21, Spring cloud Alibaba Nacos service registration and configuration center

Spring cloud Alibaba Nacos service registration and configuration center About Nacos Why Nacos The first four letters are Naming and Configuration, and the last s is Service What is it? A dynamic service discovery, configuration management and service management center easier to build cloud nat ...

Added by luckybob on Thu, 11 Jun 2020 06:08:17 +0300

Recommend a lightweight but efficient open source windows hotkey scripting language Autohotkey

Words written in the front Autohotkey is a lightweight, small but efficient, free and open source windows hotkey scripting language. Game manipulation, mouse operation, keyboard shortcut redefinition, shortcut phrases, etc. only you can't think of it, but you can't do it without it. The artifact in artifact is too late to meet. install Download ...

Added by mikeylikesyou on Tue, 09 Jun 2020 10:12:22 +0300

[natural language processing] text information extractor CNN

Main content of this paper This paper briefly introduces the process of processing text information by convolutional neural network (CNN) Use CNN for text classification and comment the code Article code[ https://github.com/540117253/Chinese-Text-Classification ] 1, CNN overview Figure 1 CNN te ...

Added by nitm on Tue, 09 Jun 2020 06:21:37 +0300

dotNET Core 3.X uses Autofac to enhance dependency injection

In the last article dotNET Core 3.X Dependent Injection The dependency injection function of the dotNET Core framework itself is briefly described in this article. In most cases, it can be satisfied by using the dependency injection function of the framework. In some special scenarios, we need to introduce a third-party injection framework. W ...

Added by techjosh on Tue, 09 Jun 2020 03:55:52 +0300

Simple and detailed harbor build

preparation in advance Offline package download: https://github.com/goharbor/h... Select 572MB tgz Hearing that 1.7.6 seems to have a bug, for insurance reasons, I choose 1.8.5 Note minimum installation requirements Installation steps Install docker, configure the source below, and install a specific version of docker (reference documentati ...

Added by rodin on Sun, 07 Jun 2020 04:23:22 +0300

Simple use of redis distributed lock

RedisLock -- make Redis distributed lock simple catalog 1. Project introduction 2. Fast use 2.1 introducing maven coordinates 2.2 register RedisLock 2.3 use 3. Participation and contribution 4. Contact the author 5. Open source protocol 1. Project introduction This project mainly simplifies the operation of redis distributed transact ...

Added by work_it_work on Sat, 06 Jun 2020 05:57:21 +0300

SpringSecurity - Authentication + Authorization Code Implementation

Authentication + Authorization Code Implementation Spring Security is a security framework based on Spring AOP and Servlet filters.It provides a comprehensive security solution while handling authentication and authorization at the Web request and method call levels. Previously, I blogged about the theory of authentication and authorization ...

Added by john_nyc on Thu, 04 Jun 2020 04:08:57 +0300

Resource release of Redis

Write in front    see GitHub for all sample codes in this tutorial: https://github.com/selfconzrr/Redis_Learning Why close the connection? For example, the following code: for(int i = 2000; i < 3000; i++) { Jedis jedis = redisDao.getJedis(); jedis.set("user:" + i, jedis.toString()); System.o ...

Added by André D on Mon, 01 Jun 2020 20:42:26 +0300

Asp.Net MVC based on Fleck's development of multi person web chat room

1, Core description of the project 1. Fleck is a relatively simple third-party component to implement websocket, which does not need to install additional containers. There are also several interfaces available. 2. The project is based on. net framework 4.7.2, developed on vs2019, and has not tried to run on the lower version. However, the new ...

Added by will_1990 on Sun, 31 May 2020 14:21:09 +0300

Visitor mode of behavior mode

1 General Visitor pattern is a behavior pattern, which is not commonly used. It can separate the algorithmic logic acting on the object from the object itself. 2 visitor mode When we need to operate on a group of similar types of objects, we can maintain the operation logic within each object separately, but this violates the principle of singl ...

Added by riyaz123 on Sun, 31 May 2020 12:54:46 +0300