Latest Articles

Webpack Workflow

Both the interview and the internal implementation of webpack are important to understand, and I recently learned about it, so I’ll record my experience and hopefully help other students who are interested in learning about it! First we can break it down into several steps to make it easier to remem ... More >>

An article to read the principle of Go Http Server

Start with a Demo They say everything is hard at the beginning, but implementing an Http Server with Go is really not that hard, how easy is it? Starting a Server and responding to requests, counting package names, imported dependencies, and even empty lines, is only 15 lines of code. ... More >>

What is the interface testing process?

As we all know, interface testing is a very important part of software testing. Its main purpose is to test whether the interface of the application program can interact with other systems or components in accordance with the specification requirements, and to ensure the stability and performance of ... More >>

Introduction to Database Management System

At present, the common database management systems mainly include Oracle, MySQL, SQL Server, Mongodb, etc. Among these databases, the first three are relational databases, while Mongodb is a non-relational database. 1.OracleOracle is a relational database management system from Oracle Corporation. I ... More >>

Mobile H5 first screen second opening optimization solution

With the increasing performance of mobile devices, the performance experience of web pages gradually becomes acceptable, and because of the many benefits of web development mode (cross-platform, dynamic update, volume reduction, unlimited expansion), there are more and more embedded web pages in APP ... More >>

Redis BigKey and HotKey

1.1. Big KeyThe Redis big key problem is not actually a big Key problem, but the value corresponding to the Key is too large, so technically it is a Big Value problem, Redis value is too large (key value is too large). There is no unified standard for how large a value will cause a big key problem. ... More >>

Information leakage chaos prominent protection of information security requires concerted efforts of all parties

With the rapid development of technology, the Internet, the growing popularity of smart devices, the application of big data processing technology and cloud computing technology, the personal information data of ordinary users are more and more complete and collected by various information systems, ... More >>

What can QA do in a "de-QA" project?

For the first time, I saw the concept of “de-QA” in an article. At that time, I looked at it casually without paying more attention.The second time I saw more senior colleagues in the QA community group talking about “de-QA”. At that time, in my little head, I felt that “de-QA” is still a little dis ... More >>

Are you still using merge? Get to know rebase!

Preface Git plays a big role in managing the development branches of our development code. We usually have branches for production, pre-release, testing, and development. The normal process is development -> testing -> production, but there are usually many versions, there is a se ... More >>

How blockchain and big data work together

The combination of big data and blockchain can significantly improve the usability of each other, and these technologies can help create a hybrid infrastructure with big data and blockchain as the backbone. The infrastructure will be flexible for different application types, such as its parents - b ... More >>