SEARCH KEYWORD -- pre-order
How to check when an API is introduced in GoLang
Normally people would not pay much attention to which GoLang version is being used as lots of functions are backward compatible. However there are cases where GoLang version does matter as some functions may not be supported by old version of GoLang. For example, strings.Builder is introduced in Go 1.10, but below code would fail to be compiled on Go 1.10. package main import ( "fmt" "strings" ) func main() { var b strings.Builder b.WriteString("polarisxu") fmt.Println(b.Cap()) } The ...
GOLANG,API VERSION,GO TOOL 2021-02-07 00:43:24
4 deployment modes of Redis
As a high-performance in-memory database, Redis is widely used in current mainstream distributed architecture systems. To improve system fault tolerance, using multiple instances of Redis is also inevitable, but the complexity is much higher than that of a single instance. This article mainly introduces the four deployment modes of Redis and their advantages and disadvantages. Standalone Standalone mode is to install a Redis, start it, and business connects to it and that's all. The specific ...
REDIS,STANDALONE,MASTER-SLAVE,SENTINEL,CLUSTER 2023-03-03 21:35:09
Install and configure git plugin in Eclipse
When developing using IDE, it's always a good experience if everything can be done in the IDE including development, testing and version control. This also applies to Eclipse. In this post, we will show the process of installing and configuring git plugin in Eclipse. The pre-requisite is that you have git installed on your local machine. The detailed steps for installing and configuring git plugin are below. 1. Installing Git plugin Install using "Install New Software..." menu. ...
ECLIPSE,GITHUB,GIT PLUGIN 2018-10-13 04:22:06
Encrypting and decrypting PGP file or text on MacOS
When doing data exchange among different parties, there is a frequent need of encrypting data or file and sending it to partner and asking partner to use corresponding key to decrypt the data or file. A famous way of exchanging data is using asymmetric keys where no secret key needs to be shared. One party can just use the public key shared by partner to encrypt the data and the other party uses the private key to decrypt the data. Today, we will introduce how to use PGP to encrypt and decrypt d...
PGP,GPG,ENCRYPTION,DECRYPTION,TUTORIAL 2020-10-29 05:06:09
Why Math.min() > Math.max() is true in JavaScript
...
JAVASCRIPT,MATH.MIN(),MATH.MAX(),COMPARISON 2022-05-02 05:27:07
Certificate is invalid for localhost in Chrome
...
CHROME,LOCALHOST,HTTPS,CERTIFICATE,ELASTICSEARCH 2022-03-16 08:21:27
RECENT
- Streamlining the Project Invoicing Process: Tools and Strategies
- Performance comparison of string concatenation in Go language
- Why init() is not recommended in Go
- The Role of Coding Skills in Advancing Tech Careers
- Tips for Socializing With Friends During College
- Proximity Cards Do More Than Just Open Doors
- How to choose quality painted auto parts
- Oval engagement rings from MoonOcean: Elegance of form and individual approach
- Hologres vs AWS Redshift
- GoLand connect to Hologres
- more>>