mariadb Transaction Isolation Level Related Experiments

On the Isolation Level of SQLThe SQL standard defines four isolation levels, as follows:1. Read UncommittedAt this isolation level, all transactions can see the execution results of other uncommitted transactions. This isolation level is seldom used in practical applications, because its performance is not much better than other levels. Reading ...

Posted by Corvin on Sat, 15 Jun 2019 18:01:24 -0700

Front-end access to session information mode comparison, optimization

In the development process, page js often encounters the need for current login user information (menu privileges, user basic information, configuration information). Generally, we may not care too much about these information acquisition methods, but now the front end is packaged by webpack. Even if the code is partitioned, js files and css fi ...

Posted by Mercenary on Thu, 13 Jun 2019 11:36:46 -0700

Configuration of Lightweight c Language Development Environment under win: vsc + gcc

Explain VSCode is an editor. By default, it does not have a compiler and debugging environment. It needs to install the compiler by itself. Debugging can be done with its plug-in. The compiler suite is based on TDM-GCC, which is easy to use. (Codeblocks, Dev-Cpp and other default bands are this one). Paths are automatically added to the environ ...

Posted by realtek on Wed, 12 Jun 2019 16:58:22 -0700

SpringData JPA uses SQLQuery native

1. Create EntityManager with annotations: /*unitName is used to select a specific PersistenceContext and the primary data source is selected by default, which passes through the.persistenceUnit("secondaryPersistenceUnit") when creating the bean s of the data source To create it by */on the object of EntityManagerFactoryBuilder @Pe ...

Posted by JasperBosch on Wed, 12 Jun 2019 09:40:59 -0700

LNK File (Shortcut) Remote Code Execution Vulnerability Reproduction Process (CVE-2017-8464)

Vulnerability number: CVE-2017-8464 Vulnerability Level: Serious Vulnerability profile: If a user opens a malicious LNK file carefully constructed by an attacker, it will cause remote code execution. An attacker who successfully exploits this vulnerability can gain the same user privileges as a local user. Attackers can spread malicious LNK fil ...

Posted by bogdan on Sun, 09 Jun 2019 16:24:29 -0700

to_date() of SQL and a detailed explanation of date processing

Date examples: SELECT TO_DATE('2006-05-01 19:25:34', 'YYYY-MM-DD HH24:MI:SS') FROM DUAL SELECT TO_DATE('2006-05-01 19:25', 'YYYY-MM-DD HH24:MI') FROM DUAL SELECT TO_DATE('2006-05-01 19', 'YYYY-MM-DD HH24') FROM DUAL SELECT TO_DATE('2006-05-01', 'YYYY-MM-DD') FROM DUAL SELECT TO_DATE('2006-05', 'YYYY-MM') FROM DUAL SELECT TO_DATE('2006', 'YYY ...

Posted by christo on Sun, 09 Jun 2019 15:24:49 -0700

IOS ARKit Latest Documents

Introduction: ARKit is undoubtedly a bright spot at the WWDC 2017 conference held this morning. Apple added ARKit to its own development components, which reduced the difficulty of augmented reality development, but improved the effect a lot, and combined with its own hardware, it eventually produced a very good visual effect. This also s ...

Posted by kituscat on Sat, 08 Jun 2019 11:48:11 -0700

dubbo Source Resolution Server Processing Request Processing

2.7 Disclosure - Service side processing request process Target: From the source point of view, analyze a series of operations after the server receives the request, and eventually return the value that the client needs. Preface The previous article talked about the process of sending requests by the consumer side, which is about the process of ...

Posted by dstantdog3 on Sat, 08 Jun 2019 09:20:31 -0700

Establishment of NanoHttpd Android HTTP Sever

Original articles, reprinted please indicate the source: Establishment of NanoHttpd Android HTTP Sever:http://www.jianshu.com/p/ef6279a429d4 This article originated from the brief book, CSDN is an excellent platform, so it also appeared in CSDN. Preface Recently, I received a task to build an HTTP Server on my mobile phone for file shari ...

Posted by dacio on Fri, 07 Jun 2019 19:29:50 -0700

Share a clumsy way to read JS code once

Has been writing server-side, recently using Netty-NIO to write chats. The web side uses JS to realize the chat interface... JS was not used very much, so I set up a JS Demo which imitated Wechat. It uses the vue.js library.   Cruel source code: About 600 lines, but it's too much for a rookie like me. There are no comments in the code, and the ...

Posted by Lucidnight on Fri, 07 Jun 2019 19:07:05 -0700