今天需要使用新浪微博提供的API获取微博的详细信息以及用户的详细信息,所以需要使用API中的/statuses/show接口。 使用新浪微博API的前提是需要到新浪微博开放平台注册一个应用,获得App Key和App Secret,然后再根据这两个获取Access Token。下面详细介绍如
今天需要使用新浪微博提供的API获取微博的详细信息以及用户的详细信息,所以需要使用API中的/statuses/show接口。
使用新浪微博API的前提是需要到新浪微博开放平台注册一个应用,获得App Key和App Secret,然后再根据这两个获取Access Token。下面详细介绍如何获取Access Token以及如何使用新浪微博提供的API。
一、获取Access Token
1、进入新浪微博开放平台,进入应用开发,选择创建应用,这里我选择的是“网页应用”
2、填写应用的基本信息
可以随便填写,点击“创建”,就可以创建成功!
创建成功后,可以查看应用的信息。主要需要的是App Key和App Secret。
3、添加授权回调页
选择刚刚创建的应用,进入到应用信息,选择高级信息,添加授权回调页。
这个一定要添加,如果没有授权回调页,是无法获取到Access Token 的,而且必须保证回调页的网址时可以访问的。
4、获取新浪微博SDK包
在新浪微博开放平台,选择文档->资源下载->SDK下载,我选择Java SDK的版本。下载完成后,解压缩,将项目导入到Eclipse中。
可以查看一下文档:readme.txt,内容为:
[plain] view plaincopyprint?
- 请先填写相关配置:在Config.properties里
- client_ID :appkey
- client_SERCRET :app_secret
- redirect_URI : 回调地址
5、配置SDK开发包
打开Config.properties文件(在src目录下)
[plain] view plaincopyprint?
- client_ID =
- client_SERCRET =
- redirect_URI =
- baseURL=https://api.weibo.com/2/
- accessTokenURL=https://api.weibo.com/oauth2/access_token
- authorizeURL=https://api.weibo.com/oauth2/authorize
- rmURL=https://rm.api.weibo.com/2/
6、获取Access Token
打开example资源文件夹下,weibo4j.examples.oauth2文件夹下的OAuth4Code.java
将代码:
[plain] view plaincopyprint?
- BareBonesBrowserLaunch.openURL(oauth.authorize("code",args[1],args[2]));
- System.out.println(oauth.authorize("code",args[1],args[2]));
[plain] view plaincopyprint?
- BareBonesBrowserLaunch.openURL(oauth.authorize("code","",""));
- System.out.println(oauth.authorize("code","", ""));
然后选择run as Java Application,打开了浏览器,即打开的是你填写的回调地址,注意查看此时的url,最后一部分是code=XXXXXXXXXXXXXXXXXXXXX。复制这个code的值。查看Eclipse的控制台窗口:
输入刚刚获得的code值,点击回车。
这时已经获得了access_token值和uid的值,现在你就可以使用access_token来运行example中的程序了。注意,access_token的值有一定的时效性,access_token失效后需要重新申请一下,即重复第6步,每次access_token的值是不会改变的。
二、运行example实例程序
我选择的是weibo4j.examples.timeline中的ShowStatus.java。将access_token换成刚才得到的值,id指的是微博的ID,运行,即可得到有关微博的信息以及用户的信息。
其他的程序也是相同的道理。
http://blog.csdn.net/xyw_eliot/article/details/8907918

MySQL index cardinality has a significant impact on query performance: 1. High cardinality index can more effectively narrow the data range and improve query efficiency; 2. Low cardinality index may lead to full table scanning and reduce query performance; 3. In joint index, high cardinality sequences should be placed in front to optimize query.

The MySQL learning path includes basic knowledge, core concepts, usage examples, and optimization techniques. 1) Understand basic concepts such as tables, rows, columns, and SQL queries. 2) Learn the definition, working principles and advantages of MySQL. 3) Master basic CRUD operations and advanced usage, such as indexes and stored procedures. 4) Familiar with common error debugging and performance optimization suggestions, such as rational use of indexes and optimization queries. Through these steps, you will have a full grasp of the use and optimization of MySQL.

MySQL's real-world applications include basic database design and complex query optimization. 1) Basic usage: used to store and manage user data, such as inserting, querying, updating and deleting user information. 2) Advanced usage: Handle complex business logic, such as order and inventory management of e-commerce platforms. 3) Performance optimization: Improve performance by rationally using indexes, partition tables and query caches.

SQL commands in MySQL can be divided into categories such as DDL, DML, DQL, DCL, etc., and are used to create, modify, delete databases and tables, insert, update, delete data, and perform complex query operations. 1. Basic usage includes CREATETABLE creation table, INSERTINTO insert data, and SELECT query data. 2. Advanced usage involves JOIN for table joins, subqueries and GROUPBY for data aggregation. 3. Common errors such as syntax errors, data type mismatch and permission problems can be debugged through syntax checking, data type conversion and permission management. 4. Performance optimization suggestions include using indexes, avoiding full table scanning, optimizing JOIN operations and using transactions to ensure data consistency.

InnoDB achieves atomicity through undolog, consistency and isolation through locking mechanism and MVCC, and persistence through redolog. 1) Atomicity: Use undolog to record the original data to ensure that the transaction can be rolled back. 2) Consistency: Ensure the data consistency through row-level locking and MVCC. 3) Isolation: Supports multiple isolation levels, and REPEATABLEREAD is used by default. 4) Persistence: Use redolog to record modifications to ensure that data is saved for a long time.

MySQL's position in databases and programming is very important. It is an open source relational database management system that is widely used in various application scenarios. 1) MySQL provides efficient data storage, organization and retrieval functions, supporting Web, mobile and enterprise-level systems. 2) It uses a client-server architecture, supports multiple storage engines and index optimization. 3) Basic usages include creating tables and inserting data, and advanced usages involve multi-table JOINs and complex queries. 4) Frequently asked questions such as SQL syntax errors and performance issues can be debugged through the EXPLAIN command and slow query log. 5) Performance optimization methods include rational use of indexes, optimized query and use of caches. Best practices include using transactions and PreparedStatemen

MySQL is suitable for small and large enterprises. 1) Small businesses can use MySQL for basic data management, such as storing customer information. 2) Large enterprises can use MySQL to process massive data and complex business logic to optimize query performance and transaction processing.

InnoDB effectively prevents phantom reading through Next-KeyLocking mechanism. 1) Next-KeyLocking combines row lock and gap lock to lock records and their gaps to prevent new records from being inserted. 2) In practical applications, by optimizing query and adjusting isolation levels, lock competition can be reduced and concurrency performance can be improved.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

Atom editor mac version download
The most popular open source editor

SublimeText3 Linux new version
SublimeText3 Linux latest version

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),