IO represents Input and Output respectively. Data transmission needs to rely on flow, which can be understood as data flow.
According to the direction of flow, it is divided into input stream (from device to memory) and output stream (from memory to device).
According to the differ ...
Posted on Tue, 23 Jun 2020 05:54:04 -0400 by adksga
Relationship between AOP and dynamic agent:
Functions to be added to the business code (called crosscutting concerns in the target object and notifications in the aspect class)
Classes that encapsulate enhanced methods (horizontal concerns)
Posted on Tue, 23 Jun 2020 01:11:30 -0400 by trp
How to climb:
Find the website you want to crawl, for example https://sz.meituan.com/meishi/ (target website of this crawl)
Analyze whether this web page is dynamic or static (dynamic and static web pages are not explained here, and students can understand Baidu)
If the web page is static, you can direc ...
Posted on Mon, 22 Jun 2020 23:10:44 -0400 by jbille
Protocol resolution is essential in daily network development. Although length-based, delimiter-based codecs are built into Netty, in most scenarios we use custom protocols, so Netty provides MessageToByteEncoder<I> and ByteToMessageDecoder Two abstract classes that encode and decode private protocols by inheriting overrides of their enco ...
Posted on Mon, 22 Jun 2020 22:05:16 -0400 by jalapena
1, Common encryption methods in Java
Base64 encryption algorithm (encoding method)
MD5 encryption (message digest algorithm, verifying information integrity)
Symmetric encryption algorithm
Asymmetric encryption algorithm
Digital signature algorithm
digital certificate 2, Classification
According to w ...
Posted on Sun, 21 Jun 2020 23:47:32 -0400 by cwheel3915
In the previous section, we built several service modules, User, Order and Pay, which communicate with each other directly to access objects. In the production environment, we generally require users to log in and authorize before performing related operations. If each microservice does a set o ...
Posted on Sun, 21 Jun 2020 05:36:11 -0400 by jdorsch
Get ip address resolution home
Time: April 29, 2013
If you need to reissue, please indicate the above ...
Posted on Sat, 20 Jun 2020 03:51:03 -0400 by esscher
Before starting this article, I really want to do a questionnaire to find out how many people are like me. My knowledge of JsonConvert is limited to the methods of SerilizeObject and DeserializeObject (), so that I can work together and not be alone._Perhaps these two methods can basically solve 80% of the scenar ...
Posted on Thu, 18 Jun 2020 21:11:52 -0400 by baiju
Recently, I've been dealing with the reading and processing of data sets. It's inevitable to use the knowledge points of file processing in python. Although some functions and knowledge points know what's going on, they don't feel that they have a solid grasp. Therefore, I plan to sort ou ...
Posted on Thu, 18 Jun 2020 01:14:11 -0400 by k_ind
1. Computer core foundation
1.1 what is language? What is programming language? Why programming languages?
Language is actually the medium of communication between people, such as English, Chinese, Russian, etc.
Programming language is the medium of communication between people and computers,
The purp ...
Posted on Wed, 17 Jun 2020 02:56:51 -0400 by xlordt