Summary of front-end common plug-ins and tool Libraries
Preface
In development, we often encapsulate some commonly used code blocks and function blocks to make better reuse. Then, the plug-in is formed by pulling out the plug-in to complete the function independently and interacting with other parts through API or configuration items.
Here are some common front-end open-source plug-ins that I have ...
Posted by joukar on Sun, 08 Dec 2019 03:51:57 +0100
Touch copy function of mobile terminal
Before the company's project, a user needs to automatically copy a string code for him as soon as he enters the page and touches his mobile phone.. wtf? And that? Well, when the demand comes out, let's realize it...
When users come in and touch their mobile phones, they will generate three events: touchstart, touchmove and touchend. We can't di ...
Posted by beginPHP on Sat, 07 Dec 2019 14:36:07 +0100
Some unusual operations in iOS
1. Grammar sugar
The following code
NSString *str = nil;
NSDictionary *safeDic = [NSDictionary dictionaryWithObjectsAndKeys:@"value",@"key",str,@"key1", nil];
NSLog(@"%@",safeDic?:@"Dictionary is not safe");
NSDictionary *dic = @{@"key":str};
NSLog(@"%@",dic);
Two of them are used:
1. Dict ...
Posted by fukas on Sat, 07 Dec 2019 12:13:24 +0100
Applet movable area drag fixed click failure
Preface
First look at the effect.Drag is implemented, but the click event of the lower layer of the draggable area is invalid. The original drag is to solve the problem that the lower layer is blocked and can't be clickedThat's great. The area that can't be clicked is higher. Fortunately, I found a solution from the Internet
movable-view {
...
Posted by IlikeTheWeb on Sat, 07 Dec 2019 11:48:45 +0100
Big data tutorial (8.4) mobile traffic analysis case
The implementation and principle of wordcount word statistics using mapreduce are shared before. This blogger will continue to share a classic case of mobile traffic analysis to help understand and use hadoop platform in practical work.
I. requirements
The following is a mobile traffic log. We need to analyze the upstream traffic, downstream ...
Posted by chantown on Fri, 06 Dec 2019 23:52:36 +0100
Node.js generates a QR code image on the specified image template with a text description at the bottom
In Node.js, we can use the qr-image The package generates the QR code image directly in the background. The usage is simple:
var qr = require('qr-image');
exports.createQRImage = function(res, str){
var img = qr.image(str); // A QR code picture will be generated
res.writeHead(200, {'Content-Type': 'image/png'});
img.pipe(res) ...
Posted by jasper182 on Fri, 06 Dec 2019 18:11:55 +0100
Share the SDK of cloud function short message platform developed by TCB router
In the last article, we shared how to use the cloud function to develop hazelnut SMS( http://smsow.zhenzikj.com)SDK, due to the limitation of wechat on the number of unpaid cloud functions, this method has defects. After improvement, TCB router is used as the route, so only one cloud function needs to be integratedDownload sdk and demo: http:/ ...
Posted by fahad on Wed, 04 Dec 2019 09:30:31 +0100
python handles the graphic verification of Google and 12306 differently
With the development of anti crawler, there are not only slider verification, but also point selection verification, graphic verification, Chinese character graphic verification, among which Google's graphic verification and 12306's graphic verification are more well-known, as well as the inverted Chinese character verification.
In addition to ...
Posted by jtron85 on Tue, 03 Dec 2019 17:03:19 +0100
Android project practice: judge whether the network connection is wired (tv Project adaptation)
Generally, for android phones, we can judge the network situation through the method provided by sdk
/**
* Get the current network status: no network - 0: WIFI network 1: 4G Network - 4: 3G network - 3: 2G network - 2
* custom
*
* @param context
* @return
*/
public static int getAPNType(Context context) ...
Posted by rinjani on Tue, 03 Dec 2019 15:31:51 +0100
java encapsulation and this usage
Encapsulation: it is mainly used to set the access permission of the member name (class variable) in the class through the private keyword. After using private, the member variable can only be accessed in the current class. If it exceeds the class, the access prompt does not exist. Of course, it can also be used in methods, but less. If you wan ...
Posted by jazappi on Tue, 03 Dec 2019 11:27:54 +0100