Necessary knowledge points of MySQL log file development
Reference source: juejin.im/post/5b7c0aabf265da438415b9eb
Log files record all kinds of activities that affect MySQL database. Common log files in MySQL database include error log, binary log, slow query log and query log. They are i ...
Posted by Yucky on Tue, 30 Jun 2020 00:40:28 -0700
Kafka -- cluster building
Service discovery: first of all, the mutual discovery of services between kfakas is realized by using Zookeeper. Therefore, Zookeeper must be built in advance. To build a Zookeeper cluster, please pay attention to the blog's article: Building Zookeeper cluster；Service relat ...
Posted by Bauer418 on Mon, 29 Jun 2020 20:50:55 -0700
This is a question for my recent interview
There are several ways to create a single example of the interviewer's question. I answered the lazy man and the hungry man. He told me that there are two kinds. In fact, I still vaguely remember two kinds. I just can't remember, and my heart silently tears.... ...
Posted by Birdmansplace on Sun, 28 Jun 2020 22:54:54 -0700
The news data of several websites have been crawled before. Now we need to organize and display these data. The specific requirements are as follows
The first step is to install the dependency package in npm install under the final project folder
Here, I met a problem during the installation process. Th ...
Posted by moonman89 on Sun, 28 Jun 2020 20:05:01 -0700
Python asynchronous programming
Now it's Python 3.5 and it has entered the asynchronous era
Because of the existence of GIL (global lock), python can not play the advantage of multi-core, and its performance has been criticized. However, in IO intensive network programming, asynchronous processing is hundreds of times more efficient ...
Posted by stickman373 on Sat, 27 Jun 2020 22:46:42 -0700
Spring Science (5) -- SMS verification code login function
Previous articles on spring Science Series
1,Spring security (1) -- authentication + authorization code implementation
2,Spring security (2) --- remember my feature implementation
3,Spring Science (3) -- function implementation of graphic verification code
4,Spring Science (4) -- ...
Posted by marky2coats on Sat, 27 Jun 2020 20:17:11 -0700
In the previous receiving ActiveMQ and code cases, you have configured:
See the default protocol of ActiveMQ for TCP. However, ActiveMQ processing supports TCP thank you. It also supports client broker communication protocols: TCP, NIO, UDP, ...
Posted by bigger on Sat, 27 Jun 2020 02:27:07 -0700
Automatic login is a mechanism that saves the user's login information in the cookie of the user's browser. When the user visits next time, it automatically realizes the verification and establishes the login state. Spring Security provides two very good types of Tokens:
Hash algorithm encrypts user's necessary login information and generates ...
Posted by exec1 on Sat, 27 Jun 2020 01:18:49 -0700
1, What is serialization and deserialization?
Java serialization refers to the process of converting Java objects into byte sequences;
Java deserialization refers to the process of restoring byte sequences to Java objects.
2, What does serialization do?
Object persistence, which can permanently s ...
Posted by everknown on Fri, 26 Jun 2020 21:35:28 -0700
My first ASP.NET Project summary
Recently, I was busy at the end of the term and didn't have time to update my blog. Here's one I'll do for myself ASP.NET Project (equipment management system) to summarize, the page template is the master, which greatly reduces the amount of code. Finally, the source code and database of the project are atta ...
Posted by stanleyg on Thu, 25 Jun 2020 23:34:59 -0700