Basic single sign on in distributed environment

Knowledge premise Have a certain understanding of distributed scenariosTo understand the network domain name, you need to know that different URLs of primary or top-level domain names cannot share cookie s Environment construction Here, we create three spring boot projects, all with dynamic template thymeleaf, which is convenient for us to t ...

Added by reecec on Fri, 25 Feb 2022 11:17:16 +0200

Research on Innodb lock mechanism - gap lock

Lock algorithm in Innodb There are generally three locking algorithms commonly used in innodb, namely 1. Record lock 2. Gap Lock 3. next key lock The Next key lock is the combination of Gap lock and Record lock. It locks a range and locks the Record itself. In other words, the next key lock is not a separate lock. As far as I understand, ...

Added by Black Hobbit on Fri, 25 Feb 2022 10:59:43 +0200

Implementation of skynet timer

I Data structure of timer skynet timer uses a timer data structure to save data, as follows: struct timer { struct link_list near[TIME_NEAR]; //The event queue closest to the current time is retrieved from this queue every time a tick is made struct link_list t[4][TIME_LEVEL]; //An event queue that is far from the current t ...

Added by ojav on Fri, 25 Feb 2022 10:49:43 +0200

Python data analysis | Pandas core operating functions

Author: Han Xinzi@ShowMeAITutorial address: http://www.showmeai.tech/tutorials/33Article address: http://www.showmeai.tech/article-detail/146Notice: All Rights Reserved. Please contact the platform and the author for reprint and indicate the sourceWhen we mention python data analysis, pandas will be used for operation in most cases. This is the ...

Added by _rhod on Fri, 25 Feb 2022 10:42:21 +0200

Data structure - dictionary tree

1, Basic concepts Trie (dictionary tree) is a multi tree structure used to realize fast string retrieval. Each node of tier has several character pointers. If a character c is scanned when inserting or retrieving a string, it will follow the C character pointer of the current node to the node pointed to by the pointer.   initialization: & ...

Added by ovisopa on Fri, 25 Feb 2022 10:35:39 +0200

Alibaba vendor fluent for Web Engineering Practice

Author: Ma Kunle (Kunwu) Since its debut in 2015, after years of development, fluent has become quite mature and has been widely used in Internet companies such as Alibaba, meituan and pinduoduo. In the ICBU Ali seller, 90 +% of the new businesses are developed with Flutter, and the ICBU client development group has a large number of Flutter ...

Added by joshbb on Fri, 25 Feb 2022 09:03:10 +0200

Principle and practice of custom externalization extension mechanism in Spring Cloud

Spring Cloud has enhanced the attribute source function of Environment,In the spring cloud context package, the PropertySourceLocator interface is provided to implement the extension of property file loading. We can extend our external configuration loading through this interface. This interface is defined as followspublic interface PropertySou ...

Added by ChrisLeah on Fri, 25 Feb 2022 08:26:51 +0200

Interpretation of champion Kaggle: short term wind condition prediction task scheme of wind farm

Competition backgroundIn recent years, with the expansion of onshore wind turbine assembly sites, wind turbines installed in areas with more abrupt weather changes are more and more significantly affected by meteorological changes. In case of sudden change of wind conditions, due to the lag of the control system, it is easy to lead to excessive ...

Added by johncox on Fri, 25 Feb 2022 08:23:08 +0200

Callback processing during Bootstrap fileinput synchronous upload

Official document Chinese website http://bootstrap-fileinput.com/events.html First, introduce the css and js files of bootstrap fileinput Note: here is a distinction between synchronous and asynchronous Synchronous callback takes filebatchuploadsuccess Asynchronous callback fileuploaded Configuration item uploadAsync: false, / / synchronous ...

Added by glc650 on Fri, 25 Feb 2022 07:19:12 +0200

Simple greedy strategy

Greed and proof To choose the greedy strategy, we must first prove that the greedy strategy is correct before we can consider using it. In many cases, the rationality of greed is not obvious, but if we can find a counterexample, it can prove that such greed is not correct. Fractional Knapsack Problem Fractional Knapsack Problem When the it ...

Added by alex_lana on Fri, 25 Feb 2022 06:48:11 +0200