[design mode | C ා] design mode learning notes

Article directory 1. Opening and closing principle 2. Single principle 3. Interface isolation principle 4.4. Dependency Inverse Principle 5. Richter's replacement principle 6. Dimitar's Law (the least known principle) 7. Principle of composite reuse 1. Opening and closing principle 2. Single p ...

Posted by jaimitoc30 on Wed, 15 Jan 2020 13:58:02 +0100

Seta introduction to distributed transaction DEMO

>Simple Extensible Autonomous Transacation Architecture, seata is a simple, scalable and highly autonomous distributed architecture SEATA Server Configure >Because we use the official version 1.0.0-GA, most of the instructions found on the Internet are version 0.X, with many changes. For example, the script of db_store.sql is cancelled in ...

Posted by Begby on Wed, 15 Jan 2020 13:57:55 +0100

ch06 object oriented features

Article directory Object oriented features Understanding object-oriented concept Classes and objects Polymorphism inherit Create classes, properties, and actions Class structure Constructor Destructor Class instantiation Use class properties Call class action Using private and public keywords to ...

Posted by himnbandit on Wed, 15 Jan 2020 10:27:27 +0100

Full analysis of Spring Boot email

1. Preface Welcome to read Spring Boot 2 series Although e-mail has been "annealed" in recent years, it still plays an important role in the development. In more formal occasions, we still send messages and receipts by email. Today, let's learn how to send email under Spring Boot. 2. dependence Java sends e-mail based on the jakarta. ...

Posted by Ruud Hermans on Wed, 15 Jan 2020 04:58:54 +0100

Algorithms Verify Palindrome String-Palindrome Chain List

00125 Verify Palindrome String Title Description Given a string, verify that it is a palindrome string, considering only alphabetic and numeric characters, ignoring case. Description: In this topic, we define an empty string as a valid palindrome string. Example 1: Input:'A man, a plan, a canal: Panama' Output: true Example 2: Input:'race a ...

Posted by JeremyTiki on Mon, 13 Jan 2020 01:49:09 +0100

C language uses macro to realize static polymorphism

Overview Polymorphism is an important feature of object-oriented programming. In C + + language, polymorphism means that functions with different functions can use the same function name, and can call functions with different contents with one function name. There are two kinds of polymorphism in C + +: 1. Static polymorphi ...

Posted by n9ne on Fri, 10 Jan 2020 19:46:05 +0100

The most common function set of vue.js code development

1: Click the new button to jump out of the new page <span class="inquire" @click="addNew">Newly added</span> In method, add this method addNew() { this.$router.push({ name: "newMember" }); }, Complete code <template> <span class="inquire" @click="addNew">Newly added ...

Posted by dcooper on Fri, 10 Jan 2020 17:49:43 +0100

Click the button in Android to start another Activity and transfer values between activities

scene Click the button in the first Activity to start the second Activity, close the second Activity and return to the first Activity. Pass the value to the second Activity in the first Activity, and get and display it in the second Activity. Open the second Activity Activity value passing     Note: Blog:https://blog.csdn.net/badao_liumang_ ...

Posted by 2DaysAway on Fri, 10 Jan 2020 15:24:36 +0100

Work summary - get the sub nodes of the tree and copy the tree

1: Structure of tree nodes class KprDimension{ private String id; //Current node id of the tree private String name; //Tree node name private String parentId;// Tree node parent id private Integer level; //The node level of the tree, as shown in the figure below, A is 1, B,C is 2 private List<KprDimension> children;// ...

Posted by porrascarlos80 on Fri, 10 Jan 2020 09:04:15 +0100

Akka implementation of OAuth 2 service: access_token management

There are several core points to implement an OAuth 2 service: OAuth 2 protocol analysis There may be many connected users, and the system needs to support horizontal expansion State control of access_token of each connected user: validity control Services should support fault tolerance, recoverability, scalability, high concurrency and other ...

Posted by charlieholder on Fri, 10 Jan 2020 09:03:54 +0100