

Posted by Acs on Thu, 09 May 2019 16:56:03 +0200

TNW-WeChat Public Number Various Message Interaction

Article Directory Test Number Application Open Developer Mode Receive various messages Process and distribute messages Introduction to MsgAdapter Response to the corresponding reply Open source recommendation Test Number Application Ask your own test number for testing Open Developer Mode The various message interactio ...

Posted by Afrojojo on Thu, 09 May 2019 16:30:05 +0200

Introduction to New Functions of npm profile

Reprinted address Introduction to New Functions of npm profile The new version of npm has a new function, npm profile, which can change your profile information. You can modify your profile without going to the website later. Specific support for this function is probably in version 6. If your npm version does not have this command, it is r ...

Posted by cinos11 on Thu, 09 May 2019 09:27:03 +0200

[Front End] Use jsencrypt for front-end encryption of parameters

For login function in a project, parameters are usually submitted to the server through form form or ajax for validation. In this process, if the login password is encrypted once in the front end, the security is better than that of direct submission.Recently, when I read the login page of the blog park, I found that the login ...

Posted by Sentosa on Thu, 09 May 2019 07:06:03 +0200

Tensorflow-benchmark_model is deployed to android platform to test model performance

TF-benchmark_model is deployed to android platform to test model performance Host: A pc platform for compilation. The environment of this article is Ubuntu 16.04. Target: android platform for scoring (mainly instruction set architecture). The environment of this paper is armeabi-v7a. This article only compiles an android ...

Posted by sstoveld on Thu, 09 May 2019 06:15:04 +0200

Go Scheduler Series Source Code Reading and Exploration

Dear friends, this time I would like to share with you the knowledge and experience related to the source code reading of Go Scheduler. There are many good articles on the network to analyze the source code. So this article is not another source code analysis article. It is not about the source code analysis and sharing, but to bring you some l ...

Posted by lkq on Thu, 09 May 2019 05:33:02 +0200