Latest Articles

You need modules, not microservices

Architecture is sometimes hard - people keep coming up with new ideas that quickly become the mainstream "way of doing things", and with microservices being the latest trend, it's time to dissect the idea and get to the real root of what's happening. At the heart of microservices, we were ... More >>

What exactly is code neatness?

Write in frontThis article was not intended to write, until after several code review meetings, I realized that their own coding way is not systematic, still need to learn systematically, mastering the most applicable laws summed up by seniors is undoubtedly a good way. It so happens that a long tim ... More >>

Go will enhance Go1 backward compatibility!

Go1 Compatibility Guarantee In Go1, the Go Compatibility Guarantee [Go 1 and the Future of Go Programs] ,was introduced, meaning that older versions of Go programs will also work correctly in newer versions that continue with Go. Of course, there are exceptions to this, such as security iss ... More >>

The use of Https encrypted hypertext transfer protocol

Knowledge of https Introduction of https HTTPS (full name: Hypertext Transfer Protocol Secure), is a secure HTTP channel that secures the transmission process through transport encryption and authentication on top of HTTP. HTTPS adds SSL to HTTP, the secure foundation of HTTP ... More >>

What problems are solved by the features of Redis?

First, let's look at what Redis is The official profile explains that Redis is a BSD-based open source project that is a storage system t ... More >>

Towards anonymity, talk about the new authorized login for WeChat applets

In February 2021, the WeChat team made an interface adjustment for small program login and user information access, a move that unprecedentedly shook up almost all small program developers and generated a lot of reactions in the small program community. As an access party, this paper will discuss th ... More >>

Java flow limitation and common solutions

[Basic concepts of current limiting] [Common algorithms for current limiting schemes]  [Commonly Used Flow Limiting Schemes]  [Consider flow-limiting design from the architectural dimension]  ... More >>

Analysis of front-end variables to enhance var, let

Let's start with a question to warm up var a = 12, b = 13, c = 14; function fn(a) { console.log(a, b, c); var b = c = a = 20; console.log(a, b, b) } fn(a); console.log(a, b, c) What the answer is will not be published first, but first we need to kno ... More >>

There are security issues with code written this way !

JavaScript prototypes are known and used by many people, but many people use prototype inheritance in the security problems caused by few people know, next we will understand it well. In real development, we often use property accessors in our code and use user input parameters to access the ... More >>

An article to understand what is web3

web1.0 and web2.0Web 1.0 and Web 2.0 refer to the era in the history of the World Wide Web as it evolved through various technologies and formats. Web 1.0 refers roughly to the period from 1991 to 2004, when most Web sites consisted of static pages and the vast majority of users were consumers of co ... More >>