The third weekly report of IOS development training
The development of the project starts this week. At present, the team plans to complete the front-end development together. The part I am responsible for is the personal page. When it comes to loading personal information, it is necess ...
Posted on Wed, 29 Jan 2020 07:48:31 -0800 by ryansmith44
Profile data download link
Using Python+Selenium to call wget to download data
Using Python+Selenium to call IDM to download data
LAADS(https://ladsweb.modaps.eosdis.nasa.gov/ )It's a NASA data distribution website. On t ...
Posted on Wed, 29 Jan 2020 02:30:17 -0800 by Dax
2.1 constructor overload
2.2 call the constructor manually
2.3 develop array class to solve the security problem of native array
3 copy constructor
3.1 deep copy and shallow copy
3.2 when do I need a deep copy?
3.3 improvement of array class
Posted on Tue, 28 Jan 2020 23:25:02 -0800 by Noctagon
Crawlers, one of the biggest threats to network security!
According to the crawl data type, there are many kinds of crawlers, such as crawling Email addresses, crawling commodity prices, crawling pictures, and the most crawled content, content data crawlers are flooded!
Many people are deeply distr ...
Posted on Tue, 28 Jan 2020 18:49:33 -0800 by intenseone345
TCP communication program
Simple TCP network program
TCP communication analysis diagram
Client sends data to server
Server writes back data to client
File upload case
File upload analysis diagram
Posted on Mon, 27 Jan 2020 02:26:47 -0800 by munkee
These days, due to the outbreak of new coronavirus, the number of new confirmed cases every day surprised me to get up in the morning! In order to contribute to the society, we can stay at home and go out less even during the Spring Festival. Major IT enterprises have donated money and ...
Posted on Sun, 26 Jan 2020 21:31:29 -0800 by ollmorris
The purpose of this article is to summarize backups and facilitate future inquiries. As a personal summary, if there are any errors, you are welcome to make corrections. In addition, most of the content comes from the network, books, and various manuals. If infringement occurs, please i ...
Posted on Sun, 26 Jan 2020 20:15:09 -0800 by clarky08
Title Linkmeaning of the title
Find the maximum sum of all paths for which the three rules meet the criteria.thinking
The most important problem of network flow is mapping.
1. Paths do not intersect, that is, a number can only be used once, that is, split points, each point into entry and exit points, a ...
Posted on Sun, 26 Jan 2020 20:00:19 -0800 by ohaus
Say something first
What is an object pool
Object pool in CBE
Say something first
Writing the first CBE Source Blog: Role Account Login and Management When I noticed that the CBE was full of objects such as _g_objPool, it was obvious that it ...
Posted on Sun, 26 Jan 2020 19:48:32 -0800 by vickie
I. what is Ajax
AJAX is not a new programming language, but a technology for creating better, faster, and more interactive Web applications.
It is a set of browser side web development technology which integrates many technologies.
Posted on Sun, 26 Jan 2020 09:07:48 -0800 by petromanian