iOS crash log collection
iOS crash log collection
Developing an APP user experience may seem very important. Think about how uncomfortable it is that an APP always flies away and bug s keep popping up. Users will definitely uninstall it directly. So in order to develop more robust programs, we have roughly the following methods:
Fully consider the differences betwe ...
Posted by vierme on Fri, 19 Apr 2019 11:00:32 -0700
Building Personal Blog Based on Github Pages+Jeykll
Building Personal Blog Based on Github Pages+Jeykll
Prerequisite skills and environmental requirements:
Basic Github operations (cloning, submission, etc.)
Configuration of Jekyll Environment in Everyone's Computer
Linux Installation Jekyll Environment Install Jekyll 3 in Ubuntu 14.04
Mac Installation Jekyll Environment Install Jekyll ...
Posted by MrTL on Thu, 18 Apr 2019 17:00:33 -0700
MACOS 10.11 Disk Array
background
No backup, no security.
Especially those old hard drives that don't know how many years they've been using, have some bad ways, they can't be repaired, and the data in them can't be copied. It's a real ghost.
disk array
MAC OS 10.11 and later systems, disk arrays in disk tools have disappeared, I wipe.
Explain the disk arra ...
Posted by justinede on Wed, 17 Apr 2019 13:30:33 -0700
Redis & PHP Simple Memorandum
The following are the Redis installation, basic operation of Redis client, PHP-Redis extension and basic interface memorandum of Redis in PHP. The local environment is Mac.
Redis installation
First, you need to download Redis, visit the following website, and select the Stable version to download:
https://redis.io/download
Enter the decompresse ...
Posted by JVassie on Mon, 15 Apr 2019 17:45:32 -0700
Implementation of Sylix OS Network Card Driver
1. Development environment
Operating System: Sylix OS
Programming environment: RealEvo-IDE3.1
Hardware Platform: IMX6Q Experimental Box
2. Technical Realization
The transceiver function driven by network card is realized by managing transceiver descriptors. Therefore, it is necessary to initialize the descriptor when the MAC is initialized. I ...
Posted by nonaguy on Sun, 14 Apr 2019 23:03:32 -0700
Built-in locks and Lock locks implement producer-consumer models
Built-in locks and Lock locks implement producer-consumer models
Synchronized implementation code:
synchornized must be used in synchronization blocks or synchronization methods.
import java.util.ArrayList;
import java.util.List;
class Goods{
private String goodsName;
private Integer count=0;
//Maximum inventory
...
Posted by kobayashi_one on Fri, 05 Apr 2019 18:06:31 -0700
Classical Crawler Learning-Traditional request Module Implements Three Different Ways to Simulate Landing on Renren Network (Elite)
This case simulates the landing of Renren in three different ways. It is a classic case of traditional simulated landing. Readers are invited to consult it carefully.
Setting session to simulate login
Include cookies in headers for simulated Login
Simulate login by specifying cookies separately
1. The method of setting ses ...
Posted by Telemachus on Wed, 03 Apr 2019 16:45:29 -0700
Unity5-ABSystem(3): AssetBundle Loading
Reprinted from: http://blog.csdn.net/lodypig/article/details/51872595
Unity Special Path
Resources
StreamingAssetsPath
PersistentDataPath
DataPath
Synchronous loading
Core function
Unable to load synchronously on Android platform
Example
Asynchronous loading
Core function
Example
WWW Asynchronous Loading
Resource loading ...
Posted by stefan63 on Fri, 29 Mar 2019 02:00:28 -0700
iOS coretext Framework Chapter 1 Basic Knowledge
API interface documentation.
https://developer.apple.com/library/mac/#documentation/Carbon/Reference/CoreText_Framework_Ref/_index.html
Several of the most commonly used classes in the CoreText framework:
CTFont
CTFontCollection
CTFontDescriptor
CTFrame
CTFramesetter
CTGlyphInfo
CTLine
CTParagraphStyle
CTRun
C ...
Posted by shanx24 on Wed, 27 Mar 2019 19:06:29 -0700
One linux command per day: the ifconfig command
Many windows are very familiar with the ipconfig command line tool, which is used to obtain and modify network interface configuration information. Linux systems have a similar tool, ifconfig(interfaces config). Usually you need to log in as root or use sudo to use the ifconfig tool on your Linux machine. Depending on the option attributes use ...
Posted by BigJohn on Wed, 27 Mar 2019 15:21:29 -0700