Domain Driven Design Tactical Patterns--Domain Events

Use domain events to capture something that happens in the domain. Domain-driven practitioners find that they can better understand the problem domain by understanding more events that occur in the problem domain. These events are domain events, which are mainly acquired in the process of knowledge extraction with domain experts. Domain events ...

Posted by irbrian on Thu, 09 May 2019 14:08:38 -0700

Branch and Bound Method for Algorithmic Notes

BFs In fact, breadth-first search is hierarchical traversal, and the program is implemented by queue. Algorithmic thought Beginning with the root, the solution space tree of the problem is often searched by BF or in the way of minimum cost (i.e. maximum benefit) priority. Firstly, the root node is added to the live node table, and then the root ...

Posted by pothole_89 on Thu, 09 May 2019 11:44:40 -0700

MongoDB Update Document

The commands in this article are all real-time under the mongo shell. In real web projects, the corresponding implementations of these commands are encapsulated, so there is no need to be scared. Put on the official orthodox documents first English document The links below are all from the Chinese community. There are many ways for ...

Posted by blawson7 on Thu, 09 May 2019 01:27:39 -0700

Eight main uses of killall commands to terminate processes on Linux

Linux's command line provides many commands to kill a process.For example, you can pass a PID to kill a process; the pkill command uses a regular expression as input, so processes matching that pattern are killed. But there is also a command called killall, which by default matches the parameter name exactly and then kills the matching proce ...

Posted by RamboJustRambo on Tue, 07 May 2019 16:00:39 -0700

Numpy&Pandas

Simply put, Numpy is used for matrix calculation, while Pandas is based on Numpy, which enriches and simplifies Numpy's operation. Numpy Basic operation import numpy as np array = np.array([[1, 2, 3], [2, 3, 4]], dtype=np.int) #dtype is the element data type a = np.zeros((3, 4)) # Zero Matrix of 3 Rows and 4 ...

Posted by woody79 on Tue, 07 May 2019 05:50:40 -0700

es6 grammar commonly used in work

let and const In JavaScript, we used to use key var to define variables. After ES6, we added two keywords to define variables, let and const. For variables, variables defined by var in ES5 will be raised to all functions and statements in scope, while variables defined by let in ES6 will not. Variables declared by let will est ...

Posted by onyx on Tue, 07 May 2019 02:05:38 -0700

Pool Area of Netty Memory Pool

Pool Area is a core container in Netty memory pool. Its main function is to manage a series of Pool Chunks and Pool Subpages created, and to delegate the final application action to these two sub-containers according to the different memory size of the application. This paper first introduces the overall structure of PoolArena, then introduces ...

Posted by khujo56 on Mon, 06 May 2019 01:05:38 -0700

Python Crawler Introduction Tutorial 61-100 Write about a crawler that runs into a backcrawl and destroys it!

The python3 crawler encountered a backcrawl When you excitedly open a web page and find that the resources inside are great, you can download them in batches. Then thank you for writing a crawler download. As a result, after an operation, you find that the website has anti-crawling measures, which is embarrassing. In the next few articles, we w ...

Posted by Spiz on Sun, 05 May 2019 20:55:37 -0700

Graph Theory Summary - Topological Sorting and Shortest Path Problems (Weightless Shortest Path, Dijkstra Algorithm, Graph with Negative Edge Values)

Definition of graph A graph G = (V,E) consists of a vertex set V and an edge set E. Each edge is a pair of points (v,w), where v,w < V, sometimes referred to as an arc. If the pairs of points are ordered, the graph is called directed, and the directed graph is sometimes called digraph. Vertices V and W adjacent if and only ...

Posted by drepster on Sun, 28 Apr 2019 18:20:36 -0700

Introduction to the Lazy Man about PHP Encryption and Decryption (API Security Enhancement Part 1)

Slacker Introduction These two points are enough to show that this article does not want to have any high-end atmospheric technology content, I tell you, it's all water. There can't be any prime number, elliptic curve cryptography, Diffy-Herman or anything, there can't be. First of all, I don't understand it. Second, you don't understand it a ...

Posted by justbane on Sat, 27 Apr 2019 17:00:36 -0700