Ajax Principle & Basic Case

An Analysis of the Basic Principles of Ajax Basic concepts Asynchronous Javascript and XML. A technique for creating fast dynamic Web pages with minimal exchange with the server to update the pages Common Cases Search page displays search results without refreshing Registration page prompts for availability of items Tmall Sho ...

Added by bobdabuilder on Mon, 20 Jul 2020 19:16:36 +0300

fetch pass-by instance code (back-end PHP)

FormData Passes Free Format Data to Backend The first is the js code: let formData=new FormData(); let headres = { method: 'post', credentials: 'include', headers: {}, body: formData } fetch("The address of your backend",headres) .then((respon ...

Added by sgalonska on Fri, 17 Jul 2020 17:48:21 +0300

The back-end data loaded by the select component of jqWEUI is items

jqweui I don't know how many people have used it. I often use it to develop webapps Its select component is more often used, but this time I need to get the selected items data from the database instead of writing the page dead After thinking about it for a while, I finally came up with a method, which is also effecti ...

Added by EZbb on Tue, 07 Jul 2020 19:01:00 +0300

WeChat Public Number Development (2) Acquire AccessToken, jsapi_ticket

Access Token Access Token plays an important role in the development of WeChat public platform interface, which is equivalent to the key to access various interfaces. Only by getting this key can we call other special interfaces. access_token is the globally unique ticket for the public number, which calls each interf ...

Added by bschwarz on Sat, 04 Jul 2020 19:15:58 +0300

Analysis on the speed of inserting a large amount of data into MongoDB database

Requirement background: a certain timing task generates thousands or more JSON data. This data has not been fully written into the database, and the data of the next scheduled task has been generated. How to solve the data congestion caused by this? When spring boot is used to insert data into MongoDB database, the save method in MongoTempla ...

Added by ghettopixel on Tue, 30 Jun 2020 19:43:06 +0300

One article completes Spring Security exception handling mechanism!

Today, let's talk about the exception handling mechanism in Spring Security. In Spring Security's filter chain, the ExceptionTranslationFilter filter is specially used to handle exceptions. In the ExceptionTranslationFilter, we can see that exceptions are divided into two categories: authentication exceptions and authorization exceptions. The t ...

Added by trazan on Tue, 30 Jun 2020 05:57:58 +0300

Spring source code third bullet! What the hell is EntityResolver?

Last article I talked with my friends about the parsing process of XML files in Spring source code. I could have continued to look down to load core classes, but SongGe still hopes to be a little slower. Since I have to learn to understand, I can learn from XML There are also some other classes and concepts involved in the process of file parsi ...

Added by ureck on Mon, 29 Jun 2020 05:02:29 +0300

[big data application technology] task 8: reptile integrated task

All requirements of this time come from: https://edu.cnblogs.com/campus/gzcc/GZCC-16SE2/homework/3075 preface This job is to crawl the information about python's relevant positions on the pull hook network. Through crawling the data such as position id, city, full name of the company, welfare treatment, work place, education requirements, wor ...

Added by jblallement on Sat, 27 Jun 2020 09:09:45 +0300

Alipay app payment server access (certificate mode)

Alipay has paid a lot of access documents. Because of the key configuration error, it has been returning to the 4000 error code for a half afternoon. The overall development flow chart is as follows: 1. First create the APP and sign the APP payment capability Official documents: Preparation befo ...

Added by dujed on Sat, 27 Jun 2020 08:18:19 +0300

How to Design a Privilege Authorization Service in Microservices

Role-based access control (RBAC) One way to restrict system access to authorized users is to define policy-independent access control mechanisms around roles and privileges, and the components of RBAC make it easy to perform user assignments. Within the organization, various jobs will be created role .Permissions to perform certain actions ha ...

Added by fordyh on Fri, 26 Jun 2020 04:14:55 +0300