Reading Notes: Talking about Java Serialization
I've read "Java Programming Thought" once before, understood the code in the book and knocked it once. But a lot of in-depth knowledge is not used in actual work, so I forgot that in order to consolidate myself, in the future, I will try to do some reading notes on these contents to strengthen my understanding.Java serialization refer ...
Posted by mobile target on Tue, 09 Jul 2019 00:26:45 +0200
Specific steps of "imitating knowledge" small program for zero-based development
How many people want to develop a small program and find that their foundation is 0.
Today, I would like to share with you an inspirational case: a girl who reads atmospheric science and teaches herself the front-end development, because she likes to browse and know, she has made a "imitation" small program.
I hope her development e ...
Posted by HERATHEIM on Mon, 08 Jul 2019 04:17:00 +0200
[April 20] Use requests to log on to the website of the Academic Affairs Department and inquire about the timetable
Recent classes are always unable to remember which classroom, I feel it is very troublesome to visit the website of the Academic Affairs Office manually every time. It happened that I was learning to crawl, so I wanted to write a crawler to help me look up the information on the timetable.
Do as you say. With requests, a third-party library th ...
Posted by kyleldi on Sun, 07 Jul 2019 22:46:49 +0200
RxSwift Mapping Operator Has Regret
Along the way, I feel that RxSwift is not as obscure and difficult as before. I even gradually like the idea of responsive programming. It takes objects as observable objects and subscribes to them. With the cooperation of filter operators, all logical operations are performed in background threads. This section is about the most powerful funct ...
Posted by twick100 on Sun, 07 Jul 2019 20:56:22 +0200
Development Framework Construction: Encapsulation of Common Base Classes
We want to develop an APP. The first task is to build the package structure, build the framework, encapsulate the base class, import the third-party libraries into the project and so on. Today we will talk about how to complete this process.
(Note: Everyone has their own code style, so there is no good or bad code that suits them.)
Through t ...
Posted by afbase on Sun, 07 Jul 2019 00:31:45 +0200
python crawls east of Beijing on a large scale
python crawls east of Beijing on a large scale
Main Tools
scrapy
BeautifulSoup
requests
Analysis steps
Open the first page of Jingdong, enter your pants and you will see the page Jump to Here This is the starting point for our analysis
We can see that this page is not complete, and when we pull down we will see pictures loading constantly, ...
Posted by Vince889 on Sat, 06 Jul 2019 18:30:29 +0200
Amazon Alexa login authorization (Android)
To access Alexa's API, you must carry AccessToken, that is, you must login authorization. This paper mainly records the login authorization process of Amazon Alexa on Android platform.
1. Registering Applications on Amazon Developer Platform
Enter the Alexa column of Amazon Developer Platform
https://developer.amazon.com/edw/home.html#/
Clic ...
Posted by shelluk on Fri, 05 Jul 2019 20:29:05 +0200
2G-3G handover for android network types
In android mobile phone'Settings'-'Mobile Network Type', you can see the options about network type, generally default to 3G priority. If you need to switch the network type of friends in the program, you might as well try the following methods. Several ideas are provided here, although they may be addressed. ...
Posted by unrelenting on Fri, 05 Jul 2019 03:00:41 +0200
Dagger2 Foundation and Advancement
Preface
Dagger2 relies on an injection framework to reduce program-to-program coupling and prevent potential systemic problems.
In addition, it has many advantages:Increase development efficiency and eliminate repetitive simple manual labor
The process of starting a new instance is a repetitive and simple manual effort, and dagger2 can do ex ...
Posted by expert_21 on Thu, 04 Jul 2019 20:45:33 +0200
Implementation of Token Authentication and Android for API Interface JWT
Last article The implementation of JWT authentication on Laravel framework server has been introduced. This article continues with the Android client implementation. Looking back on the process of JWT authentication, the client first submits the account password for login. After the account password verification is successful, the server will ...
Posted by stevesimo on Thu, 04 Jul 2019 02:52:26 +0200