[design mode | C ා] design mode learning notes
Article directory
1. Opening and closing principle
2. Single principle
3. Interface isolation principle
4.4. Dependency Inverse Principle
5. Richter's replacement principle
6. Dimitar's Law (the least known principle)
7. Principle of composite reuse
1. Opening and closing principle
2. Single p ...
Posted by jaimitoc30 on Wed, 15 Jan 2020 13:58:02 +0100
Seta introduction to distributed transaction DEMO
>Simple Extensible Autonomous Transacation Architecture, seata is a simple, scalable and highly autonomous distributed architecture
SEATA Server Configure
>Because we use the official version 1.0.0-GA, most of the instructions found on the Internet are version 0.X, with many changes. For example, the script of db_store.sql is cancelled in ...
Posted by Begby on Wed, 15 Jan 2020 13:57:55 +0100
ch06 object oriented features
Article directory
Object oriented features
Understanding object-oriented concept
Classes and objects
Polymorphism
inherit
Create classes, properties, and actions
Class structure
Constructor
Destructor
Class instantiation
Use class properties
Call class action
Using private and public keywords to ...
Posted by himnbandit on Wed, 15 Jan 2020 10:27:27 +0100
Full analysis of Spring Boot email
1. Preface
Welcome to read Spring Boot 2 series Although e-mail has been "annealed" in recent years, it still plays an important role in the development. In more formal occasions, we still send messages and receipts by email. Today, let's learn how to send email under Spring Boot.
2. dependence
Java sends e-mail based on the jakarta. ...
Posted by Ruud Hermans on Wed, 15 Jan 2020 04:58:54 +0100
Algorithms Verify Palindrome String-Palindrome Chain List
00125 Verify Palindrome String
Title Description
Given a string, verify that it is a palindrome string, considering only alphabetic and numeric characters, ignoring case.
Description: In this topic, we define an empty string as a valid palindrome string.
Example 1:
Input:'A man, a plan, a canal: Panama'
Output: true
Example 2:
Input:'race a ...
Posted by JeremyTiki on Mon, 13 Jan 2020 01:49:09 +0100
C language uses macro to realize static polymorphism
Overview
Polymorphism is an important feature of object-oriented programming.
In C + + language, polymorphism means that functions with different functions can use the same function name, and can call functions with different contents with one function name.
There are two kinds of polymorphism in C + +:
1. Static polymorphi ...
Posted by n9ne on Fri, 10 Jan 2020 19:46:05 +0100
The most common function set of vue.js code development
1: Click the new button to jump out of the new page
<span class="inquire" @click="addNew">Newly added</span>
In method, add this method
addNew()
{
this.$router.push({ name: "newMember" });
},
Complete code
<template>
<span class="inquire" @click="addNew">Newly added ...
Posted by dcooper on Fri, 10 Jan 2020 17:49:43 +0100
Click the button in Android to start another Activity and transfer values between activities
scene
Click the button in the first Activity to start the second Activity, close the second Activity and return to the first Activity.
Pass the value to the second Activity in the first Activity, and get and display it in the second Activity.
Open the second Activity
Activity value passing
Note:
Blog:https://blog.csdn.net/badao_liumang_ ...
Posted by 2DaysAway on Fri, 10 Jan 2020 15:24:36 +0100
Work summary - get the sub nodes of the tree and copy the tree
1: Structure of tree nodes
class KprDimension{
private String id; //Current node id of the tree
private String name; //Tree node name
private String parentId;// Tree node parent id
private Integer level; //The node level of the tree, as shown in the figure below, A is 1, B,C is 2
private List<KprDimension> children;// ...
Posted by porrascarlos80 on Fri, 10 Jan 2020 09:04:15 +0100
Akka implementation of OAuth 2 service: access_token management
There are several core points to implement an OAuth 2 service:
OAuth 2 protocol analysis
There may be many connected users, and the system needs to support horizontal expansion
State control of access_token of each connected user: validity control
Services should support fault tolerance, recoverability, scalability, high concurrency and other ...
Posted by charlieholder on Fri, 10 Jan 2020 09:03:54 +0100