With a small hand, you can implement a micro blog system with Python Django

2, Python Django microblog Through simple operation, you can implement a blog application in Django 2.1 generate files with templates Enter the directory created in the previous blog and execute the following command. django-admin startapp blog # You can also use the following command python manage.py startapp blog After the command is r ...

Added by adam84 on Tue, 28 Dec 2021 07:28:59 +0200

[Spring] use Spring's Validation to complete data backend verification

preface Data verification is an indispensable function of interactive websites. The front-end js verification can cover most verification responsibilities, such as user name uniqueness, birthday format, mailbox format verification and so on. However, in order to avoid users bypassing the browser and using http tools to directly reque ...

Added by RootKit on Tue, 28 Dec 2021 04:46:31 +0200

Interpretation of ConfigurationClassPostProcessor class of Spring source code

catalogue 1. postProcessBeanDefinitionRegistry() (1) @ Conditional annotation parsing (2) Parsing of @ Component, @ ComponentScan, @ Import, @ ImportSource and other annotations a. @Component, @ ComponentScan, @ Import, @ ImportSource resolution b. @Configuration resolution c. @ComponentScans parsing d. Internal class processing d. @Pro ...

Added by Person on Tue, 28 Dec 2021 04:08:31 +0200

Java microservice architecture practice, MySQL8

The algorithm implementation of hashjoin itself is not complex. To say that it is very complex, it may be that when the optimizer selects the execution plan, whether to select hashjoin and appearance, and the internal table may be more complex. Anyway, with hashjoin now, the optimizer has another choice when choosing the join algorithm. MySQL i ...

Added by Masterchief07 on Tue, 28 Dec 2021 03:07:24 +0200

Byte Java senior engineer interview, falling in love with data structures Season 1

The maximum degree of each node is 2 (up to 2 subtrees) The left subtree and the right subtree are ordered, and the binary tree is an ordered tree Even if a node has only one subtree, it is necessary to distinguish between the left and right subtrees Properties of binary tree The i-th layer of non empty binary tree has at most 2i &m ...

Added by darkke on Tue, 28 Dec 2021 00:58:37 +0200

Tomcat's immortality, learning notes of four mainstream middleware integrated by Alibaba P8 boss

import java.io.Writer; import org.apache.catalina.Context; import org.apache.catalina.LifecycleException; import org.apache.catalina.startup.Tomcat; public class EmbeddedTomcatEx { public static void main(String[] args) throws LifecycleException, InterruptedException, ServletException { Tomcat tomcat = new Tomcat(); tomcat.se ...

Added by dewknight on Mon, 27 Dec 2021 23:22:24 +0200

Python language programming -- loop structure programming

1. Find the sum of 1 + (1 + 2) + (1 + 2 + 3) +... + (1 + 2 + 3 +... + n) Find the sum of 1 + (1 + 2) + (1 + 2 + 3) +... + (1 + 2 + 3 +... + n) Input format: Enter an integer. Output format: Output the desired sum. The code is as follows: n=int(input()) sum=0 for i in range(1,n+1): for j in range(1,i+1): sum=sum+j print("sum = %d ...

Added by Elizabeth on Mon, 27 Dec 2021 22:37:41 +0200

Handwritten spring startup and scanning logic implementation

During the startup of the spring container, the class file under the specified package path will be scanned to determine whether the current class is a bean object. If it is a bean object, it will be injected into the spring container. This time, let's implement the scanning logic in the spring startup process. 1. Basic configuration informati ...

Added by chandru_cp on Mon, 27 Dec 2021 21:14:51 +0200

Mybatis a simple configuration for data encryption and decryption

Preface: introduce a simple MyBatis encryption and decryption method. Few people mention this method in their daily study and work, so let's talk about it. If you already know this method, ignore this article! 1, Background Sometimes in our database, some sensitive information of users, such as mobile phone number, bank card and other informa ...

Added by NZ_Kiwi on Mon, 27 Dec 2021 21:13:37 +0200

An article takes you to understand the introduction syntax of C + +

An article takes you to understand the introduction syntax of C + + C + + keyword (C++98) There are 63 keywords in C + + and 32 keywords in C language Let's take a look at the keywords of C + + through the table asmdoifreturntrycontinueautodoubleinlineshorttypedefforbooldynamic_castintsignedtypeidpublicbreakelselongsizeoftypenamethrow ...

Added by montana111 on Mon, 27 Dec 2021 20:40:07 +0200