iOS crash log collection

iOS crash log collection Developing an APP user experience may seem very important. Think about how uncomfortable it is that an APP always flies away and bug s keep popping up. Users will definitely uninstall it directly. So in order to develop more robust programs, we have roughly the following methods: Fully consider the differences betwe ...

Posted by vierme on Fri, 19 Apr 2019 11:00:32 -0700

Building Personal Blog Based on Github Pages+Jeykll

Building Personal Blog Based on Github Pages+Jeykll Prerequisite skills and environmental requirements: Basic Github operations (cloning, submission, etc.) Configuration of Jekyll Environment in Everyone's Computer Linux Installation Jekyll Environment Install Jekyll 3 in Ubuntu 14.04 Mac Installation Jekyll Environment Install Jekyll ...

Posted by MrTL on Thu, 18 Apr 2019 17:00:33 -0700

MACOS 10.11 Disk Array

background No backup, no security. Especially those old hard drives that don't know how many years they've been using, have some bad ways, they can't be repaired, and the data in them can't be copied. It's a real ghost. disk array MAC OS 10.11 and later systems, disk arrays in disk tools have disappeared, I wipe. Explain the disk arra ...

Posted by justinede on Wed, 17 Apr 2019 13:30:33 -0700

Redis & PHP Simple Memorandum

The following are the Redis installation, basic operation of Redis client, PHP-Redis extension and basic interface memorandum of Redis in PHP. The local environment is Mac. Redis installation First, you need to download Redis, visit the following website, and select the Stable version to download: https://redis.io/download Enter the decompresse ...

Posted by JVassie on Mon, 15 Apr 2019 17:45:32 -0700

Implementation of Sylix OS Network Card Driver

1. Development environment Operating System: Sylix OS Programming environment: RealEvo-IDE3.1 Hardware Platform: IMX6Q Experimental Box 2. Technical Realization The transceiver function driven by network card is realized by managing transceiver descriptors. Therefore, it is necessary to initialize the descriptor when the MAC is initialized. I ...

Posted by nonaguy on Sun, 14 Apr 2019 23:03:32 -0700

Built-in locks and Lock locks implement producer-consumer models

Built-in locks and Lock locks implement producer-consumer models Synchronized implementation code: synchornized must be used in synchronization blocks or synchronization methods. import java.util.ArrayList; import java.util.List; class Goods{ private String goodsName; private Integer count=0; //Maximum inventory ...

Posted by kobayashi_one on Fri, 05 Apr 2019 18:06:31 -0700

Classical Crawler Learning-Traditional request Module Implements Three Different Ways to Simulate Landing on Renren Network (Elite)

This case simulates the landing of Renren in three different ways. It is a classic case of traditional simulated landing. Readers are invited to consult it carefully. Setting session to simulate login Include cookies in headers for simulated Login Simulate login by specifying cookies separately 1. The method of setting ses ...

Posted by Telemachus on Wed, 03 Apr 2019 16:45:29 -0700

Unity5-ABSystem(3): AssetBundle Loading

Reprinted from: http://blog.csdn.net/lodypig/article/details/51872595 Unity Special Path Resources StreamingAssetsPath PersistentDataPath DataPath Synchronous loading Core function Unable to load synchronously on Android platform Example Asynchronous loading Core function Example WWW Asynchronous Loading Resource loading ...

Posted by stefan63 on Fri, 29 Mar 2019 02:00:28 -0700

iOS coretext Framework Chapter 1 Basic Knowledge

API interface documentation. https://developer.apple.com/library/mac/#documentation/Carbon/Reference/CoreText_Framework_Ref/_index.html Several of the most commonly used classes in the CoreText framework: CTFont CTFontCollection CTFontDescriptor CTFrame CTFramesetter CTGlyphInfo CTLine CTParagraphStyle CTRun C ...

Posted by shanx24 on Wed, 27 Mar 2019 19:06:29 -0700

One linux command per day: the ifconfig command

Many windows are very familiar with the ipconfig command line tool, which is used to obtain and modify network interface configuration information. Linux systems have a similar tool, ifconfig(interfaces config). Usually you need to log in as root or use sudo to use the ifconfig tool on your Linux machine. Depending on the option attributes use ...

Posted by BigJohn on Wed, 27 Mar 2019 15:21:29 -0700