Optimize. Net MVC to access pages slowly

Make a good ASP.NET MVC website, access speed is very slow, it takes several seconds to tens of seconds to display the page. Every dozens of minutes will occur such a situation. Below to share the optimization method.   The development environment is: VS2015 + IIS8+ SQL Server Deployment environment: Windows 2008 R2+ IIS7+ SQL Server   Set IIS ...

Added by Yesideez on Thu, 13 Jun 2019 21:18:44 +0300

Crawlers - GET and POST requests

urllib.parse.urlencode() and urllib.parse.unquote() Encoding uses the urlencode() function of urllib.parse to help us convert key:value pairs into strings like "key=value". Decoding uses urllib's unquote() function. # Test results in Python 3.5 console >>> import urllib >>> word = {"wd":"Reptiles"} # By using the ...

Added by phpform08 on Wed, 12 Jun 2019 19:53:44 +0300

SSH Secure Communication and Port Forwarding (I)

Bowen Reference https://segmentfault.com/a/1190000010312601 Summary The normal operation of all business is inseparable from a safe operating environment. System security is directly related to business stability, reliability and availability. This chapter introduces some topics related to system security. Basic concepts of encryption Security ...

Added by sanlove on Wed, 12 Jun 2019 03:13:12 +0300

Crawler-json module and jsonpath module

JSON (JavaScript Object Notation) is a lightweight data exchange format, which makes it easy for people to read and write. At the same time, it also facilitates the analysis and generation of the machine. It is suitable for data interaction scenarios, such as data interaction between the front desk and the back desk of a website. JSON is compar ...

Added by badapple on Wed, 12 Jun 2019 00:59:47 +0300

Usage of LitePal Open Source Library

Preface LitePal is an open source Android library that makes it easy for developers to use the SQLite database. You can do most database operations without even writing SQL statements, including creating or upgrading tables, compressing operations, aggregation functions, etc. LitePal is also easy to set up, and you can integrate it into your ...

Added by lemin on Tue, 11 Jun 2019 21:50:39 +0300

ssl protocol and open source implementation of openssl

ssl protocol Secure Socket Layer: Secure Socket Layer, ssl is a set of security protocols, which are called by application layer. When http calls ssl protocol, it is called https. When ftp calls ssl protocol, it is called sftp. lls is a collection of protocols, including: Handshake protocol: including negotiating security parameters and pas ...

Added by myflashstore on Tue, 11 Jun 2019 03:01:04 +0300

Sliding Method for Analyzing Six Common View s

> View sliding is the basis for Android to implement custom controls. There are many ways to realize View sliding. Here we mainly explain six sliding methods, namely layout(), offsetLeft AndRight (), offsetTop AndBottom (), Layout Params, animation, scollTo and scollBy, and Scroller.View sliding is the basis for Android to implement custom c ...

Added by danmon on Sun, 09 Jun 2019 02:33:33 +0300

Teng Xun's Written Test Programming in Autumn 2017

First, Assuming that the encoding range of a code is 25 letters of a ~ y, encoding from one bit to four bits, if we sort the encoding in dictionary order, we can form an array as follows: a, aa, a aaa, aaab, aaac,... b, ba, baa, baaa, baab, baac... yyyw, yyyx, yyyy where Index of a is 0, Index of AA is 1, Index of AAA is 2, and so on. Wr ...

Added by meshi on Sun, 09 Jun 2019 01:50:12 +0300

Recycler View of Android Learning

Summary RecyclerView, which provides a plug-in experience, highly decoupled, exceptionally flexible, achieves various effects by setting up its different Layout Manager, ItemDecoration, and ItemAnimator To control its display, use Layout Manager, the layout manager To control the interval between Items (plottable), use ItemDecoration To con ...

Added by scott212 on Sat, 08 Jun 2019 23:03:19 +0300

Massive Data, Smlar-Aliyun RDS PosgreSQL Best Practice

Label PostgreSQL, Heming Distance, Smlar, GiST Index background http://www.cnblogs.com/lushilin/p/6549665.html Application of SimHash Through the above steps, we can use SimHash algorithm to generate a vector fingerprint for each web page, so the question arises, how to judge the similarity of two texts? This is mainly applied to Heming di ...

Added by knashash on Sat, 08 Jun 2019 04:38:33 +0300