Latest Articles

After Front-End Deployment Releases the Project, How to Notify the User to Refresh the Page and Clear the Cache?

After Front-End Deployment Releases the Project, How to Notify the User to Refresh the Page and Clear the Cache?There are two approaches to this problem Method 1: Pure front-end Every time you package for release, use webpack to build a version.json file. The content in the file is a random string ( ... More >>

The Solution for Monitoring the Deadlock of the Main Thread

The Solution for Monitoring the Deadlock of the Main ThreadIn project development, the solution for monitoring the main thread’s lag is particularly important. It plays a guiding role in our subsequent optimization logic, so below we start to discuss the implementation of the solution for monitoring ... More >>

Penetration Testing Theory

Penetration Testing Theory1. Definition of Penetration TestingPenetration Test is a test in which personnel with information security knowledge and skills are entrusted to simulate the attack methods of malicious hackers. Usually we describe it as a method/activity that explores possible vulner ... More >>

Block Is Used for Communication between OC and C++

Block Is Used for Communication between OC and C++BackgroundIn iOS development, we often encounter the situation of mixing OC and C++, so how to communicate between then? This article will introduce how to use block for communication between oc and c++. Due to the different memory management style o ... More >>

Convolutional Neural Networks in Deep Learning

Convolutional Neural Networks in Deep LearningWhat is Convolutional Neural Network?Convolutional neural networks are a model of deep learning that mainly processes tasks such as images and videos. CNN has achieved great success in the field of computer vision, such as multi object tracking, object r ... More >>

Understanding Garbage Collection in Go

Understanding Garbage Collection in GoGarbage collection is a mechanism Go developers use to find memory space that is allocated recently but is no longer needed, hence the need to deallocate them to create a clean slate so that further allocation can be done on the same space or so that memory can ... More >>

MySQL Backups

MySQL Backups1. Why backup is necessary Disaster recovery: Hardware failures, unintentional bugs causing data damage, or servers and their data being inaccessible or unusable due to certain reasons (such as a computer room building burning down, malicious hacker attacks, or MySQL bugs). People chang ... More >>

The Use and Principle Analysis of Coroutines

The Use and Principle Analysis of Coroutines1st. Why Use CoroutinesWhether it’s the birth of a technology or a product, it often comes with demand, and coroutines are no exception. When asked why to use coroutines, the first thing to understand is, what is a coroutine? In summary, it is a lightweigh ... More >>

Analyzing Redis Bloom Filters and Their Applications in Detail

Analyzing Redis Bloom Filters and Their Applications in DetailWhat’s Bloom FilterA Bloom Filter is a clever probabilistic data structure proposed by Howard Bloom in 1970, designed to determine whether a certain element exists in a set. It can indicate with a certain probability whether something def ... More >>

Redis Master-Slave Replication Principle

1.IntroductionIn most cases, we use redis stand-alone service. In actual scenarios, single-node Redis is prone to risks. Since failover cannot be achieved, subsequent requests will be sent directly to the database. A large number of queries will cause the number of database connections to reach a pe ... More >>