A chain building exception between jsch client and sshd server

The following exception indicates that the encryption algorithm does not meet the key size.   Find the reasons from the Internet as follows, which may be the following. This kind of error may be reported if the versions of both sides of the jdk are inconsistent. But in fact, I use the same local jdk as 1.8-u191. Take a closer look, the th ...

Added by lala on Thu, 31 Oct 2019 06:03:55 +0200

The front and back end of nginx is separated from the proxy forwarding to solve the cross domain problem

scene It is applicable to the company with front-end, and the project adopts front-end separation. Similar to the interface provided by our back-end springboot, the front-end specially writes html to call the corresponding interface to solve cross domain problems. Configuration description worker_processes 1; events { worker_connectio ...

Added by inVINCEable on Wed, 30 Oct 2019 16:46:58 +0200

Let's talk about spring cloud stream and kafka.

Spring Cloud Stream is a framework for building highly scalable event-driven microservices connected with shared messaging systems. The framework provides a flexible programming model built on already established and familiar Spring idioms and best practices, including support for persistent pub/sub semantics, consumer groups, and stateful par ...

Added by someberry on Wed, 30 Oct 2019 04:57:01 +0200

How to use Swagger to add JWT authorization documents for. NET Core 3.0 applications

brief introduction This tutorial is written in the thinking mode of WHAT-what-HOW Golden Circle. The Golden Circle principle emphasizes learning from WHY to WHAT to learn and HOW to learn. From fuzzy to clear learning mode. Everyone's time is very precious. Before we do something, we should first think about WHY we should do it and WHAT kind o ...

Added by Dethman on Wed, 30 Oct 2019 03:57:09 +0200

C ා call the DLL generated by MATLAB and multiple m files to generate a DLL

system platform win10 64bit Software version Visual Studio: VS2017 MATLAB: MATLAB R2018b Note: the version of MATLAB is not lower than VS, otherwise the call fails. Set up MATLAB external interface (1) select compiler >>mbuild -setup (2) generate DLL file Method 1: >>deploytool Select ...

Added by shorty3 on Tue, 29 Oct 2019 20:32:04 +0200

Making wheels by hand: realizing a simple dependency injection

Making wheels by hand: realizing a simple dependency injection (1) Intro In the previous article, I mainly introduced the overall design and general programming experience of dependency injection. This article will start to write code and start to implement its own dependency injection framework. Class diagram Let's review the class diagram men ...

Added by kunalk on Tue, 29 Oct 2019 19:52:02 +0200

Ribbon of Spring Cloud: load balancing

The previous one Service registration and discovery , friends who haven't read it first read the previous one, which is based on the previous one. Ribbon introduction Ribbon is a client side load balancer which gives you a lot of control over the behaviour of HTTP and TCP clients. Feign already uses Ribbon, so if you are using @FeignClient the ...

Added by sirfartalot on Tue, 29 Oct 2019 08:52:53 +0200

JAVA makes wheels - generate distributed global unique ID

Note: the content of this code comes from Internet reprint and arrangement. SnowFlake algorithm is an open-source distributed id generation algorithm of Twitter. 1. twitter's SnowFlake generation ID can be generated in order according to time 2. The result of id generated by SnowFlake algorithm is a 64 bit integer. 3. Duplicate IDS will not b ...

Added by msarefin on Tue, 29 Oct 2019 04:57:07 +0200

A detailed explanation of Spark operator

Explanation of Spark (2) operator Article directory Explanation of Spark (2) operator I. wordcount II. Programming model III. use of RDD data sets and operators 1. Three necessary operators 2. Common operators (Cartesian, cogroup, join) 3. Sorting and aggregation calculation I. wordcount B ...

Added by Cragsterboy on Mon, 28 Oct 2019 08:52:55 +0200

Extension of design pattern agent pattern

Extension of design pattern agent pattern The previous article has introduced the agent mode briefly. This article is mainly about the agent mode. I. General Agent Mode The common agent is that we need to know the existence of the agent clearly, and can only access the implementation through the agent, not directly access the real implementa ...

Added by alexjb on Mon, 28 Oct 2019 02:51:59 +0200