A new WeChat official account has been applied for.
1. Apply for the account of wechat public platform, and then apply for Tencent cloud recommended by him to do demo
2. After applying for centos host, get the public ip and password. After ssh login, follow the demo prompt
3. Install web.py.
wget -c http://webpy.o ...
Posted on Mon, 27 Apr 2020 11:35:03 -0400 by Shaudh
1, Bind domain name
First login WeChat public platform into the "official account settings" function settings to fill in the "JS interface security domain name".
2, Import JS file
3, Inject permission validation configuration through config interface
Put all the interfaces of JS ...
Posted on Wed, 22 Apr 2020 10:20:40 -0400 by grimz
First look at the effect picture: first record, after the recording is successful, add the recording to the list, click the list to play; after the recording is completed, upload the recording, and then voice recognition.
Official wechat documents https://developers.weixin.qq.com/doc/offiaccount/OA_Web_Apps/JS-SDK.html
Implementation process ...
Posted on Fri, 17 Apr 2020 11:41:22 -0400 by broomstick
xml: Introduction: contains functions about extensible markup language xml Use: python has three methods to parse XML--SAX,dom, and ElementTree. Because xml technology is backward, we will not introduce sax and DOM here:
xml text: <?xml version="1.0"?>
Posted on Wed, 15 Apr 2020 14:47:25 -0400 by btrsrinivasarao
[10. SHA1 encryption of hash]
SHA1 (English: Secure Hash Algorithm 1, Chinese Name: Secure Hash Algorithm 1) is a cryptographic hash function designed by the national security administration of the United States and published as the federal data processing standard (FIPS) by the National Institute of standards and Technology (NIST).SHA-1 ...
Posted on Sun, 05 Apr 2020 18:57:26 -0400 by Lol5916
Whether it's a Windows computer or a Linux computer, there will be more or less many duplicate files left in the process of using. These files will not only occupy our disk, but also drag down our system, so it is necessary to kill these duplicate files.
This article will introduce 6 ways to find duplicate files in the system, so that you can q ...
Posted on Tue, 10 Mar 2020 01:08:03 -0400 by cavendano
1. Time clock time
The time module allows access to multiple types of clocks for different purposes. Standard system calls, such as time (), report the system wall clock time. The monotonic() clock can be used to measure the elapsed time of a long-running process, because even if the system time changes, the clock can not be reversed. For perfo ...
Posted on Mon, 02 Mar 2020 01:53:08 -0500 by jakem
Let me in.
Skynet management system
Forgot the password
Guess Next Session
Experiment bar Web Topic series 3
Let me in.
I believe you can get what you want
Hint: you may want to know wha ...
Posted on Mon, 24 Feb 2020 07:22:30 -0500 by vinaip
Like the author: redis source code, many comments and very detailed. Before looking at the source code of the compressed list, you can first look at the comments at the top of the ziplist.c file to basically understand the data structure design.
The compressed list ziplist is a two-wa ...
Posted on Thu, 30 Jan 2020 00:22:05 -0500 by markmax33
Jupyter Notebook is a very easy-to-use gadget, but it can only be accessed locally without configuration.
This article references[ Brief book ]The jupyter notebook is configured to realize cross host browser access.
Install jupyter notebook
conda install jupyter notebook
The. Jupyte ...
Posted on Mon, 27 Jan 2020 04:52:52 -0500 by solaris77