Summarize django knowledge points

1. View functions: Request Object------------- request: 1,HttpRequest.body:) Request original data 2,HttpRequest.path:) A string representing the requested path component (without domain name)           3,HttpRequest.method             4,HttpRequest.GET           5,HttpRequest.POST           6,HttpRequest.FILES 7,HttpResquest.user:) An AUTH_U ...

Added by simon71 on Sun, 19 Jul 2020 17:54:28 +0300

Beego Learning Notes 6: Paging Implementation

Implement Paging 1> Business logic for paging implementation 1->N data are displayed on each page. For the total number of data records M, the number of pages M%N==0?M/N:M/N+1; 2->Page Rendering Paging html Part 3>Switch pages, input parameters, background processing, and retrieve new eligible data 4>Paging method, js paging, and ...

Added by whare on Sun, 19 Jul 2020 17:37:26 +0300

Physical Reserve ORA 01274 Problem Handling

My physical standby failed to start and terminate MRP due to ora 01274 problem.This problem is very simple to handle, but Baidu almost took me to the pit after searching an article, so I wrote down the standard steps of MOS for your friends to refer to. This DG environment was built two weeks ago and needs to be officially switched today.Befor ...

Added by chiefmonkey on Sat, 18 Jul 2020 18:39:03 +0300

Solution with empty list in foreach tag in Mybatis

In the previous article Optimizing Mybatis in-query through interceptor Interceptor In, we have resolved the case of an empty in() list in the mybatis query. However, because the list in the foreach tag is empty, not only is an in() empty list, but another common situation occurs when data is inserted in batches, as follows: INSERT INTO table1( ...

Added by noirsith on Mon, 13 Jul 2020 18:31:17 +0300

Three ways of querying hibernate

There are three main query modes common to hibernate: HQL, QBC (named query), and using native SQL query (SqlQuery) HQL Query * HQL (Hibernate Query Language) provides a rich and flexible way of querying, and using HQL for querying is also Hibernate's official recommended way of querying. * HQL is very similar in syntax structure to ...

Added by schoi on Fri, 10 Jul 2020 18:19:06 +0300

mybatis Series IV: Dynamic SQL

Dynamic SQL is a powerful feature of MyBatis.When using JDBC to manipulate data, concatenating conditions into SQL strings can be painful if there are too many query conditions. The usual solution is to write a lot of if-else conditional statements and strings to concatenate, and make sure you don't forget spaces or omit commas at the end of fi ...

Added by jaikar on Tue, 07 Jul 2020 18:08:09 +0300

With all due respect, you may not be able to use java Part 7: sorting collections like SQL

Before I start, let me ask you a question: we now have an Employee class. @Data @AllArgsConstructor public class Employee { private Integer id; private Integer age; //Age private String gender; //Gender private String firstName; private String lastName; } Do you know how to sort a List set of Employee objects in reverse or ...

Added by mjh513 on Sun, 28 Jun 2020 03:41:37 +0300

Five minute experience of distributed transaction framework Seata

seata is an open source distributed transaction solution dedicated to providing high-performance and easy-to-use distributed transaction services. seata will provide users with AT, TCC, SAGA and XA transaction modes, and build a one-stop distributed solution for users. The purpose of this tutorial is to provide a quick start to the case of seat ...

Added by Cogen on Thu, 25 Jun 2020 07:25:46 +0300

DB2 database varchar field to int field problem

Paste my code first: SELECT BELONG_INSTN_COD AS DEPT_ID, SUM(BALANCE) AS BAL, CASE WHEN length(CERT_ID) = 15 THEN '19' || SUBSTR(CERT_ID, 7, 6) ELSE SUBSTR(CERT_ID, 7, 8) END AS BIRTH_DATE, CASE WHEN length(CERT_ID) = 15 THEN SUBSTR(CERT_ID, 9, 2) ELSE SUBSTR(CERT_ID, 11, 2) END AS MM, CASE WHEN length(CERT_ID) = 15 THEN SUBSTR(CERT_ID ...

Added by sharpnova on Sun, 21 Jun 2020 19:12:14 +0300

Hacker attack and defense of station B [network security] - record

cc attack: for applications, such as malicious swipe verification code DDoS attack: for servers, such as a large number of http requests, malicious access with large traffic Note source station B video (Knowledge Area > wild Technology Association)Hacker attack and defense: from entry to access to y ...

Added by FoxhoundX on Sun, 21 Jun 2020 12:11:09 +0300