Blog | 博客

Tech Enthusiasts Weekly (Issue 204): How to Survive Pandemic, Layoffs, and War

Here is a record of weekly tech content worth sharing, published on Friday. ( [Notice] Next Friday and Monday, the weekly magazine will be suspended once. ) This magazine is open source (GitHub: ruanyf/weekly ), welcome to submit issues, contributions or recommend scientific and technological content. Weekly discussion forum post “Who’s Hiring? “ , provides […]

Tech Enthusiasts Weekly (Issue 204): How to Survive Pandemic, Layoffs, and War Read More »

Reading Notes: “The 2022 Learning Path for DevOps”

Title: “The 2022 Learning Path for DevOps” Category: others Link: https://medium.com/faun/devops-roadmap-2022-340934d360f9 In this article, the author lists 13 skills and concepts that need to be learned and observed in 2022 based on his own observations and experiences, hoping to give everyone in the DevOps (SRE) related field a direction to improve themselves. Network Technologies The

Reading Notes: “The 2022 Learning Path for DevOps” Read More »

Weekly Sharing Issue 158

On a certain day in 2020, Beijing · Heiquan Road will be released at the same time on the website and the public account every Friday. What you have seen and gained in the past week is worth sharing. Music: Rainy Yongdong […] This article is reprinted from: https://feizhaojun.com/?p=3436 This site is for inclusion only,

Weekly Sharing Issue 158 Read More »

[Understanding Information Security 3 from Keywords] Cyber ​​Kill Chain Cyber ​​Kill Chain

Cyber ​​Kill Chain is a concept of cyber security threat chain proposed by U.S. defense contractor Lockheed Martin, that is, a successful cyber attack requires the following seven stages Continue reading on Hannah Lin » This article is reprinted from: https://medium.com/hannah-lin/%E5%BE%9E%E9%97%9C%E9%8D%B5%E5%AD%97%E8%AA%8D%E8%AD% 98%E8%B3%87%E5%AE%89-3-cyber-kill-chain-%E7%B6%B2%E8%B7%AF%E6%AE%BA%E5%82%B7%E9%8F %88-da5bfe95271a?source=rss—-b1c4573460d3—4 This site is for inclusion only, and the copyright belongs to the

[Understanding Information Security 3 from Keywords] Cyber ​​Kill Chain Cyber ​​Kill Chain Read More »

In the first quarter, the investment of US dollar funds in China fell by 70%; China pilots pension reform

In the first quarter, the investment of US dollar funds in China fell by 70% In the first quarter of various uncertainties, the scale of private equity and venture capital in China shrank significantly compared with the same period last year. According to the data of Zero2IPO Research Center, the number and amount of investment

In the first quarter, the investment of US dollar funds in China fell by 70%; China pilots pension reform Read More »

Nara Yunxia

I want to buy a camera recently. In photography, there are always a lot of equipment parties. As the saying goes, “there are too many stationery for poor students”. Taking pictures is putting the cart before the horse for many people, taking pictures of unremarkable scenery, and then trying to make the pictures look good.

Nara Yunxia Read More »

Kubelka-Munk pigment color mixing theory and mixbox source code

Paper published at SIGGRAPH Asia 2021 https://scrtwpns.com/mixbox/ Traditional RGB average mixing vs mixbox mixing The reason is that it is no problem to take the average value of optical color mixing, and many colors are mixed in the middle… This article is reproduced from: https://blog.est.im/2022/stdin-06 This site is for inclusion only, and the copyright belongs

Kubelka-Munk pigment color mixing theory and mixbox source code Read More »

Recognize the three ways Entity Framework Core loads relational data

Entity Framework Core allows you to quickly obtain “related” data through “navigation properties”, but some performance may be sacrificed behind the convenience. In the early days of Entity Framework, the “delayed loading” mechanism was enabled by default. This default Values ​​can cause many unexpected performance problems, so that the notoriety of ” Entity Framework is

Recognize the three ways Entity Framework Core loads relational data Read More »

Issue 28: ① What Is Your Worldview? – Brad Feld ② The Next Google | DKB ③ SURVEY: 85% of Shanghai Expats Rethinking Their Future in China ④ The closed life of more than 300 people and more than 5,000 animals ⑤ Will STEPN Bring Crypto to the Masses? – Almanack – Every

2022.04.21 (issue 28) What Is Your Worldview? – Brad Feld Source: feld.com Written in the front | I’m sorry, the recommended content was not sent out yesterday due to personal operation, and today I added it one by one and sent it again. Personally, I highly recommend Wan Min’s two articles, one of which is

Issue 28: ① What Is Your Worldview? – Brad Feld ② The Next Google | DKB ③ SURVEY: 85% of Shanghai Expats Rethinking Their Future in China ④ The closed life of more than 300 people and more than 5,000 animals ⑤ Will STEPN Bring Crypto to the Masses? – Almanack – Every Read More »

JavaScript natively encapsulates an Ajax data request function

Initiate network request body part function urlReques(dict){ /* 封装一个数据请求函数*/ var xhr = new XMLHttpRequest(); var qs = resolveData(dict.data); if(dict.method.toUpperCase() === “GET”){ xhr.open(dict.method,dict.url + ‘?’ + qs); xhr.send() }else if(dict.method.toUpperCase() === “POST”){ xhr.open(dict.method,dict.url); xhr.setRequestHeader(“Content-Type”,”application/x-www-form-urlencoded”); xhr.send(qs); } // 监听请求状态xhr.onreadystatechange = function(){ console.log(xhr.status) if(xhr.readyState === 4 && xhr.status === 200){ var result = JSON.parse(xhr.responseText); dict.success(result); } } }

JavaScript natively encapsulates an Ajax data request function Read More »