Summary of front-end common plug-ins and tool Libraries

Preface In development, we often encapsulate some commonly used code blocks and function blocks to make better reuse. Then, the plug-in is formed by pulling out the plug-in to complete the function independently and interacting with other parts through API or configuration items. Here are some common front-end open-source plug-ins that I have ...

Posted by joukar on Sun, 08 Dec 2019 03:51:57 +0100

Touch copy function of mobile terminal

Before the company's project, a user needs to automatically copy a string code for him as soon as he enters the page and touches his mobile phone.. wtf? And that? Well, when the demand comes out, let's realize it... When users come in and touch their mobile phones, they will generate three events: touchstart, touchmove and touchend. We can't di ...

Posted by beginPHP on Sat, 07 Dec 2019 14:36:07 +0100

Some unusual operations in iOS

1. Grammar sugar The following code NSString *str = nil; NSDictionary *safeDic = [NSDictionary dictionaryWithObjectsAndKeys:@"value",@"key",str,@"key1", nil]; NSLog(@"%@",safeDic?:@"Dictionary is not safe"); NSDictionary *dic = @{@"key":str}; NSLog(@"%@",dic); Two of them are used: 1. Dict ...

Posted by fukas on Sat, 07 Dec 2019 12:13:24 +0100

Applet movable area drag fixed click failure

Preface First look at the effect.Drag is implemented, but the click event of the lower layer of the draggable area is invalid. The original drag is to solve the problem that the lower layer is blocked and can't be clickedThat's great. The area that can't be clicked is higher. Fortunately, I found a solution from the Internet movable-view { ...

Posted by IlikeTheWeb on Sat, 07 Dec 2019 11:48:45 +0100

Big data tutorial (8.4) mobile traffic analysis case

The implementation and principle of wordcount word statistics using mapreduce are shared before. This blogger will continue to share a classic case of mobile traffic analysis to help understand and use hadoop platform in practical work. I. requirements The following is a mobile traffic log. We need to analyze the upstream traffic, downstream ...

Posted by chantown on Fri, 06 Dec 2019 23:52:36 +0100

Node.js generates a QR code image on the specified image template with a text description at the bottom

In Node.js, we can use the qr-image The package generates the QR code image directly in the background. The usage is simple: var qr = require('qr-image'); exports.createQRImage = function(res, str){ var img = qr.image(str); // A QR code picture will be generated res.writeHead(200, {'Content-Type': 'image/png'}); img.pipe(res) ...

Posted by jasper182 on Fri, 06 Dec 2019 18:11:55 +0100

Share the SDK of cloud function short message platform developed by TCB router

In the last article, we shared how to use the cloud function to develop hazelnut SMS( http://smsow.zhenzikj.com)SDK, due to the limitation of wechat on the number of unpaid cloud functions, this method has defects. After improvement, TCB router is used as the route, so only one cloud function needs to be integratedDownload sdk and demo: http:/ ...

Posted by fahad on Wed, 04 Dec 2019 09:30:31 +0100

python handles the graphic verification of Google and 12306 differently

With the development of anti crawler, there are not only slider verification, but also point selection verification, graphic verification, Chinese character graphic verification, among which Google's graphic verification and 12306's graphic verification are more well-known, as well as the inverted Chinese character verification. In addition to ...

Posted by jtron85 on Tue, 03 Dec 2019 17:03:19 +0100

Android project practice: judge whether the network connection is wired (tv Project adaptation)

Generally, for android phones, we can judge the network situation through the method provided by sdk   /** * Get the current network status: no network - 0: WIFI network 1: 4G Network - 4: 3G network - 3: 2G network - 2 * custom * * @param context * @return */ public static int getAPNType(Context context) ...

Posted by rinjani on Tue, 03 Dec 2019 15:31:51 +0100

java encapsulation and this usage

Encapsulation: it is mainly used to set the access permission of the member name (class variable) in the class through the private keyword. After using private, the member variable can only be accessed in the current class. If it exceeds the class, the access prompt does not exist. Of course, it can also be used in methods, but less. If you wan ...

Posted by jazappi on Tue, 03 Dec 2019 11:27:54 +0100