System time and standard time proofreading of Int network
I. significance of obtaining standard time
When we are programming, for data approval, we need to calibrate parameters with date time values and works. Therefore, it is the best way to keep the client time consistent with the server time and keep their time consistent with the standard time.
II. Technical preparation
1. Syst ...
Posted by arctushar on Fri, 20 Dec 2019 22:12:42 +0100
Using Kotlin to write basic network requests
The source download link has been given at the end of the article
First, add the dependency required by the network request to build.gradle:
//Retrofit
implementation 'com.squareup.retrofit2:retrofit:2.4.0'
implementation 'com.squareup.retrofit2:converter-gson:2.4.0'
implementation "com.squareup.retrofit2:adapt ...
Posted by deolsabh on Wed, 18 Dec 2019 18:35:07 +0100
Android gets current location information through GPS or NetWork
demo download address: https://download.csdn.net/download/sinat_35349353/10706484
Just completed a project (intranet project) that needs to obtain location information through GPS, so it can still judge that there is a network connection when acquiring providers according to LocationManager. The provider obtained by debug is [ ...
Posted by t_galan on Wed, 18 Dec 2019 17:25:47 +0100
sshd service in linux
sshd service
1. Introduction to sshd
sshd= secure shell
A service that can boot the shell in the host through the network
Client software < c-f9 >
sshd
Connection mode:
ssh username@ip ##Links to text patterns
ssh -X username@ip ##You can turn on the graphics after the link is successful
Note:
The first ...
Posted by st0rmer on Tue, 17 Dec 2019 22:30:57 +0100
Memcached database cluster
Memcached overview
An open source high performance distributed memory object caching systemAll data is stored in memorySupport data of any storage typeSpeed up Web site access
Memcached caching mechanism
When the program writes the cache data request, the API interface of Memcached routes the KEY input routing algorithm module to a service i ...
Posted by ryanthegecko on Tue, 17 Dec 2019 12:25:43 +0100
Common project dependency summary
Every time I take over a new project, I see a lot of dependencies without comments. Some of them are hard to remember. I have to look up their meanings on the Internet for a long time every time, so I will read them when I write this article for later development to improve the development efficiency.
Edited on October 12, 2 ...
Posted by texhead on Mon, 16 Dec 2019 23:17:32 +0100
Simple demo of using websocket in vue2.0
1. First contact with websocket, spend more than a day looking for relevant materials, and refer to relevant examples on the network( https://www.cnblogs.com/qilin-3611/p/7054270.html )A simple front-end and back-end demo is arranged. The back-end demo directly uses the demo of the article in the link. After downloading, tomcat ...
Posted by maiza on Mon, 16 Dec 2019 22:15:35 +0100
Use of wechat applet Canvas
This issue introduces how Canvas draws pictures, including how to draw high-definition pictures, use network pictures / local pictures, date conversion (lunar and solar calendar / week conversion), picture adaptation mobile phone model, etc.
Layout introduction
There are four parts here. The picture above shows the QR Co ...
Posted by patrick99e99 on Mon, 16 Dec 2019 17:02:07 +0100
Simplest state switching layout
Simplest state switching layout
Function introduction
Loading data
Data load failed
Data load is empty
Network load failed
Retry click event
Support custom layout
Rendering display
The simplest way to use it
1.Add it in your root build.gradle at the end of repositories:
allprojects {
repositories {
...
maven { ...
Posted by hypuk on Sun, 15 Dec 2019 18:20:07 +0100
[go cryptography] - Digital Signature
introduce
Digital signature is a digital string that can not be forged by others only by the sender of the message. This digital string is an effective proof of the authenticity of the information.
Sender: generate signature
Recipient: verify signature
Asymmetric cryptography
In asymmetric encryption, the public key is used for encryption and ...
Posted by validangina on Sun, 15 Dec 2019 16:28:31 +0100