vue day 6 learning notes - introduction of bable and preparation of vue documents

1, Bable introduction Is a separate tool, independent of webpack, but can be used with webpack Function: convert es6 or typescript into ordinary js code Scenario: for example, an old browser doesn't know demo Arrow function of es6 in JS Used alone (when not used with webpack): npm install @bable/core @bable/cli@bable/core @bable/cli -D ...

Added by Dilbert137 on Thu, 03 Mar 2022 19:59:24 +0200

Builder Mode for Crazy Learning Java Design Patterns

Builder Mode for Crazy Learning Java Design Patterns 1. Mode Type Builder Pattern is a Creative Pattern 2. Mode Definition Builder Pattern refers to the separation of the construction of a complex object from its representation so that the same construction process can create different representations. Such a design pattern is called Builde ...

Added by ermajn on Thu, 03 Mar 2022 19:57:04 +0200

drf serialization component

I Introduction to serializer 1. Serialization and deserialization in Python Serialization: converting objects in Python to strings in XML formatDeserialization: convert a string in Python format into an object in Python 2. Function of serializer Serialization, the serializer will convert the model object into a dictionary, and then into a j ...

Added by IanMartins on Thu, 03 Mar 2022 19:36:02 +0200

Vue + Springboot uses the national secret algorithm SM2 for data encryption and transmission at the front and back ends, and provides a complete interactive solution

When deploying the external network of the project, data encryption transmission is often required, especially for the projects of enterprises and institutions. In addition, for security or red header files, the national secret algorithm is often required. Because interaction is involved, SM2 asymmetric encryption is used. Back end (Springboot ...

Added by mmorton on Thu, 03 Mar 2022 19:14:26 +0200

Algorithm-simulation

Preface: The so-called "simulation algorithm" used in the so-called simulation problems does not have a completely accurate definition. The analog algorithm, as the old saying goes, "Paint the ladle according to the gourd"; The official interpretation is that key elements are filtered and extracted according to the title de ...

Added by The Silent on Thu, 03 Mar 2022 19:06:03 +0200

Why does HashMap in Java 1.8 use tail interpolation

As we all know, java 1.7 and the previous HashMap linked list insert elements using the header insertion method, which will lead to rings in the linked list in a multi-threaded environment, and will fall into an dead loop when being searched (CPU burst) 😭). Java 1.8 optimizes this problem and uses head interpolation. What's the difference bet ...

Added by futurshox on Thu, 03 Mar 2022 19:05:43 +0200

Easy to understand Redis data structure basic tutorial

Redis has five basic data structures: string, list, hash, set and zset. They are the most frequently used and widely used data structures in daily development. If you understand these five data structures thoroughly, you will master half of redis application knowledge. string First, let's start with string. String represents a variable byte ...

Added by LostOne on Thu, 03 Mar 2022 18:48:18 +0200

[paper reading notes 64] a unified generic framework for variant ner subtasks

1. Basic information subjectAuthor and unitsourceparticular yearA Unified Generative Framework for Various NER SubtasksQiu Xipeng group, Fudan UniversityACL2021 13 Citations, 70 References Paper link: https://arxiv.org/pdf/2106.01223.pdf Thesis Code: https://github.com/yhcc/BARTNER 2. Key points Research topicsProblem backgroundCore method ...

Added by kasitzboym on Thu, 03 Mar 2022 18:31:42 +0200

page fault(do_fault) of linux

do_fault refers to the processing of file page fault. When vma is specifically mapped to a file, page fault will be regarded as file page fault: static vm_fault_t handle_pte_fault(struct vm_fault *vmf) { ... ... if (!vmf->pte) { if (vma_is_anonymous(vmf->vma)) return do_anonymous_page(vmf); else return do_fault(vmf) ...

Added by ikmyer on Thu, 03 Mar 2022 18:24:00 +0200

java introspection Technology

What is introspection In computer science, introspection refers to the ability of computer programs to check the type of objects at Run time, which can also be called run-time type checking. Introspection and reflection should not be confused. Compared with introspection, reflection goes further. It refers to the ability of a computer program t ...

Added by trilbyfish on Thu, 03 Mar 2022 18:21:58 +0200