Strengthen spring series Chapter 17: Spring internationalization (i18n)

Article catalog Strengthen spring series Chapter 17: Spring internationalization (i18n) preface 1. Project environment 2.Spring international usage scenario 3.Spring International interface 3. Hierarchical MessageSource 4.Java internationalization standard implementation 4.1 core interface 4.2 core ...

Posted on Fri, 12 Jun 2020 04:00:41 -0400 by BluntedbyNature

Experience of FastDFS cluster

FastDFS cluster FastDFS is an open-source lightweight distributed file system, which manages files. Its functions include file storage, file synchronization, file access (file upload, file download), etc. It solves the problems of mass storage and load balancing. It is especially suitable for online s ...

Posted on Fri, 12 Jun 2020 02:01:27 -0400 by Pha

Multi cluster k8s dashboard ldap unified login and authorization tool

Origin of tools Why write such a tool? This is because our company has multiple kubernetes clusters (8 +), and cloud hosting services can't access the apserver configuration, which brings us a pain point. Development and sre need to log in to k8s dashbao and different departments and roles need different authorizations, which used to be throug ...

Posted on Fri, 12 Jun 2020 01:04:46 -0400 by mistjulia

Java crawler framework WebMagic

The architecture design of WebMagic refers to scratch, while the implementation uses mature Java tools such as HttpClient and Jsoup.WebMagic consists of four components (Downloader, PageProcessor, Scheduler, Pipeline): Downloader: Downloader PageProcessor: page parser Scheduler: task assignment, url de duplication Pipeline: data storage an ...

Posted on Thu, 11 Jun 2020 23:38:02 -0400 by Drabin

Python zero basic programming - 09 practical cryptology chapter - encryption and decryption of classical encryption algorithm

abstract Book to previous: 1-Zero basic programming -- Python basic 2-Zero basic programming: basic theory of cryptography In the previous part, we shared the basic theory of cryptography. Starting from Morse code, we analyzed Caesar encryption, transposition encryption, digital multiplication en ...

Posted on Thu, 11 Jun 2020 22:57:56 -0400 by Zaxnyd

Combination of Nacos and Sentinel to achieve traffic safety control

Alibaba Sentinel is a high-performance and lightweight solution for flow control and fuse degradation. It is a highly available flow control component for distributed service architecture. Sentinel website: https://sentinelguard.io/zh-cn/   Github: https://github.com/alibaba/Sentinel    What is Sentinel    With the popularity of microser ...

Posted on Thu, 11 Jun 2020 22:32:15 -0400 by thelinx

Object-Oriented C Language Programming-DynamicLinkageGenericFunctions--Stealing Beams and Changing Columns in C Language

Article Directory `DynamicLinkageGenericFunctions` Constructors and Destructors Methods, Information, Classes, and Objects `new` `delete` `clone` `differ` `sizeOf` `main` summary `TIPS` DynamicLinkageGenericFunctions Code repository [Code repository]:Https://github.com/zzu-andrew/linux-sys/b ...

Posted on Thu, 11 Jun 2020 20:46:31 -0400 by AbsolutelyFreeW

Using Koa2 to build mockserver

preface This article is mainly for the front-end development engineers to explain how to use Node.js Framework Koa2 and mockjs build a set of data simulation services to provide simulation data for front-end services. Simple operation can greatly improve development efficiency. Problems encountered in actual combat Scene 1: schoolmate A is hap ...

Posted on Thu, 11 Jun 2020 04:36:04 -0400 by mesh2005

Cypress web automation 39-.trigger() common mouse operation events

preface Mouse events often encountered on web pages include: mouse hover operation, right mouse button, mouse long press, drag and so on trigger() Trigger method is used to trigger events on DOM elements Examples of grammar usage .trigger(eventName) .trigger(eventName, position) .trigger(eventName, options) .trigger(eventName, x, y) .trig ...

Posted on Thu, 11 Jun 2020 00:19:39 -0400 by AndrewJ1313

Interpretation of two consistent hash algorithms

https://github.com/ning1875/falcon-plus This is my change to the open source version of falcon === The most important thing I forgot to write is: why can consistency hash algorithm only migrate a small number of keys when the nodes change? Because the sortkeys list is actually a hash ring. The relative position of the client's hash value and t ...

Posted on Wed, 10 Jun 2020 23:46:24 -0400 by assonitis