C ා basic part - entrustment

preface In this chapter, I mainly use this series of C basic chapters to sort out the past study notes, summarize and understand more thoroughly. In. Net development, we often encounter and use delegation. If you can master and use it flexibly, you will be able to easily in programming. Then for many developers who have not been exposed to C fo ...

Added by Slippy on Sun, 07 Jun 2020 12:04:04 +0300

Responsibility chain model of behavior model

1 General Chain of responsibility pattern is a common behavior pattern. It encapsulates the processor into a processing chain, so that the request can be delivered on the chain. The processor on the chain decides whether to process the request or not. 2 responsibility chain mode A typical usage scenario of responsibility chain mode is when an e ...

Added by Nymphetamine on Sat, 06 Jun 2020 13:17:26 +0300

Talk about puma's DefaultTaskExecutor

order This paper focuses on puma's DefaultTaskExecutor TaskExecutor puma/puma/src/main/java/com/dianping/puma/taskexecutor/TaskExecutor.java public interface TaskExecutor extends LifeCycle { boolean isStop(); boolean isMerging(); void stopUntil(long timestamp); void cancelStopUntil(); void setContext(PumaContext context ...

Added by tsg on Wed, 03 Jun 2020 19:14:37 +0300

Inner class and static inner class in Java

Static inner class in Java: add the static modifier before the defined inner class. At this time, the inner class is the static inner class. Through an example to understand the characteristics of static inner classes. public class Outer { //Define an instance variable and a static variable private int a; private static int b; ...

Added by danlayton00 on Mon, 01 Jun 2020 17:15:53 +0300

Mouse and keyboard operation events

Mouse events Mouse events are included in the ActionChains class. When importing, you only need to: from selenium.webdriver.common.action_chains import ActionChains Import the class to: Common methods are: context_click() -- right click double_click() -- double click drag_ and_ Drop - drag move_to_element() -- mouse over an element cl ...

Added by snipesh0tz on Mon, 01 Jun 2020 04:12:15 +0300

Basic part of C - generics

preface In the development of programming, we often encounter functional modules with very similar functions, but the data they process is different, so we will use multiple methods to deal with different data types. But at this time, we will wonder if there is any way to use the same method to pass different types of parameters? At this time, ...

Added by Xasho on Sun, 31 May 2020 15:26:17 +0300

Visitor mode of behavior mode

1 General Visitor pattern is a behavior pattern, which is not commonly used. It can separate the algorithmic logic acting on the object from the object itself. 2 visitor mode When we need to operate on a group of similar types of objects, we can maintain the operation logic within each object separately, but this violates the principle of singl ...

Added by riyaz123 on Sun, 31 May 2020 12:54:46 +0300

An interpretation of Python decorator

Copyright notice: This is the original article of Colin Cai, welcome to post. If you want to transfer, you must indicate the original website   http://www.cnblogs.com/Colin-Cai/p/12977127.html Author: Windows QQ / wechat: 6679072   E-mail: 6679072@qq.com In theory, function is the first class function language, which can use function ...

Added by William on Sun, 31 May 2020 10:45:35 +0300

Talk programming - bridge mode

Bridge Pattern Separate the abstract part from its implementation part so that they can all change independently. motivation When an abstraction can have multiple implementations, inheritance is usually used to coordinate them. Abstract classes define the interface of the object, while concrete subclasses are implemented in different ways. B ...

Added by Loki on Sat, 30 May 2020 18:36:09 +0300

Istio traffic hijacking process

Opening The article about Istio traffic hijacking can be found in a very detailed article in the servicemesher community at present. You can refer to: Sidecar injection and transparent traffic hijacking in Istio . In particular, the "traffic hijacking diagram" collated by the blogger can clearly see the hijacking process. Here I use ...

Added by river001 on Fri, 29 May 2020 09:27:35 +0300