System time and standard time proofreading of Int network

I. significance of obtaining standard time When we are programming, for data approval, we need to calibrate parameters with date time values and works. Therefore, it is the best way to keep the client time consistent with the server time and keep their time consistent with the standard time. II. Technical preparation 1. Syst ...

Posted by arctushar on Fri, 20 Dec 2019 22:12:42 +0100

Using Kotlin to write basic network requests

The source download link has been given at the end of the article First, add the dependency required by the network request to build.gradle: //Retrofit implementation 'com.squareup.retrofit2:retrofit:2.4.0' implementation 'com.squareup.retrofit2:converter-gson:2.4.0' implementation "com.squareup.retrofit2:adapt ...

Posted by deolsabh on Wed, 18 Dec 2019 18:35:07 +0100

Android gets current location information through GPS or NetWork

demo download address: https://download.csdn.net/download/sinat_35349353/10706484 Just completed a project (intranet project) that needs to obtain location information through GPS, so it can still judge that there is a network connection when acquiring providers according to LocationManager. The provider obtained by debug is [ ...

Posted by t_galan on Wed, 18 Dec 2019 17:25:47 +0100

sshd service in linux

sshd service 1. Introduction to sshd sshd= secure shell A service that can boot the shell in the host through the network Client software < c-f9 >     sshd Connection mode: ssh username@ip ##Links to text patterns ssh -X username@ip ##You can turn on the graphics after the link is successful Note: The first ...

Posted by st0rmer on Tue, 17 Dec 2019 22:30:57 +0100

Memcached database cluster

Memcached overview An open source high performance distributed memory object caching systemAll data is stored in memorySupport data of any storage typeSpeed up Web site access Memcached caching mechanism When the program writes the cache data request, the API interface of Memcached routes the KEY input routing algorithm module to a service i ...

Posted by ryanthegecko on Tue, 17 Dec 2019 12:25:43 +0100

Common project dependency summary

Every time I take over a new project, I see a lot of dependencies without comments. Some of them are hard to remember. I have to look up their meanings on the Internet for a long time every time, so I will read them when I write this article for later development to improve the development efficiency. Edited on October 12, 2 ...

Posted by texhead on Mon, 16 Dec 2019 23:17:32 +0100

Simple demo of using websocket in vue2.0

1. First contact with websocket, spend more than a day looking for relevant materials, and refer to relevant examples on the network( https://www.cnblogs.com/qilin-3611/p/7054270.html )A simple front-end and back-end demo is arranged. The back-end demo directly uses the demo of the article in the link. After downloading, tomcat ...

Posted by maiza on Mon, 16 Dec 2019 22:15:35 +0100

Use of wechat applet Canvas

This issue introduces how Canvas draws pictures, including how to draw high-definition pictures, use network pictures / local pictures, date conversion (lunar and solar calendar / week conversion), picture adaptation mobile phone model, etc. Layout introduction There are four parts here. The picture above shows the QR Co ...

Posted by patrick99e99 on Mon, 16 Dec 2019 17:02:07 +0100

Simplest state switching layout

Simplest state switching layout Function introduction Loading data Data load failed Data load is empty Network load failed Retry click event Support custom layout Rendering display The simplest way to use it 1.Add it in your root build.gradle at the end of repositories: allprojects { repositories { ... maven { ...

Posted by hypuk on Sun, 15 Dec 2019 18:20:07 +0100

[go cryptography] - Digital Signature

introduce Digital signature is a digital string that can not be forged by others only by the sender of the message. This digital string is an effective proof of the authenticity of the information. Sender: generate signature Recipient: verify signature Asymmetric cryptography In asymmetric encryption, the public key is used for encryption and ...

Posted by validangina on Sun, 15 Dec 2019 16:28:31 +0100