A chain building exception between jsch client and sshd server
The following exception indicates that the encryption algorithm does not meet the key size.
Find the reasons from the Internet as follows, which may be the following. This kind of error may be reported if the versions of both sides of the jdk are inconsistent. But in fact, I use the same local jdk as 1.8-u191. Take a closer look, the th ...
Added by lala on Thu, 31 Oct 2019 06:03:55 +0200
The front and back end of nginx is separated from the proxy forwarding to solve the cross domain problem
scene
It is applicable to the company with front-end, and the project adopts front-end separation. Similar to the interface provided by our back-end springboot, the front-end specially writes html to call the corresponding interface to solve cross domain problems.
Configuration description
worker_processes 1;
events {
worker_connectio ...
Added by inVINCEable on Wed, 30 Oct 2019 16:46:58 +0200
Let's talk about spring cloud stream and kafka.
Spring Cloud Stream is a framework for building highly scalable event-driven microservices connected with shared messaging systems.
The framework provides a flexible programming model built on already established and familiar Spring idioms and best practices, including support for persistent pub/sub semantics, consumer groups, and stateful par ...
Added by someberry on Wed, 30 Oct 2019 04:57:01 +0200
How to use Swagger to add JWT authorization documents for. NET Core 3.0 applications
brief introduction
This tutorial is written in the thinking mode of WHAT-what-HOW Golden Circle. The Golden Circle principle emphasizes learning from WHY to WHAT to learn and HOW to learn. From fuzzy to clear learning mode. Everyone's time is very precious. Before we do something, we should first think about WHY we should do it and WHAT kind o ...
Added by Dethman on Wed, 30 Oct 2019 03:57:09 +0200
C ා call the DLL generated by MATLAB and multiple m files to generate a DLL
system platform
win10 64bit
Software version
Visual Studio: VS2017
MATLAB: MATLAB R2018b
Note: the version of MATLAB is not lower than VS, otherwise the call fails.
Set up MATLAB external interface
(1) select compiler
>>mbuild -setup
(2) generate DLL file
Method 1:
>>deploytool
Select ...
Added by shorty3 on Tue, 29 Oct 2019 20:32:04 +0200
Making wheels by hand: realizing a simple dependency injection
Making wheels by hand: realizing a simple dependency injection (1)
Intro
In the previous article, I mainly introduced the overall design and general programming experience of dependency injection. This article will start to write code and start to implement its own dependency injection framework.
Class diagram
Let's review the class diagram men ...
Added by kunalk on Tue, 29 Oct 2019 19:52:02 +0200
Ribbon of Spring Cloud: load balancing
The previous one Service registration and discovery , friends who haven't read it first read the previous one, which is based on the previous one.
Ribbon introduction
Ribbon is a client side load balancer which gives you a lot of control over the behaviour of HTTP and TCP clients. Feign already uses Ribbon, so if you are using @FeignClient the ...
Added by sirfartalot on Tue, 29 Oct 2019 08:52:53 +0200
JAVA makes wheels - generate distributed global unique ID
Note: the content of this code comes from Internet reprint and arrangement.
SnowFlake algorithm is an open-source distributed id generation algorithm of Twitter.
1. twitter's SnowFlake generation ID can be generated in order according to time 2. The result of id generated by SnowFlake algorithm is a 64 bit integer. 3. Duplicate IDS will not b ...
Added by msarefin on Tue, 29 Oct 2019 04:57:07 +0200
A detailed explanation of Spark operator
Explanation of Spark (2) operator
Article directory
Explanation of Spark (2) operator
I. wordcount
II. Programming model
III. use of RDD data sets and operators
1. Three necessary operators
2. Common operators (Cartesian, cogroup, join)
3. Sorting and aggregation calculation
I. wordcount
B ...
Added by Cragsterboy on Mon, 28 Oct 2019 08:52:55 +0200
Extension of design pattern agent pattern
Extension of design pattern agent pattern
The previous article has introduced the agent mode briefly. This article is mainly about the agent mode.
I. General Agent Mode
The common agent is that we need to know the existence of the agent clearly, and can only access the implementation through the agent, not directly access the real implementa ...
Added by alexjb on Mon, 28 Oct 2019 02:51:59 +0200