Graphql combat series
Former love introduction
stay Graphql Series of Actual Warfare (Part I) We have completed the technical selection and bridged the graphql Gel gels In the project, and dynamic handwritten schema, through http://localhost 5000/graphql view effect. In this section, we automatically generate the basic query and update schema according to the databa ...
Posted by bird_man11 on Fri, 10 May 2019 09:00:20 +0200
Easy to express your girlfriend: Android version software (zero-based software can also be downloaded directly)
In our daily life, we often see some html webpages to express our girlfriend, but the Android side of the presentation software can be said to be basically no, the author searched the whole network, there is no one available, so it is recommended that the editor put my blog on the home page. Android can give people a sense of customization a ...
Posted by Mark W on Fri, 10 May 2019 04:24:04 +0200
python obfuscation compilation
Step 1 Programming
Take the Queen N problem on github as an example
"""The n queens puzzle.
https://github.com/sol-prog/N-Queens-Puzzle/blob/master/nqueens.py
"""
__all__ = []
class NQueens:
"""Generate all valid solutions for the n queens puzzle"""
def __init__(self, size):
# Store the puzzle (problem) size ...
Posted by vishi83 on Fri, 10 May 2019 01:02:03 +0200
LogStash is used to aggregate logs
elastic: https://www.elastic.co/
In order to facilitate centralized viewing of the business logs of multiple hosts, we use Filebeat, Redis, Logstash to collect:
(1) Filebeat monitors the changes of log files and writes the new part into redis. The log of each line is the data of a list set of specified key s in redis.
(2) LogStash monitors t ...
Posted by warran on Thu, 09 May 2019 22:00:03 +0200
java log desensitization framework sensitive, elegant print desensitization log
problem
In order to ensure users'information security, sensitive information needs desensitization.In the process of project development, it feels very troublesome to deal with the log problem of sensitive information every time. Most of them are handled separately with tool classes, which is not conducive to the unified management in the futur ...
Posted by Acs on Thu, 09 May 2019 16:56:03 +0200
TNW-WeChat Public Number Various Message Interaction
Article Directory
Test Number Application
Open Developer Mode
Receive various messages
Process and distribute messages
Introduction to MsgAdapter
Response to the corresponding reply
Open source recommendation
Test Number Application
Ask your own test number for testing
Open Developer Mode
The various message interactio ...
Posted by Afrojojo on Thu, 09 May 2019 16:30:05 +0200
Introduction to New Functions of npm profile
Reprinted address
Introduction to New Functions of npm profile
The new version of npm has a new function, npm profile, which can change your profile information. You can modify your profile without going to the website later.
Specific support for this function is probably in version 6. If your npm version does not have this command, it is r ...
Posted by cinos11 on Thu, 09 May 2019 09:27:03 +0200
[Front End] Use jsencrypt for front-end encryption of parameters
For login function in a project, parameters are usually submitted to the server through form form or ajax for validation. In this process, if the login password is encrypted once in the front end, the security is better than that of direct submission.Recently, when I read the login page of the blog park, I found that the login ...
Posted by Sentosa on Thu, 09 May 2019 07:06:03 +0200
Tensorflow-benchmark_model is deployed to android platform to test model performance
TF-benchmark_model is deployed to android platform to test model performance
Host: A pc platform for compilation. The environment of this article is Ubuntu 16.04.
Target: android platform for scoring (mainly instruction set architecture). The environment of this paper is armeabi-v7a.
This article only compiles an android ...
Posted by sstoveld on Thu, 09 May 2019 06:15:04 +0200
Go Scheduler Series Source Code Reading and Exploration
Dear friends, this time I would like to share with you the knowledge and experience related to the source code reading of Go Scheduler. There are many good articles on the network to analyze the source code. So this article is not another source code analysis article. It is not about the source code analysis and sharing, but to bring you some l ...
Posted by lkq on Thu, 09 May 2019 05:33:02 +0200