Python 3 uses in to read the text from the file after opening the file
First, under python, open the file, which is an iterator object, so you can get it through in
<class '_io.TextIOWrapper'>
Note: the txt file I use here is a json file
Here you can view it through the following code:
import json
path= r"E:\tf_project\utilize python Conduct data analysis--data\ch02\usagov_bitly_data ...
Added by disconne on Mon, 23 Dec 2019 00:44:08 +0200
Install and configure Nginx under CentOS 7 to support pseudo static (including all codes)
Install and configure Nginx under CentOS 7 to support pseudo static
It is a difficult problem for novices to install and configure Nginx under Linux to support pseudo-static state. They often encounter 404 and other errors. Configuration and debugging is a waste of time. Sometimes they feel that they can't start. Online materi ...
Added by fragger on Sun, 22 Dec 2019 17:31:22 +0200
docker deployment LNMP environment
The first step is to confirm that there are tar packages needed in your environment, and you can use [docker pull]() to download these images
Now we're using a downloaded image, so we need to import it
[root@docker01 ~]# docker load -i nginx.tar && docker load -i wordpress.tar && docker load -i mysql-5.7.tar && docke ...
Added by Havery Jay on Fri, 20 Dec 2019 22:21:35 +0200
WordPress is unable to update the solution
When WordPress installs plug-ins or updates, it will prompt that the directory creation fails
Enter the WordPress working directory, use the ls-l command to view the file details in the WordPress working directory, and you can see the working group.
[root@host wordpress]# ls -l
total 196
-rw-r--r-- 1 root root 418 Oct 9 10:3 ...
Added by forzatio on Wed, 18 Dec 2019 17:28:28 +0200
Display the system logs in the database through the log analyzer
catalog
Displaying logs in database through log analyzer
Environmental preparation
Prepare server:
Log server:
Database server:
Test whether the log server and database are connected:
websrv server:
Displaying logs in database through log analyzer
Environmental ...
Added by blkrt10 on Tue, 17 Dec 2019 15:43:39 +0200
PHP for a simple data collection
Introduction
When it comes to data collection, python comes to mind first. The code is simple, efficient and easy to implement.
How does PHP implement data collection?It's simple.
concept
What is data collection?Below is the introduction of Baidu Encyclopedia:
Data collection, also known as Data Acquisition Is an interface that uses a device to ...
Added by agnalleo on Sun, 15 Dec 2019 08:00:42 +0200
How to solve the problem of OpenSSL? Pkey? Export(): cannot get key from parameter 1 in windows system
In order to solve this problem, I Baidu many methods, but many methods have no effect.
Method 1:
If you are installing phpstudy, then
1. You need to go to php extension to open the extension.
2. Go to php.ini and remove the ";" before "extension=php_openssl.dll". If not, add extension=php_openssl.dll.
3. Copy libeay32.dll ...
Added by Aretai on Sat, 14 Dec 2019 17:33:49 +0200
Laravel Composer automatic loading mechanism
outline
PHP autoloading function 1.1 Origin of PHP autoloading function 1.2 PHP autoload function u autoload() Problems with 1.3 u autoload() Function 1.4 SPL Autoload
PSR Specification
The automatic loading process of comoposer
composer source analysis 4.1 Startup 4.2 Composer autoload file
1, PHP autoloading function
1.1 Origin o ...
Added by Dolemite50 on Sat, 14 Dec 2019 10:54:58 +0200
Challenge the routine -- why shouldn't Jsonp be used for cross domain
General cross domain approach
Common cross domain methods include:
Add access control allow origin
Background server agent
Jsonp
1. 2. Both methods are safe and reliable. 3. They are not safe and reliable
The essence of Json
The essence of Json is to reference and execute external JavaScript script. The principle is that the < script > ...
Added by txhoyt on Thu, 12 Dec 2019 21:37:27 +0200
PHP DES-ECB encryption docking Java decryption
Recently, the company has a business that needs to connect to the third-party interface, but the parameters need to be encrypted. The other side only provides a java demo and searches all over the Internet. No direct method can be found. Later, it was connected with the company's Android Engineer. Here's a record of the general process. First, ...
Added by tcorbeil on Wed, 11 Dec 2019 23:00:29 +0200