Skip to main content

Render images by java code or read images from a static path?



Here's my code:





1.Java Code:







public static void getImg(Long itemId) {

try {

Item item = Item.findById(itemId);

if (item.img != null && item.img.getFile() != null{

response.setContentTypeIfNotSet(item.img.type());

renderBinary(item.img.get());

}

} catch (Exception e) {

Logger.error("Can't find image,itemId = " + itemId);

}

}



html : < img src="@{{ Items.getImage(123)}}"/>







2.







html : < img src="/public/images/123.jpg"/>







I'm using playframework and the samples from documentation display images via the first version. What's the different (deep into mechanism) between them, especially in response performance ?


Comments

  1. In the 1st version, since you get the actual filename from some business logic (and/or database), you can easily rename/replace the image of id '123' without needing to change the presentation tiers.

    If the image of id '123' is in a protected folder (HTTP Basic Authentication or similar), your business logic could make sure the access is granted through an application wide security mechanism.

    You could also have versioning of the image, by providing the path of the desired version according to other Request/Session parameter and logic.

    In the 2nd case, it is possible to perform the above scenario but much more costly in development time and possibly configuration.

    ReplyDelete

Post a Comment

Popular posts from this blog

Slow Android emulator

I have a 2.67 GHz Celeron processor, 1.21 GB of RAM on a x86 Windows XP Professional machine. My understanding is that the Android emulator should start fairly quickly on such a machine, but for me it does not. I have followed all instructions in setting up the IDE, SDKs, JDKs and such and have had some success in staring the emulator quickly but is very particulary. How can I, if possible, fix this problem?

CCNA 3 Final Exam => latest version

1 . Which security protocol or measure would provide the greatest protection for a wireless LAN? WPA2 cloaking SSIDs shared WEP key MAC address filtering   2 . Refer to the exhibit. All trunk links are operational and all VLANs are allowed on all trunk links. An ARP request is sent by computer 5. Which device or devices will receive this message? only computer 4 computer 3 and RTR-A computer 4 and RTR-A computer 1, computer 2, computer 4, and RTR-A computer 1, computer 2, computer 3, computer 4, and RTR-A all of the computers and the router   3 . Refer to the exhibit. Hosts A and B, connected to hub HB1, attempt to transmit a frame at the same time but a collision occurs. Which hosts will receive the collision jamming signal? only hosts A and B only hosts A, B, and C only hosts A, B, C, and D only hosts A, B, C, and E   4 . Refer to the exhibit. Router RA receives a packet with a source address of 192.168.1.65 and a destination address of 192.168.1.161...