SSH Secure Communication and Port Forwarding (I)

Bowen Reference https://segmentfault.com/a/1190000010312601 Summary The normal operation of all business is inseparable from a safe operating environment. System security is directly related to business stability, reliability and availability. This chapter introduces some topics related to system security. Basic concepts of encryption Security ...

Added by sanlove on Wed, 12 Jun 2019 03:13:12 +0300

SDWebImage 4.0.0 Source Parsing

In the development of iOS client applications, it is often necessary to download pictures from the server. Although the system provides download tools: NSData, NSURLSession and so on, there are many factors to consider in the process of downloading pictures, such as asynchronous download, image caching, error handling, coding and decoding, and ...

Added by keigowei on Wed, 12 Jun 2019 02:28:27 +0300

Hibernate Cache Mechanism

Hibernate Cache Mechanism I. Role Hibernate is a persistent layer framework that frequently accesses physical databases to improve application performance by reducing the frequency of access to physical data sources.The data in the cache is a copy of the data from the physical data source, the application reads and writes data from the cac ...

Added by dreamlove on Tue, 11 Jun 2019 19:26:30 +0300

First, what is dependency injection?

This is an article I translated from a website abroad. What is Dependency Injection? For the first time, excuse me. This article is part of a series of articles on dependency injection and PHP lightweight container implementations:Part 1: What is Dependency Injection?Part 2: Do you need a Dependency Injection Container?Part 3: Introduction to ...

Added by Buglish on Mon, 10 Jun 2019 23:23:40 +0300

Analysis of Grays Anatomy Source Code

Knowing a problem, R recommended this online search tool, and then came down to use it, feeling good, know that Java is written, go to see the source code, lack of relevant knowledge, before and after a month or so to know its general principle, record and analysis to you, the first time no previous blog can refer to see the source code, inappr ...

Added by jeffkee on Mon, 10 Jun 2019 21:57:28 +0300

Write out 23 design patterns in one breath

Creative Patterns 1. Factory Model An interface for creating objects is defined, but subclasses determine which class to instantiate. The factory method defers instantiation of the class bar to subclasses. // Product Category public interface IProduct { } public class ProductA1 implements IProduct{} public class ProductA2 implements IProduct{} ...

Added by bbauder on Mon, 10 Jun 2019 01:54:14 +0300

Simple Chat Room (express Framework) Based on Websocket

Recently, I wanted to write something interesting, so I finished this simple, not very beautiful gadget. First you have to make sure that your computer has node s, and then you can do things step by step.~~ 1. Create a folder 2. Clear the current folder address bar and enter cmd.exe in the folder address bar 3. We need to download a little some ...

Added by lucidfx on Sat, 08 Jun 2019 05:03:19 +0300

New features for MySQL 8.0: NOWAIT and SKIP LOCKED

SELECT..FOR UPDATE has been extended in MySQL version 8.0 to implement new clauses NOWAIT and SKIP LOCKED ( WL#3597 and WL #8919 ).This is a simple try and see how it works.Finally, similar functionality in AliSQL is described below test Like the literal meaning of the new syntax, NOWAIT means that an error is returned directly when a lock cann ...

Added by aboyd on Fri, 07 Jun 2019 20:01:48 +0300

Caching summary of mybatis

package com.atguigu.mybatis.test; import java.io.IOException; import java.io.InputStream; import org.apache.ibatis.io.Resources; import org.apache.ibatis.session.SqlSession; import org.apache.ibatis.session.SqlSessionFactory; import org.apache.ibatis.session.SqlSessionFactoryBuilder; import org.junit.Test; import com.atguigu.mybatis.bean.Emp ...

Added by yogadt on Tue, 04 Jun 2019 23:01:33 +0300

MySQL. Feature Analysis. Who Executed FTWL

What is FTWL FTWRL is short for FLUSH TABLES WITH READ LOCK (FTWRL). This command is mainly used to ensure backup consistency. In order to achieve this goal, it needs to close all table objects, so this command is very lethal and easy to cause hang when executing the command. If it is executed in the main library, the business cannot access it ...

Added by raouleduke on Sun, 02 Jun 2019 01:47:07 +0300