Hyperledger Fabric 2.2.1 Documentation
performance Low latency of transaction confirmation Privacy and confidentiality of transactions and data pertaining to business transactions While many early blockchain platforms are currently being adapted transaction data that they process. Every transaction, and the code that implements it, is visible to every node in the network. In this case, we have traded confidentiality of contract and data for byzantine their trade-offs. Encrypting data is one approach to providing confidentiality; however, in a permissionless network leveraging PoW for its consensus, the encrypted data is sitting on every node. Given0 码力 | 848 页 | 11.56 MB | 1 年前3gevent-socketio Documentation Release 0.3.1
tasks or actions to perform. With Socket.IO 0.6 or with normal WebSockets, you would probably encode a JSON object with one of the keys that is reserved for that (I used {"type": "submit_something"}. Socket return else: self.lift_acl_restrictions() def on_blahblahblah(self, data): """This can't be access until `lift_acl_restrictions()` has been called """ Socket method) initialize() (socketio.namespace.BaseNamespace method) J json_dumps() (socketio.virtsocket.Socket static method) json_loads() (socketio.virtsocket.Socket static method) JSONPolling (class0 码力 | 91 页 | 118.05 KB | 1 年前3Flask Documentation (1.1.x)
if the Server does not Start Debug Mode Routing Static Files Rendering Templates Accessing Request Data Redirects and Errors About Responses Sessions Message Flashing Logging Hooking in WSGI Middleware Faking Resources and Context Keeping the Context Around Accessing and Modifying Sessions Testing JSON APIs Testing CLI Commands Application Errors Error Logging Tools Error handlers Logging Debugging Application Context Purpose of the Context Lifetime of the Context Manually Push a Context Storing Data Events and Signals The Request Context Purpose of the Context Lifetime of the Context Manually Push0 码力 | 428 页 | 895.98 KB | 1 年前3Falcon v3.0.1 Documentation
Capitalizing Response Header Names Parsing Nested Multipart Forms Outputting CSV Files Prettifying JSON Responses Request ID Logging FAQ Design Philosophy Performance Routing Extensibility Request Handling Capitalizing Response Header Names Parsing Nested Multipart Forms Outputting CSV Files Prettifying JSON Responses Request ID Logging FAQ Design Philosophy Performance Routing Extensibility Request Handling HTTP_200 # This is the default status resp.content_type = falcon.MEDIA_TEXT # Default is JSON, so override resp.text = ('\nTwo things awe me most, the starry sky '0 码力 | 1058 页 | 741.59 KB | 1 年前3Falcon v3.0.0 Documentation
Capitalizing Response Header Names Parsing Nested Multipart Forms Outputting CSV Files Prettifying JSON Responses Request ID Logging FAQ Design Philosophy Performance Routing Extensibility Request Handling Capitalizing Response Header Names Parsing Nested Multipart Forms Outputting CSV Files Prettifying JSON Responses Request ID Logging FAQ Design Philosophy Performance Routing Extensibility Request Handling HTTP_200 # This is the default status resp.content_type = falcon.MEDIA_TEXT # Default is JSON, so override resp.text = ('\nTwo things awe me most, the starry sky '0 码力 | 1055 页 | 739.30 KB | 1 年前3Hyperledger Fabric 2.2.0 Documentation
performance Low latency of transaction confirmation Privacy and confidentiality of transactions and data pertaining to business transactions While many early blockchain platforms are currently being adapted transaction data that they process. Every transaction, and the code that implements it, is visible to every node in the network. In this case, we have traded confidentiality of contract and data for byzantine their trade-offs. Encrypting data is one approach to providing confidentiality; however, in a permissionless network leveraging PoW for its consensus, the encrypted data is sitting on every node. Given0 码力 | 820 页 | 10.90 MB | 1 年前3Hyperledger Fabric 2.1.1 Documentation
performance Low latency of transaction confirmation Privacy and confidentiality of transactions and data pertaining to business transactions While many early blockchain platforms are currently being adapted transaction data that they process. Every transaction, and the code that implements it, is visible to every node in the network. In this case, we have traded confidentiality of contract and data for byzantine their trade-offs. Encrypting data is one approach to providing confidentiality; however, in a permissionless network leveraging PoW for its consensus, the encrypted data is sitting on every node. Given0 码力 | 816 页 | 10.25 MB | 1 年前3Falcon v3.0.0-b2 Documentation
Capitalizing Response Header Names Parsing Nested Multipart Forms Outputting CSV Files Prettifying JSON Responses Request ID Logging FAQ Design Philosophy Performance Routing Extensibility Request Handling Capitalizing Response Header Names Parsing Nested Multipart Forms Outputting CSV Files Prettifying JSON Responses Request ID Logging FAQ Design Philosophy Performance Routing Extensibility Request Handling HTTP_200 # This is the default status resp.content_type = falcon.MEDIA_TEXT # Default is JSON, so override resp.text = ('\nTwo things awe me most, the starry sky '0 码力 | 1041 页 | 730.21 KB | 1 年前3Falcon v3.0.0-b1 Documentation
Capitalizing Response Header Names Parsing Nested Multipart Forms Outputting CSV Files Prettifying JSON Responses Request ID Logging FAQ Design Philosophy Performance Routing Extensibility Request Handling Capitalizing Response Header Names Parsing Nested Multipart Forms Outputting CSV Files Prettifying JSON Responses Request ID Logging FAQ Design Philosophy Performance Routing Extensibility Request Handling HTTP_200 # This is the default status resp.content_type = falcon.MEDIA_TEXT # Default is JSON, so override resp.text = ('\nTwo things awe me most, the starry sky '0 码力 | 1028 页 | 725.86 KB | 1 年前3Hyperledger Fabric 2.0.1 Documentation
performance Low latency of transaction confirmation Privacy and confidentiality of transactions and data pertaining to business transactions While many early blockchain platforms are currently being adapted transaction data that they process. Every transaction, and the code that implements it, is visible to every node in the network. In this case, we have traded confidentiality of contract and data for byzantine their trade-offs. Encrypting data is one approach to providing confidentiality; however, in a permissionless network leveraging PoW for its consensus, the encrypted data is sitting on every node. Given0 码力 | 760 页 | 10.21 MB | 1 年前3
共 650 条
- 1
- 2
- 3
- 4
- 5
- 6
- 65