Google will publish their work in improving the WEB application response time in the ACM CONEXT meeting in December this year, using three handshakes “TCP […]
Read moreMonth: February 2022
Java anti-sequence vulnerability is neglected by large-scale killing utilization
A hot-fried Java anti-sequence loophochy, everyone appeared in a very important thing, it is very important in the design of Java in the design of […]
Read moreResource file conversion problem
We encountered some bugs in the work above the game engine last week, involving some of the designs issues. Maintain a solution for this problem […]
Read moreWordPress Security Suggestions
This is an translation, but not a pure crushed translation. The original text comes here, I would like to use this document to children’s shoes […]
Read moreTCP Keep-Alive & Connection Pool
To understand TCP Keep-Alive / Persistent Connection, you have to start from the TCP protocol. TCP Flow: _____ _____ | | | | | | […]
Read morePregnant front-end intelligence
Although the contact recommendation algorithm is 2009, the first set of artificial intelligence teams is at the end of 2014. Experienced the application issuance, advertising, […]
Read moreCoroutine in Skynet
Skynet is essentially a message distributor, serving a single service, can send a message from any service to another from any service. On this basis, […]
Read moreShare Internet access using Wireless Self-Network
In this Internet already penetrates every corner, GUCAS’s network access charge is very uncomfortable: (more than two grades) 25 yuan per month, including 5G domestic […]
Read moreNSLOOKUP bridge leading to DNS
[NSLOOKUP? ¡¿ The nslookup command is a very common network command in Linux, in short, “check DNS information”. You can see the official explanation of […]
Read more