url
stringlengths
11
2.25k
text
stringlengths
88
50k
ts
timestamp[s]date
2026-01-13 08:47:33
2026-01-13 09:30:40
http://groovy-lang.org/syntax.html#_booleans
The Apache Groovy programming language - Syntax Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community You are using an outdated browser. Please upgrade your browser to improve your experience. Apache Groovy™ Learn Documentation Download Support Contribute Ecosystem Blog posts Socialize Table of contents 1. Comments 1.1. Single-line comment 1.2. Multiline comment 1.3. Groovydoc comment 1.4. Shebang line 2. Keywords 3. Identifiers 3.1. Normal identifiers 3.2. Quoted identifiers 4. Strings 4.1. Single-quoted string 4.2. String concatenation 4.3. Triple-single-quoted string 4.3.1. Escaping special characters 4.3.2. Unicode escape sequence 4.4. Double-quoted string 4.4.1. String interpolation 4.4.2. Special case of interpolating closure expressions 4.4.3. Interoperability with Java 4.4.4. GString and String hashCodes 4.5. Triple-double-quoted string 4.6. Slashy string 4.6.1. Special cases 4.7. Dollar slashy string 4.8. String summary table 4.9. Characters 5. Numbers 5.1. Integral literals 5.1.1. Alternative non-base 10 representations Binary literal Octal literal Hexadecimal literal 5.2. Decimal literals 5.3. Underscore in literals 5.4. Number type suffixes 5.5. Math operations 5.5.1. The case of the division operator 5.5.2. The case of the power operator 6. Booleans 7. Lists 8. Arrays 8.1. Java-style array initialization 9. Maps Syntax This chapter covers the syntax of the Groovy programming language. The grammar of the language derives from the Java grammar, but enhances it with specific constructs for Groovy, and allows certain simplifications. 1. Comments 1.1. Single-line comment Single-line comments start with // and can be found at any position in the line. The characters following // , until the end of the line, are considered part of the comment. // a standalone single line comment println "hello" // a comment till the end of the line 1.2. Multiline comment A multiline comment starts with /* and can be found at any position in the line. The characters following /* will be considered part of the comment, including new line characters, up to the first */ closing the comment. Multiline comments can thus be put at the end of a statement, or even inside a statement. /* a standalone multiline comment spanning two lines */ println "hello" /* a multiline comment starting at the end of a statement */ println 1 /* one */ + 2 /* two */ 1.3. Groovydoc comment Similarly to multiline comments, Groovydoc comments are multiline, but start with /** and end with */ . Lines following the first Groovydoc comment line can optionally start with a star * . Those comments are associated with: type definitions (classes, interfaces, enums, annotations), fields and properties definitions methods definitions Although the compiler will not complain about Groovydoc comments not being associated with the above language elements, you should prepend those constructs with the comment right before it. /** * A Class description */ class Person { /** the name of the person */ String name /** * Creates a greeting method for a certain person. * * @param otherPerson the person to greet * @return a greeting message */ String greet(String otherPerson) { "Hello ${otherPerson}" } } Groovydoc follows the same conventions as Java’s own Javadoc. So you’ll be able to use the same tags as with Javadoc. In addition, Groovy supports Runtime Groovydoc since 3.0.0, i.e. Groovydoc can be retained at runtime. Runtime Groovydoc is disabled by default. It can be enabled by adding JVM option -Dgroovy.attach.runtime.groovydoc=true The Runtime Groovydoc starts with /**@ and ends with */ , for example: /**@ * Some class groovydoc for Foo */ class Foo { /**@ * Some method groovydoc for bar */ void bar() { } } assert Foo.class.groovydoc.content.contains('Some class groovydoc for Foo') (1) assert Foo.class.getMethod('bar', new Class[0]).groovydoc.content.contains('Some method groovydoc for bar') (2) 1 Get the runtime groovydoc for class Foo 2 Get the runtime groovydoc for method bar 1.4. Shebang line Beside the single-line comment, there is a special line comment, often called the shebang line understood by UNIX systems which allows scripts to be run directly from the command-line, provided you have installed the Groovy distribution and the groovy command is available on the PATH . #!/usr/bin/env groovy println "Hello from the shebang line" The # character must be the first character of the file. Any indentation would yield a compilation error. 2. Keywords Groovy has the following reserved keywords: Table 1. Reserved Keywords abstract assert break case catch class const continue def default do else enum extends final finally for goto if implements import instanceof interface native new null non-sealed package public protected private return static strictfp super switch synchronized this threadsafe throw throws transient try while Of these, const , goto , strictfp , and threadsafe are not currently in use. The reserved keywords can’t in general be used for variable, field and method names. A trick allows methods to be defined having the same name as a keyword by surrounding the name in quotes as shown in the following example: // reserved keywords can be used for method names if quoted def "abstract"() { true } // when calling such methods, the name must be qualified using "this." this.abstract() Using such names might be confusing and is often best to avoid. The trick is primarily intended to enable certain Java integration scenarios and certain DSL scenarios where having "verbs" and "nouns" with the same name as keywords may be desirable. In addition, Groovy has the following contextual keywords: Table 2. Contextual Keywords as in permits record sealed trait var yields These words are only keywords in certain contexts and can be more freely used in some places, in particular for variables, fields and method names. This extra lenience allows using method or variable names that were not keywords in earlier versions of Groovy or are not keywords in Java. Examples are shown here: // contextual keywords can be used for field and variable names def as = true assert as // contextual keywords can be used for method names def in() { true } // when calling such methods, the name only needs to be qualified using "this." in scenarios which would be ambiguous this.in() Groovy programmers familiar with these contextual keywords may still wish to avoid using those names unless there is a good reason to use such a name. The restrictions on reserved keywords also apply for the primitive types, the boolean literals and the null literal (all of which are discussed later): Table 3. Other reserved words null true false boolean char byte short int long float double While not recommended, the same trick as for reserved keywords can be used: def "null"() { true } // not recommended; potentially confusing assert this.null() // must be qualified Using such words as method names is potentially confusing and is often best to avoid, however, it might be useful for certain kinds of DSLs . 3. Identifiers 3.1. Normal identifiers Identifiers start with a letter, a dollar or an underscore. They cannot start with a number. A letter can be in the following ranges: 'a' to 'z' (lowercase ascii letter) 'A' to 'Z' (uppercase ascii letter) '\u00C0' to '\u00D6' '\u00D8' to '\u00F6' '\u00F8' to '\u00FF' '\u0100' to '\uFFFE' Then following characters can contain letters and numbers. Here are a few examples of valid identifiers (here, variable names): def name def item3 def with_underscore def $dollarStart But the following ones are invalid identifiers: def 3tier def a+b def a#b All keywords are also valid identifiers when following a dot: foo.as foo.assert foo.break foo.case foo.catch 3.2. Quoted identifiers Quoted identifiers appear after the dot of a dotted expression. For instance, the name part of the person.name expression can be quoted with person."name" or person.'name' . This is particularly interesting when certain identifiers contain illegal characters that are forbidden by the Java Language Specification, but which are allowed by Groovy when quoted. For example, characters like a dash, a space, an exclamation mark, etc. def map = [:] map."an identifier with a space and double quotes" = "ALLOWED" map.'with-dash-signs-and-single-quotes' = "ALLOWED" assert map."an identifier with a space and double quotes" == "ALLOWED" assert map.'with-dash-signs-and-single-quotes' == "ALLOWED" As we shall see in the following section on strings , Groovy provides different string literals. All kind of strings are actually allowed after the dot: map.'single quote' map."double quote" map.'''triple single quote''' map."""triple double quote""" map./slashy string/ map.$/dollar slashy string/$ There’s a difference between plain character strings and Groovy’s GStrings (interpolated strings), as in that the latter case, the interpolated values are inserted in the final string for evaluating the whole identifier: def firstname = "Homer" map."Simpson-${firstname}" = "Homer Simpson" assert map.'Simpson-Homer' == "Homer Simpson" 4. Strings Text literals are represented in the form of chain of characters called strings. Groovy lets you instantiate java.lang.String objects, as well as GStrings ( groovy.lang.GString ) which are also called interpolated strings in other programming languages. 4.1. Single-quoted string Single-quoted strings are a series of characters surrounded by single quotes: 'a single-quoted string' Single-quoted strings are plain java.lang.String and don’t support interpolation. 4.2. String concatenation All the Groovy strings can be concatenated with the + operator: assert 'ab' == 'a' + 'b' 4.3. Triple-single-quoted string Triple-single-quoted strings are a series of characters surrounded by triplets of single quotes: '''a triple-single-quoted string''' Triple-single-quoted strings are plain java.lang.String and don’t support interpolation. Triple-single-quoted strings may span multiple lines. The content of the string can cross line boundaries without the need to split the string in several pieces and without concatenation or newline escape characters: def aMultilineString = '''line one line two line three''' If your code is indented, for example in the body of the method of a class, your string will contain the whitespace of the indentation. The Groovy Development Kit contains methods for stripping out the indentation with the String#stripIndent() method, and with the String#stripMargin() method that takes a delimiter character to identify the text to remove from the beginning of a string. When creating a string as follows: def startingAndEndingWithANewline = ''' line one line two line three ''' You will notice that the resulting string contains a newline character as first character. It is possible to strip that character by escaping the newline with a backslash: def strippedFirstNewline = '''\ line one line two line three ''' assert !strippedFirstNewline.startsWith('\n') 4.3.1. Escaping special characters You can escape single quotes with the backslash character to avoid terminating the string literal: 'an escaped single quote: \' needs a backslash' And you can escape the escape character itself with a double backslash: 'an escaped escape character: \\ needs a double backslash' Some special characters also use the backslash as escape character: Escape sequence Character \b backspace \f formfeed \n newline \r carriage return \s single space \t tabulation \\ backslash \' single quote within a single-quoted string (and optional for triple-single-quoted and double-quoted strings) \" double quote within a double-quoted string (and optional for triple-double-quoted and single-quoted strings) We’ll see some more escaping details when it comes to other types of strings discussed later. 4.3.2. Unicode escape sequence For characters that are not present on your keyboard, you can use unicode escape sequences: a backslash, followed by 'u', then 4 hexadecimal digits. For example, the Euro currency symbol can be represented with: 'The Euro currency symbol: \u20AC' 4.4. Double-quoted string Double-quoted strings are a series of characters surrounded by double quotes: "a double-quoted string" Double-quoted strings are plain java.lang.String if there’s no interpolated expression, but are groovy.lang.GString instances if interpolation is present. To escape a double quote, you can use the backslash character: "A double quote: \"". 4.4.1. String interpolation Any Groovy expression can be interpolated in all string literals, apart from single and triple-single-quoted strings. Interpolation is the act of replacing a placeholder in the string with its value upon evaluation of the string. The placeholder expressions are surrounded by ${} . The curly braces may be omitted for unambiguous dotted expressions, i.e. we can use just a $ prefix in those cases. If the GString is ever passed to a method taking a String, the expression value inside the placeholder is evaluated to its string representation (by calling toString() on that expression) and the resulting String is passed to the method. Here, we have a string with a placeholder referencing a local variable: def name = 'Guillaume' // a plain string def greeting = "Hello ${name}" assert greeting.toString() == 'Hello Guillaume' Any Groovy expression is valid, as we can see in this example with an arithmetic expression: def sum = "The sum of 2 and 3 equals ${2 + 3}" assert sum.toString() == 'The sum of 2 and 3 equals 5' Not only are expressions allowed in between the ${} placeholder, but so are statements. However, a statement’s value is just null . So if several statements are inserted in that placeholder, the last one should somehow return a meaningful value to be inserted. For instance, "The sum of 1 and 2 is equal to ${def a = 1; def b = 2; a + b}" is supported and works as expected but a good practice is usually to stick to simple expressions inside GString placeholders. In addition to ${} placeholders, we can also use a lone $ sign prefixing a dotted expression: def person = [name: 'Guillaume', age: 36] assert "$person.name is $person.age years old" == 'Guillaume is 36 years old' But only dotted expressions of the form a.b , a.b.c , etc, are valid. Expressions containing parentheses like method calls, curly braces for closures, dots which aren’t part of a property expression or arithmetic operators would be invalid. Given the following variable definition of a number: def number = 3.14 The following statement will throw a groovy.lang.MissingPropertyException because Groovy believes you’re trying to access the toString property of that number, which doesn’t exist: shouldFail(MissingPropertyException) { println "$number.toString()" } You can think of "$number.toString()" as being interpreted by the parser as "${number.toString}()" . Similarly, if the expression is ambiguous, you need to keep the curly braces: String thing = 'treasure' assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by $thing.x" // <= Not allowed: ambiguous!! assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by ${thing}.x" // <= Curly braces required If you need to escape the $ or ${} placeholders in a GString so they appear as is without interpolation, you just need to use a \ backslash character to escape the dollar sign: assert '$5' == "\$5" assert '${name}' == "\${name}" 4.4.2. Special case of interpolating closure expressions So far, we’ve seen we could interpolate arbitrary expressions inside the ${} placeholder, but there is a special case and notation for closure expressions. When the placeholder contains an arrow, ${→} , the expression is actually a closure expression — you can think of it as a closure with a dollar prepended in front of it: def sParameterLessClosure = "1 + 2 == ${-> 3}" (1) assert sParameterLessClosure == '1 + 2 == 3' def sOneParamClosure = "1 + 2 == ${ w -> w << 3}" (2) assert sOneParamClosure == '1 + 2 == 3' 1 The closure is a parameterless closure which doesn’t take arguments. 2 Here, the closure takes a single java.io.StringWriter argument, to which you can append content with the << leftShift operator. In either case, both placeholders are embedded closures. In appearance, it looks like a more verbose way of defining expressions to be interpolated, but closures have an interesting advantage over mere expressions: lazy evaluation. Let’s consider the following sample: def number = 1 (1) def eagerGString = "value == ${number}" def lazyGString = "value == ${ -> number }" assert eagerGString == "value == 1" (2) assert lazyGString == "value == 1" (3) number = 2 (4) assert eagerGString == "value == 1" (5) assert lazyGString == "value == 2" (6) 1 We define a number variable containing 1 that we then interpolate within two GStrings, as an expression in eagerGString and as a closure in lazyGString . 2 We expect the resulting string to contain the same string value of 1 for eagerGString . 3 Similarly for lazyGString 4 Then we change the value of the variable to a new number 5 With a plain interpolated expression, the value was actually bound at the time of creation of the GString. 6 But with a closure expression, the closure is called upon each coercion of the GString into String, resulting in an updated string containing the new number value. An embedded closure expression taking more than one parameter will generate an exception at runtime. Only closures with zero or one parameter are allowed. 4.4.3. Interoperability with Java When a method (whether implemented in Java or Groovy) expects a java.lang.String , but we pass a groovy.lang.GString instance, the toString() method of the GString is automatically and transparently called. String takeString(String message) { (4) assert message instanceof String (5) return message } def message = "The message is ${'hello'}" (1) assert message instanceof GString (2) def result = takeString(message) (3) assert result instanceof String assert result == 'The message is hello' 1 We create a GString variable 2 We double-check it’s an instance of the GString 3 We then pass that GString to a method taking a String as parameter 4 The signature of the takeString() method explicitly says its sole parameter is a String 5 We also verify that the parameter is indeed a String and not a GString. 4.4.4. GString and String hashCodes Although interpolated strings can be used in lieu of plain Java strings, they differ with strings in a particular way: their hashCodes are different. Plain Java strings are immutable, whereas the resulting String representation of a GString can vary, depending on its interpolated values. Even for the same resulting string, GStrings and Strings don’t have the same hashCode. assert "one: ${1}".hashCode() != "one: 1".hashCode() GString and Strings having different hashCode values, using GString as Map keys should be avoided, especially if we try to retrieve an associated value with a String instead of a GString. def key = "a" def m = ["${key}": "letter ${key}"] (1) assert m["a"] == null (2) 1 The map is created with an initial pair whose key is a GString 2 When we try to fetch the value with a String key, we will not find it, as Strings and GString have different hashCode values 4.5. Triple-double-quoted string Triple-double-quoted strings behave like double-quoted strings, with the addition that they are multiline, like the triple-single-quoted strings. def name = 'Groovy' def template = """ Dear Mr ${name}, You're the winner of the lottery! Yours sincerly, Dave """ assert template.toString().contains('Groovy') Neither double quotes nor single quotes need be escaped in triple-double-quoted strings. 4.6. Slashy string Beyond the usual quoted strings, Groovy offers slashy strings, which use / as the opening and closing delimiter. Slashy strings are particularly useful for defining regular expressions and patterns, as there is no need to escape backslashes. Example of a slashy string: def fooPattern = /.*foo.*/ assert fooPattern == '.*foo.*' Only forward slashes need to be escaped with a backslash: def escapeSlash = /The character \/ is a forward slash/ assert escapeSlash == 'The character / is a forward slash' Slashy strings are multiline: def multilineSlashy = /one two three/ assert multilineSlashy.contains('\n') Slashy strings can be thought of as just another way to define a GString but with different escaping rules. They hence support interpolation: def color = 'blue' def interpolatedSlashy = /a ${color} car/ assert interpolatedSlashy == 'a blue car' 4.6.1. Special cases An empty slashy string cannot be represented with a double forward slash, as it’s understood by the Groovy parser as a line comment. That’s why the following assert would actually not compile as it would look like a non-terminated statement: assert '' == // As slashy strings were mostly designed to make regexp easier so a few things that are errors in GStrings like $() or $5 will work with slashy strings. Remember that escaping backslashes is not required. An alternative way of thinking of this is that in fact escaping is not supported. The slashy string /\t/ won’t contain a tab but instead a backslash followed by the character 't'. Escaping is only allowed for the slash character, i.e. /\/folder/ will be a slashy string containing '/folder' . A consequence of slash escaping is that a slashy string can’t end with a backslash. Otherwise that will escape the slashy string terminator. You can instead use a special trick, /ends with slash ${'\\'}/ . But best just avoid using a slashy string in such a case. 4.7. Dollar slashy string Dollar slashy strings are multiline GStrings delimited with an opening $/ and a closing /$ . The escaping character is the dollar sign, and it can escape another dollar, or a forward slash. Escaping for the dollar and forward slash characters is only needed where conflicts arise with the special use of those characters. The characters $foo would normally indicate a GString placeholder, so those four characters can be entered into a dollar slashy string by escaping the dollar, i.e. $$foo . Similarly, you will need to escape a dollar slashy closing delimiter if you want it to appear in your string. Here are a few examples: def name = "Guillaume" def date = "April, 1st" def dollarSlashy = $/ Hello $name, today we're ${date}. $ dollar sign $$ escaped dollar sign \ backslash / forward slash $/ escaped forward slash $$$/ escaped opening dollar slashy $/$$ escaped closing dollar slashy /$ assert [ 'Guillaume', 'April, 1st', '$ dollar sign', '$ escaped dollar sign', '\\ backslash', '/ forward slash', '/ escaped forward slash', '$/ escaped opening dollar slashy', '/$ escaped closing dollar slashy' ].every { dollarSlashy.contains(it) } It was created to overcome some of the limitations of the slashy string escaping rules. Use it when its escaping rules suit your string contents (typically if it has some slashes you don’t want to escape). 4.8. String summary table String name String syntax Interpolated Multiline Escape character Single-quoted '…​' \ Triple-single-quoted '''…​''' \ Double-quoted "…​" \ Triple-double-quoted """…​""" \ Slashy /…​/ \ Dollar slashy $/…​/$ $ 4.9. Characters Unlike Java, Groovy doesn’t have an explicit character literal. However, you can be explicit about making a Groovy string an actual character, by three different means: char c1 = 'A' (1) assert c1 instanceof Character def c2 = 'B' as char (2) assert c2 instanceof Character def c3 = (char)'C' (3) assert c3 instanceof Character 1 by being explicit when declaring a variable holding the character by specifying the char type 2 by using type coercion with the as operator 3 by using a cast to char operation The first option 1 is interesting when the character is held in a variable, while the other two ( 2 and 3 ) are more interesting when a char value must be passed as argument of a method call. 5. Numbers Groovy supports different kinds of integral literals and decimal literals, backed by the usual Number types of Java. 5.1. Integral literals The integral literal types are the same as in Java: byte char short int long java.math.BigInteger You can create integral numbers of those types with the following declarations: // primitive types byte b = 1 char c = 2 short s = 3 int i = 4 long l = 5 // infinite precision BigInteger bi = 6 If you use optional typing by using the def keyword, the type of the integral number will vary: it’ll adapt to the capacity of the type that can hold that number. For positive numbers: def a = 1 assert a instanceof Integer // Integer.MAX_VALUE def b = 2147483647 assert b instanceof Integer // Integer.MAX_VALUE + 1 def c = 2147483648 assert c instanceof Long // Long.MAX_VALUE def d = 9223372036854775807 assert d instanceof Long // Long.MAX_VALUE + 1 def e = 9223372036854775808 assert e instanceof BigInteger As well as for negative numbers: def na = -1 assert na instanceof Integer // Integer.MIN_VALUE def nb = -2147483648 assert nb instanceof Integer // Integer.MIN_VALUE - 1 def nc = -2147483649 assert nc instanceof Long // Long.MIN_VALUE def nd = -9223372036854775808 assert nd instanceof Long // Long.MIN_VALUE - 1 def ne = -9223372036854775809 assert ne instanceof BigInteger 5.1.1. Alternative non-base 10 representations Numbers can also be represented in binary, octal, hexadecimal and decimal bases. Binary literal Binary numbers start with a 0b prefix: int xInt = 0b10101111 assert xInt == 175 short xShort = 0b11001001 assert xShort == 201 as short byte xByte = 0b11 assert xByte == 3 as byte long xLong = 0b101101101101 assert xLong == 2925l BigInteger xBigInteger = 0b111100100001 assert xBigInteger == 3873g int xNegativeInt = -0b10101111 assert xNegativeInt == -175 Octal literal Octal numbers are specified in the typical format of 0 followed by octal digits. int xInt = 077 assert xInt == 63 short xShort = 011 assert xShort == 9 as short byte xByte = 032 assert xByte == 26 as byte long xLong = 0246 assert xLong == 166l BigInteger xBigInteger = 01111 assert xBigInteger == 585g int xNegativeInt = -077 assert xNegativeInt == -63 Hexadecimal literal Hexadecimal numbers are specified in the typical format of 0x followed by hex digits. int xInt = 0x77 assert xInt == 119 short xShort = 0xaa assert xShort == 170 as short byte xByte = 0x3a assert xByte == 58 as byte long xLong = 0xffff assert xLong == 65535l BigInteger xBigInteger = 0xaaaa assert xBigInteger == 43690g Double xDouble = new Double('0x1.0p0') assert xDouble == 1.0d int xNegativeInt = -0x77 assert xNegativeInt == -119 5.2. Decimal literals The decimal literal types are the same as in Java: float double java.math.BigDecimal You can create decimal numbers of those types with the following declarations: // primitive types float f = 1.234 double d = 2.345 // infinite precision BigDecimal bd = 3.456 Decimals can use exponents, with the e or E exponent letter, followed by an optional sign, and an integral number representing the exponent: assert 1e3 == 1_000.0 assert 2E4 == 20_000.0 assert 3e+1 == 30.0 assert 4E-2 == 0.04 assert 5e-1 == 0.5 Conveniently for exact decimal number calculations, Groovy chooses java.math.BigDecimal as its decimal number type. In addition, both float and double are supported, but require an explicit type declaration, type coercion or suffix. Even if BigDecimal is the default for decimal numbers, such literals are accepted in methods or closures taking float or double as parameter types. Decimal numbers can’t be represented using a binary, octal or hexadecimal representation. 5.3. Underscore in literals When writing long literal numbers, it’s harder on the eye to figure out how some numbers are grouped together, for example with groups of thousands, of words, etc. By allowing you to place underscore in number literals, it’s easier to spot those groups: long creditCardNumber = 1234_5678_9012_3456L long socialSecurityNumbers = 999_99_9999L double monetaryAmount = 12_345_132.12 long hexBytes = 0xFF_EC_DE_5E long hexWords = 0xFFEC_DE5E long maxLong = 0x7fff_ffff_ffff_ffffL long alsoMaxLong = 9_223_372_036_854_775_807L long bytes = 0b11010010_01101001_10010100_10010010 5.4. Number type suffixes We can force a number (including binary, octals and hexadecimals) to have a specific type by giving a suffix (see table below), either uppercase or lowercase. Type Suffix BigInteger G or g Long L or l Integer I or i BigDecimal G or g Double D or d Float F or f Examples: assert 42I == Integer.valueOf('42') assert 42i == Integer.valueOf('42') // lowercase i more readable assert 123L == Long.valueOf("123") // uppercase L more readable assert 2147483648 == Long.valueOf('2147483648') // Long type used, value too large for an Integer assert 456G == new BigInteger('456') assert 456g == new BigInteger('456') assert 123.45 == new BigDecimal('123.45') // default BigDecimal type used assert .321 == new BigDecimal('.321') assert 1.200065D == Double.valueOf('1.200065') assert 1.234F == Float.valueOf('1.234') assert 1.23E23D == Double.valueOf('1.23E23') assert 0b1111L.class == Long // binary assert 0xFFi.class == Integer // hexadecimal assert 034G.class == BigInteger // octal 5.5. Math operations Although operators are covered in more detail elsewhere, it’s important to discuss the behavior of math operations and what their resulting types are. Division and power binary operations aside (covered below), binary operations between byte , char , short and int result in int binary operations involving long with byte , char , short and int result in long binary operations involving BigInteger and any other integral type result in BigInteger binary operations involving BigDecimal with byte , char , short , int and BigInteger result in BigDecimal binary operations between float , double and BigDecimal result in double binary operations between two BigDecimal result in BigDecimal The following table summarizes those rules: byte char short int long BigInteger float double BigDecimal byte int int int int long BigInteger double double BigDecimal char int int int long BigInteger double double BigDecimal short int int long BigInteger double double BigDecimal int int long BigInteger double double BigDecimal long long BigInteger double double BigDecimal BigInteger BigInteger double double BigDecimal float double double double double double double BigDecimal BigDecimal Thanks to Groovy’s operator overloading, the usual arithmetic operators work as well with BigInteger and BigDecimal , unlike in Java where you have to use explicit methods for operating on those numbers. 5.5.1. The case of the division operator The division operators / (and /= for division and assignment) produce a double result if either operand is a float or double , and a BigDecimal result otherwise (when both operands are any combination of an integral type short , char , byte , int , long , BigInteger or BigDecimal ). BigDecimal division is performed with the divide() method if the division is exact (i.e. yielding a result that can be represented within the bounds of the same precision and scale), or using a MathContext with a precision of the maximum of the two operands' precision plus an extra precision of 10, and a scale of the maximum of 10 and the maximum of the operands' scale. For integer division like in Java, you should use the intdiv() method, as Groovy doesn’t provide a dedicated integer division operator symbol. 5.5.2. The case of the power operator The power operation is represented by the ** operator, with two parameters: the base and the exponent. The result of the power operation depends on its operands, and the result of the operation (in particular if the result can be represented as an integral value). The following rules are used by Groovy’s power operation to determine the resulting type: If the exponent is a decimal value if the result can be represented as an Integer , then return an Integer else if the result can be represented as a Long , then return a Long otherwise return a Double If the exponent is an integral value if the exponent is strictly negative, then return an Integer , Long or Double if the result value fits in that type if the exponent is positive or zero if the base is a BigDecimal , then return a BigDecimal result value if the base is a BigInteger , then return a BigInteger result value if the base is an Integer , then return an Integer if the result value fits in it, otherwise a BigInteger if the base is a Long , then return a Long if the result value fits in it, otherwise a BigInteger We can illustrate those rules with a few examples: // base and exponent are ints and the result can be represented by an Integer assert 2 ** 3 instanceof Integer // 8 assert 10 ** 9 instanceof Integer // 1_000_000_000 // the base is a long, so fit the result in a Long // (although it could have fit in an Integer) assert 5L ** 2 instanceof Long // 25 // the result can't be represented as an Integer or Long, so return a BigInteger assert 100 ** 10 instanceof BigInteger // 10e20 assert 1234 ** 123 instanceof BigInteger // 170515806212727042875... // the base is a BigDecimal and the exponent a negative int // but the result can be represented as an Integer assert 0.5 ** -2 instanceof Integer // 4 // the base is an int, and the exponent a negative float // but again, the result can be represented as an Integer assert 1 ** -0.3f instanceof Integer // 1 // the base is an int, and the exponent a negative int // but the result will be calculated as a Double // (both base and exponent are actually converted to doubles) assert 10 ** -1 instanceof Double // 0.1 // the base is a BigDecimal, and the exponent is an int, so return a BigDecimal assert 1.2 ** 10 instanceof BigDecimal // 6.1917364224 // the base is a float or double, and the exponent is an int // but the result can only be represented as a Double value assert 3.4f ** 5 instanceof Double // 454.35430372146965 assert 5.6d ** 2 instanceof Double // 31.359999999999996 // the exponent is a decimal value // and the result can only be represented as a Double value assert 7.8 ** 1.9 instanceof Double // 49.542708423868476 assert 2 ** 0.1f instanceof Double // 1.0717734636432956 6. Booleans Boolean is a special data type that is used to represent truth values: true and false . Use this data type for simple flags that track true/false conditions . Boolean values can be stored in variables, assigned into fields, just like any other data type: def myBooleanVariable = true boolean untypedBooleanVar = false booleanField = true true and false are the only two primitive boolean values. But more complex boolean expressions can be represented using logical operators . In addition, Groovy has special rules (often referred to as Groovy Truth ) for coercing non-boolean objects to a boolean value. 7. Lists Groovy uses a comma-separated list of values, surrounded by square brackets, to denote lists. Groovy lists are plain JDK java.util.List , as Groovy doesn’t define its own collection classes. The concrete list implementation used when defining list literals are java.util.ArrayList by default, unless you decide to specify otherwise, as we shall see later on. def numbers = [1, 2, 3] (1) assert numbers instanceof List (2) assert numbers.size() == 3 (3) 1 We define a list numbers delimited by commas and surrounded by square brackets, and we assign that list into a variable 2 The list is an instance of Java’s java.util.List interface 3 The size of the list can be queried with the size() method, and shows our list contains 3 elements In the above example, we used a homogeneous list, but you can also create lists containing values of heterogeneous types: def heterogeneous = [1, "a", true] (1) 1 Our list here contains a number, a string and a boolean value We mentioned that by default, list literals are actually instances of java.util.ArrayList , but it is possible to use a different backing type for our lists, thanks to using type coercion with the as operator, or with explicit type declaration for your variables: def arrayList = [1, 2, 3] assert arrayList instanceof java.util.ArrayList def linkedList = [2, 3, 4] as LinkedList (1) assert linkedList instanceof java.util.LinkedList LinkedList otherLinked = [3, 4, 5] (2) assert otherLinked instanceof java.util.LinkedList 1 We use coercion with the as operator to explicitly request a java.util.LinkedList implementation 2 We can say that the variable holding the list literal is of type java.util.LinkedList You can access elements of the list with the [] subscript operator (both for reading and setting values) with positive indices or negative indices to access elements from the end of the list, as well as with ranges, and use the << leftShift operator to append elements to a list: def letters = ['a', 'b', 'c', 'd'] assert letters[0] == 'a' (1) assert letters[1] == 'b' assert letters[-1] == 'd' (2) assert letters[-2] == 'c' letters[2] = 'C' (3) assert letters[2] == 'C' letters << 'e' (4) assert letters[ 4] == 'e' assert letters[-1] == 'e' assert letters[1, 3] == ['b', 'd'] (5) assert letters[2..4] == ['C', 'd', 'e'] (6) 1 Access the first element of the list (zero-based counting) 2 Access the last element of the list with a negative index: -1 is the first element from the end of the list 3 Use an assignment to set a new value for the third element of the list 4 Use the << leftShift operator to append an element at the end of the list 5 Access two elements at once, returning a new list containing those two elements 6 Use a range to access a range of values from the list, from a start to an end element position As lists can be heterogeneous in nature, lists can also contain other lists to create multidimensional lists: def multi = [[0, 1], [2, 3]] (1) assert multi[1][0] == 2 (2) 1 Define a list of numbers 2 Access the second element of the top-most list, and the first element of the inner list 8. Arrays Groovy reuses the list notation for arrays, but to make such literals arrays, you need to explicitly define the type of the array through coercion or type declaration. String[] arrStr = ['Ananas', 'Banana', 'Kiwi'] (1) assert arrStr instanceof String[] (2) assert !(arrStr instanceof List) def numArr = [1, 2, 3] as int[] (3) assert numArr instanceof int[] (4) assert numArr.size() == 3 1 Define an array of strings using explicit variable type declaration 2 Assert that we created an array of strings 3 Create an array of ints with the as operator 4 Assert that we created an array of primitive ints You can also create multi-dimensional arrays: def matrix3 = new Integer[3][3] (1) assert matrix3.size() == 3 Integer[][] matrix2 (2) matrix2 = [[1, 2], [3, 4]] assert matrix2 instanceof Integer[][] 1 You can define the bounds of a new array 2 Or declare an array without specifying its bounds Access to elements of an array follows the same notation as for lists: String[] names = ['Cédric', 'Guillaume', 'Jochen', 'Paul'] assert names[0] == 'Cédric' (1) names[2] = 'Blackdrag' (2) assert names[2] == 'Blackdrag' 1 Retrieve the first element of the array 2 Set the value of the third element of the array to a new value 8.1. Java-style array initialization Groovy has always supported literal list/array definitions using square brackets and has avoided Java-style curly braces so as not to conflict with closure definitions. In the case where the curly braces come immediately after an array type declaration however, there is no ambiguity with closure definitions, so Groovy 3 and above support that variant of the Java array initialization expression. Examples: def primes = new int[] {2, 3, 5, 7, 11} assert primes.size() == 5 && primes.sum() == 28 assert primes.class.name == '[I' def pets = new String[] {'cat', 'dog'} assert pets.size() == 2 && pets.sum() == 'catdog' assert pets.class.name == '[Ljava.lang.String;' // traditional Groovy alternative still supported String[] groovyBooks = [ 'Groovy in Action', 'Making Java Groovy' ] assert groovyBooks.every{ it.contains('Groovy') } 9. Maps Sometimes called dictionaries or associative arrays in other languages, Groovy features maps. Maps associate keys to values, separating keys and values with colons, and each key/value pairs with commas, and the whole keys and values surrounded by square brackets. def colors = [red: '#FF0000', green: '#00FF00', blue: '#0000FF'] (1) assert colors['red'] == '#FF0000' (2) assert colors.green == '#00FF00' (3) colors['pink'] = '#FF00FF' (4) colors.yellow = '#FFFF00' (5) assert colors.pink == '#FF00FF' assert colors['yellow'] == '#FFFF00' assert colors instanceof java.util.LinkedHashMap 1 We define a map of string color names, associated with their hexadecimal-coded html colors 2 We use the subscript notation to check the content associated with the red key 3 We can also use the property notation to assert the color green’s hexadecimal representation 4 Similarly, we can use the subscript notation to add a new key/value pair 5 Or the property notation, to add the yellow color When using names for the keys, we actually define string keys in the map. Groovy creates maps that are actually instances of java.util.LinkedHashMap . If you try to access a key which is not present in the map: assert colors.unknown == null def emptyMap = [:] assert emptyMap.anyKey == null You will retrieve a null result. In the examples above, we used string keys, but you can also use values of other types as keys: def numbers = [1: 'one', 2: 'two'] assert numbers[1] == 'one' Here, we used numbers as keys, as numbers can unambiguously be recognized as numbers, so Groovy will not create a string key like in our previous examples. But consider the case you want to pass a variable in lieu of the key, to have the value of that variable become the key: def key = 'name' def person = [key: 'Guillaume'] (1) assert !person.containsKey('name') (2) assert person.containsKey('key') (3) 1 The key associated with the 'Guillaume' name will actually be the "key" string, not the value associated with the key variable 2 The map doesn’t contain the 'name' key 3 Instead, the map contains a 'key' key You can also pass quoted strings as well as keys: ["name": "Guillaume"]. This is mandatory if your key string isn’t a valid identifier, for example if you wanted to create a string key containing a dash like in: ["street-name": "Main street"]. When you need to pass variable values as keys in your map definitions, you must surround the variable or expression with parentheses: person = [(key): 'Guillaume'] (1) assert person.containsKey('name') (2) assert !person.containsKey('key') (3) 1 This time, we surround the key variable with parentheses, to instruct the parser we are passing a variable rather than defining a string key 2 The map does contain the name key 3 But the map doesn’t contain the key key as before Groovy Learn Documentation Download Support Contribute Ecosystem Blog posts About Source code Security Books Thanks Sponsorship FAQ Search Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community The Groovy programming language is supported by the Apache Software Foundation and the Groovy community. Apache, Apache Groovy, Groovy, and the ASF logo are either registered trademarks or trademarks of The Apache Software Foundation. © 2003-2025 the Apache Groovy project — Groovy is Open Source: license , privacy policy .
2026-01-13T09:29:32
https://www.chinadaily.com.cn/china/scitech
Innovation - Chinadaily.com.cn Search HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER MOBILE Global Edition ASIA 中文 双语 Français HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE China News Society Innovation HK/Macao Cross-Strait Cover Story Photo Environment Health Military Video Home / China / Innovation Home China Innovation China unveils first AI model to gauge weather's impact on stock market Researcher reveals secrets of early life on Earth Long March 5 rocket deploys tech demo satellite into space China launches communication technology test satellite New optical chip can help advance generative AI China launches new AI model for agriculture 2026-01-13 17:10 Shandong upgrades ancient canal shipping with smart tech and cleaner ships 2026-01-13 16:58 Chinese company tests 'power bank in sky' high-altitude wind system 2026-01-13 15:50 Research suggests causes of moon's two different 'faces' 2026-01-13 09:21 Commercial recoverable spacecraft completes test flight in China 2026-01-13 09:13 Test launch marks push in reusable space vehicles 2026-01-13 09:12 Smart tech to unify healthcare and insurance data 2026-01-13 09:09 Chinese researchers create novel computing architecture for major power boost 2026-01-12 13:51 Chinese astronauts conduct key training, experiments on space station 2026-01-12 13:49 China maps cotton's evolutionary secrets to build better crops 2026-01-12 11:34 Chinese researchers develop 'smart eyes' for grazing robots 2026-01-12 09:44 Satellite network filings with ITU are routine procedural steps: expert 2026-01-12 09:35 Cost-effective cargo drone takes flight 2026-01-12 09:01 Yunnan Flower Research Institute crowdsources naming of new varieties 2026-01-12 08:52 Unmanned transport plane makes maiden flight in Shaanxi 2026-01-11 13:40 China celebrates two years of pioneering X-ray observations 2026-01-09 14:40 Scientists discover how plants talk to beneficial bacteria 2026-01-09 11:06 Chinese scientists develop innovative molecule for precision cancer treatment 2026-01-09 10:45 China's space station advances 265 research projects, breaks multiple records 2026-01-09 10:19 Breakthrough made in tackling toxic waste gas 2026-01-09 08:50 1 2 3 4 5 6 7 8 9 10 Next    >>| 1/448 Next --> Latest China launches new AI model for agriculture China introduces national standard for valuing terrestrial ecosystems Government agencies announce regulations of online hiring information Ministry pledges to continue solid waste disposal crackdown Shandong upgrades ancient canal shipping with smart tech and cleaner ships Night view of Central Street in Harbin Exclusive Salute to everyday heroes A tech pro's lens on AI development Chinese AI company to showcase the warmth of technology at US exhibition Newsmaker Chinese couple turns 100,000 photos of Great Wall into a museum Beating the drum of heritage preservation Ten photos you don't wanna miss Ten photos from across China: Jan 2 - 8 Special Coverage Live: Hong Kong residential area fire 4th Plenary Session of the 20th CPC Central Committee From Qiushi Boosting High-Quality Belt and Road Cooperation Through Rigorous and Sustained Efforts China’s Hydropower: Empowering a Clean and Beautiful World Top BACK TO THE TOP English 中文 HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment FOLLOW US Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. -->
2026-01-13T09:29:32
https://docs.aws.amazon.com/zh_cn/cost-management/latest/userguide/ce-enable.html
启用 Cost Explorer - AWS 成本管理 启用 Cost Explorer - AWS 成本管理 文档 AWS Billing and Cost Management 用户指南 本文属于机器翻译版本。若本译文内容与英语原文存在差异,则一律以英文原文为准。 启用 Cost Explorer 您在 AWS 成本管理控制台中首次打开 Cost Explorer,即可为账户启用 Cost Explorer。您无法使用 API 启用 Cost Explorer。在您启用 Cost Explorer 后,AWS 会准备您的当月成本数据和过去 13 个月的成本数据,然后计算接下来 12 个月的预测成本。当月的数据大约在 24 小时后可供查看。其余的数据需要多等几天才能查看。Cost Explorer 每 24 小时至少更新您的成本数据一次。 在启用 Cost Explorer 的过程中,AWS 会自动为您的账户配置成本异常检测。成本异常检测是一项 AWS 成本管理功能。此功能使用机器学习模型来检测部署中的异常支出模式并进行提醒 AWS 服务。要开始使用成本异常检测,AWS 设置了 AWS 服务 监控和每日总结提醒订阅。如果异常支出超过 100 美元且占您账户中 AWS 服务 大部分预期支出的 40%,就会进行提醒。有关更多信息,请参阅 限制 和 使用 AWS 成本异常检测,检测异常支出 。 注意 您可以随时选择退出成本异常检测。有关更多信息,请参阅 退出异常检测 。 如果您的账户是具有启用 Cost Explorer 的管理账户的组织中的成员账户,则您可以启动 Cost Explorer。请注意,您所在组织的管理账户也可能拒绝您的账户访问。有关更多信息,请参阅 AWS Organizations 的整合账单 。 注意 组织内的账户状态决定了哪些成本和使用率数据可见: 某个独立账户加入了该组织。此后,该账户将无法再访问该账户为独立账户时的成本和使用数据。 成员账户离开组织成为独立账户。此后,该账户无法再访问其属于该组织成员时的成本和使用数据。该账户只能访问作为独立账户生成的数据。 如果某个成员账户离开组织 A 而加入组织 B,该账户不再有权访问其属于组织 A 的成员时的成本和使用率数据。该账户只能访问作为组织 B 的成员生成的数据。 某账户重新加入该账户之前所属的组织。此后,该账户可以重新访问其历史成本和使用数据。 注册以接收 AWS 成本和使用情况报告或详细账单报告,不会自动启用 Cost Explorer。为此,请遵循此流程。 注册 Cost Explorer 打开 账单与成本管理控制台,网址为 https://console.aws.amazon.com/costmanagement/ 。 在导航窗格中,选择 Cost Explorer 。 在 Welcome to Cost Explorer(欢迎使用 Cost Explorer) 页面上,选择 Launch Cost Explorer(启动 Cost Explorer) 。 有关控制对 Cost Explorer 的访问的更多信息,请参阅 控制 Cost Explorer 访问权限 。 Javascript 在您的浏览器中被禁用或不可用。 要使用 Amazon Web Services 文档,必须启用 Javascript。请参阅浏览器的帮助页面以了解相关说明。 文档惯例 使用 Cost Explorer 分析您的 AWS 成本和使用情况 控制 Cost Explorer 访问权限 此页面对您有帮助吗?- 是 感谢您对我们工作的肯定! 如果不耽误您的时间,请告诉我们做得好的地方,让我们做得更好。 此页面对您有帮助吗?- 否 感谢您告诉我们本页内容还需要完善。很抱歉让您失望了。 如果不耽误您的时间,请告诉我们如何改进文档。
2026-01-13T09:29:32
http://groovy-lang.org/syntax.html#_escaping_special_characters
The Apache Groovy programming language - Syntax Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community You are using an outdated browser. Please upgrade your browser to improve your experience. Apache Groovy™ Learn Documentation Download Support Contribute Ecosystem Blog posts Socialize Table of contents 1. Comments 1.1. Single-line comment 1.2. Multiline comment 1.3. Groovydoc comment 1.4. Shebang line 2. Keywords 3. Identifiers 3.1. Normal identifiers 3.2. Quoted identifiers 4. Strings 4.1. Single-quoted string 4.2. String concatenation 4.3. Triple-single-quoted string 4.3.1. Escaping special characters 4.3.2. Unicode escape sequence 4.4. Double-quoted string 4.4.1. String interpolation 4.4.2. Special case of interpolating closure expressions 4.4.3. Interoperability with Java 4.4.4. GString and String hashCodes 4.5. Triple-double-quoted string 4.6. Slashy string 4.6.1. Special cases 4.7. Dollar slashy string 4.8. String summary table 4.9. Characters 5. Numbers 5.1. Integral literals 5.1.1. Alternative non-base 10 representations Binary literal Octal literal Hexadecimal literal 5.2. Decimal literals 5.3. Underscore in literals 5.4. Number type suffixes 5.5. Math operations 5.5.1. The case of the division operator 5.5.2. The case of the power operator 6. Booleans 7. Lists 8. Arrays 8.1. Java-style array initialization 9. Maps Syntax This chapter covers the syntax of the Groovy programming language. The grammar of the language derives from the Java grammar, but enhances it with specific constructs for Groovy, and allows certain simplifications. 1. Comments 1.1. Single-line comment Single-line comments start with // and can be found at any position in the line. The characters following // , until the end of the line, are considered part of the comment. // a standalone single line comment println "hello" // a comment till the end of the line 1.2. Multiline comment A multiline comment starts with /* and can be found at any position in the line. The characters following /* will be considered part of the comment, including new line characters, up to the first */ closing the comment. Multiline comments can thus be put at the end of a statement, or even inside a statement. /* a standalone multiline comment spanning two lines */ println "hello" /* a multiline comment starting at the end of a statement */ println 1 /* one */ + 2 /* two */ 1.3. Groovydoc comment Similarly to multiline comments, Groovydoc comments are multiline, but start with /** and end with */ . Lines following the first Groovydoc comment line can optionally start with a star * . Those comments are associated with: type definitions (classes, interfaces, enums, annotations), fields and properties definitions methods definitions Although the compiler will not complain about Groovydoc comments not being associated with the above language elements, you should prepend those constructs with the comment right before it. /** * A Class description */ class Person { /** the name of the person */ String name /** * Creates a greeting method for a certain person. * * @param otherPerson the person to greet * @return a greeting message */ String greet(String otherPerson) { "Hello ${otherPerson}" } } Groovydoc follows the same conventions as Java’s own Javadoc. So you’ll be able to use the same tags as with Javadoc. In addition, Groovy supports Runtime Groovydoc since 3.0.0, i.e. Groovydoc can be retained at runtime. Runtime Groovydoc is disabled by default. It can be enabled by adding JVM option -Dgroovy.attach.runtime.groovydoc=true The Runtime Groovydoc starts with /**@ and ends with */ , for example: /**@ * Some class groovydoc for Foo */ class Foo { /**@ * Some method groovydoc for bar */ void bar() { } } assert Foo.class.groovydoc.content.contains('Some class groovydoc for Foo') (1) assert Foo.class.getMethod('bar', new Class[0]).groovydoc.content.contains('Some method groovydoc for bar') (2) 1 Get the runtime groovydoc for class Foo 2 Get the runtime groovydoc for method bar 1.4. Shebang line Beside the single-line comment, there is a special line comment, often called the shebang line understood by UNIX systems which allows scripts to be run directly from the command-line, provided you have installed the Groovy distribution and the groovy command is available on the PATH . #!/usr/bin/env groovy println "Hello from the shebang line" The # character must be the first character of the file. Any indentation would yield a compilation error. 2. Keywords Groovy has the following reserved keywords: Table 1. Reserved Keywords abstract assert break case catch class const continue def default do else enum extends final finally for goto if implements import instanceof interface native new null non-sealed package public protected private return static strictfp super switch synchronized this threadsafe throw throws transient try while Of these, const , goto , strictfp , and threadsafe are not currently in use. The reserved keywords can’t in general be used for variable, field and method names. A trick allows methods to be defined having the same name as a keyword by surrounding the name in quotes as shown in the following example: // reserved keywords can be used for method names if quoted def "abstract"() { true } // when calling such methods, the name must be qualified using "this." this.abstract() Using such names might be confusing and is often best to avoid. The trick is primarily intended to enable certain Java integration scenarios and certain DSL scenarios where having "verbs" and "nouns" with the same name as keywords may be desirable. In addition, Groovy has the following contextual keywords: Table 2. Contextual Keywords as in permits record sealed trait var yields These words are only keywords in certain contexts and can be more freely used in some places, in particular for variables, fields and method names. This extra lenience allows using method or variable names that were not keywords in earlier versions of Groovy or are not keywords in Java. Examples are shown here: // contextual keywords can be used for field and variable names def as = true assert as // contextual keywords can be used for method names def in() { true } // when calling such methods, the name only needs to be qualified using "this." in scenarios which would be ambiguous this.in() Groovy programmers familiar with these contextual keywords may still wish to avoid using those names unless there is a good reason to use such a name. The restrictions on reserved keywords also apply for the primitive types, the boolean literals and the null literal (all of which are discussed later): Table 3. Other reserved words null true false boolean char byte short int long float double While not recommended, the same trick as for reserved keywords can be used: def "null"() { true } // not recommended; potentially confusing assert this.null() // must be qualified Using such words as method names is potentially confusing and is often best to avoid, however, it might be useful for certain kinds of DSLs . 3. Identifiers 3.1. Normal identifiers Identifiers start with a letter, a dollar or an underscore. They cannot start with a number. A letter can be in the following ranges: 'a' to 'z' (lowercase ascii letter) 'A' to 'Z' (uppercase ascii letter) '\u00C0' to '\u00D6' '\u00D8' to '\u00F6' '\u00F8' to '\u00FF' '\u0100' to '\uFFFE' Then following characters can contain letters and numbers. Here are a few examples of valid identifiers (here, variable names): def name def item3 def with_underscore def $dollarStart But the following ones are invalid identifiers: def 3tier def a+b def a#b All keywords are also valid identifiers when following a dot: foo.as foo.assert foo.break foo.case foo.catch 3.2. Quoted identifiers Quoted identifiers appear after the dot of a dotted expression. For instance, the name part of the person.name expression can be quoted with person."name" or person.'name' . This is particularly interesting when certain identifiers contain illegal characters that are forbidden by the Java Language Specification, but which are allowed by Groovy when quoted. For example, characters like a dash, a space, an exclamation mark, etc. def map = [:] map."an identifier with a space and double quotes" = "ALLOWED" map.'with-dash-signs-and-single-quotes' = "ALLOWED" assert map."an identifier with a space and double quotes" == "ALLOWED" assert map.'with-dash-signs-and-single-quotes' == "ALLOWED" As we shall see in the following section on strings , Groovy provides different string literals. All kind of strings are actually allowed after the dot: map.'single quote' map."double quote" map.'''triple single quote''' map."""triple double quote""" map./slashy string/ map.$/dollar slashy string/$ There’s a difference between plain character strings and Groovy’s GStrings (interpolated strings), as in that the latter case, the interpolated values are inserted in the final string for evaluating the whole identifier: def firstname = "Homer" map."Simpson-${firstname}" = "Homer Simpson" assert map.'Simpson-Homer' == "Homer Simpson" 4. Strings Text literals are represented in the form of chain of characters called strings. Groovy lets you instantiate java.lang.String objects, as well as GStrings ( groovy.lang.GString ) which are also called interpolated strings in other programming languages. 4.1. Single-quoted string Single-quoted strings are a series of characters surrounded by single quotes: 'a single-quoted string' Single-quoted strings are plain java.lang.String and don’t support interpolation. 4.2. String concatenation All the Groovy strings can be concatenated with the + operator: assert 'ab' == 'a' + 'b' 4.3. Triple-single-quoted string Triple-single-quoted strings are a series of characters surrounded by triplets of single quotes: '''a triple-single-quoted string''' Triple-single-quoted strings are plain java.lang.String and don’t support interpolation. Triple-single-quoted strings may span multiple lines. The content of the string can cross line boundaries without the need to split the string in several pieces and without concatenation or newline escape characters: def aMultilineString = '''line one line two line three''' If your code is indented, for example in the body of the method of a class, your string will contain the whitespace of the indentation. The Groovy Development Kit contains methods for stripping out the indentation with the String#stripIndent() method, and with the String#stripMargin() method that takes a delimiter character to identify the text to remove from the beginning of a string. When creating a string as follows: def startingAndEndingWithANewline = ''' line one line two line three ''' You will notice that the resulting string contains a newline character as first character. It is possible to strip that character by escaping the newline with a backslash: def strippedFirstNewline = '''\ line one line two line three ''' assert !strippedFirstNewline.startsWith('\n') 4.3.1. Escaping special characters You can escape single quotes with the backslash character to avoid terminating the string literal: 'an escaped single quote: \' needs a backslash' And you can escape the escape character itself with a double backslash: 'an escaped escape character: \\ needs a double backslash' Some special characters also use the backslash as escape character: Escape sequence Character \b backspace \f formfeed \n newline \r carriage return \s single space \t tabulation \\ backslash \' single quote within a single-quoted string (and optional for triple-single-quoted and double-quoted strings) \" double quote within a double-quoted string (and optional for triple-double-quoted and single-quoted strings) We’ll see some more escaping details when it comes to other types of strings discussed later. 4.3.2. Unicode escape sequence For characters that are not present on your keyboard, you can use unicode escape sequences: a backslash, followed by 'u', then 4 hexadecimal digits. For example, the Euro currency symbol can be represented with: 'The Euro currency symbol: \u20AC' 4.4. Double-quoted string Double-quoted strings are a series of characters surrounded by double quotes: "a double-quoted string" Double-quoted strings are plain java.lang.String if there’s no interpolated expression, but are groovy.lang.GString instances if interpolation is present. To escape a double quote, you can use the backslash character: "A double quote: \"". 4.4.1. String interpolation Any Groovy expression can be interpolated in all string literals, apart from single and triple-single-quoted strings. Interpolation is the act of replacing a placeholder in the string with its value upon evaluation of the string. The placeholder expressions are surrounded by ${} . The curly braces may be omitted for unambiguous dotted expressions, i.e. we can use just a $ prefix in those cases. If the GString is ever passed to a method taking a String, the expression value inside the placeholder is evaluated to its string representation (by calling toString() on that expression) and the resulting String is passed to the method. Here, we have a string with a placeholder referencing a local variable: def name = 'Guillaume' // a plain string def greeting = "Hello ${name}" assert greeting.toString() == 'Hello Guillaume' Any Groovy expression is valid, as we can see in this example with an arithmetic expression: def sum = "The sum of 2 and 3 equals ${2 + 3}" assert sum.toString() == 'The sum of 2 and 3 equals 5' Not only are expressions allowed in between the ${} placeholder, but so are statements. However, a statement’s value is just null . So if several statements are inserted in that placeholder, the last one should somehow return a meaningful value to be inserted. For instance, "The sum of 1 and 2 is equal to ${def a = 1; def b = 2; a + b}" is supported and works as expected but a good practice is usually to stick to simple expressions inside GString placeholders. In addition to ${} placeholders, we can also use a lone $ sign prefixing a dotted expression: def person = [name: 'Guillaume', age: 36] assert "$person.name is $person.age years old" == 'Guillaume is 36 years old' But only dotted expressions of the form a.b , a.b.c , etc, are valid. Expressions containing parentheses like method calls, curly braces for closures, dots which aren’t part of a property expression or arithmetic operators would be invalid. Given the following variable definition of a number: def number = 3.14 The following statement will throw a groovy.lang.MissingPropertyException because Groovy believes you’re trying to access the toString property of that number, which doesn’t exist: shouldFail(MissingPropertyException) { println "$number.toString()" } You can think of "$number.toString()" as being interpreted by the parser as "${number.toString}()" . Similarly, if the expression is ambiguous, you need to keep the curly braces: String thing = 'treasure' assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by $thing.x" // <= Not allowed: ambiguous!! assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by ${thing}.x" // <= Curly braces required If you need to escape the $ or ${} placeholders in a GString so they appear as is without interpolation, you just need to use a \ backslash character to escape the dollar sign: assert '$5' == "\$5" assert '${name}' == "\${name}" 4.4.2. Special case of interpolating closure expressions So far, we’ve seen we could interpolate arbitrary expressions inside the ${} placeholder, but there is a special case and notation for closure expressions. When the placeholder contains an arrow, ${→} , the expression is actually a closure expression — you can think of it as a closure with a dollar prepended in front of it: def sParameterLessClosure = "1 + 2 == ${-> 3}" (1) assert sParameterLessClosure == '1 + 2 == 3' def sOneParamClosure = "1 + 2 == ${ w -> w << 3}" (2) assert sOneParamClosure == '1 + 2 == 3' 1 The closure is a parameterless closure which doesn’t take arguments. 2 Here, the closure takes a single java.io.StringWriter argument, to which you can append content with the << leftShift operator. In either case, both placeholders are embedded closures. In appearance, it looks like a more verbose way of defining expressions to be interpolated, but closures have an interesting advantage over mere expressions: lazy evaluation. Let’s consider the following sample: def number = 1 (1) def eagerGString = "value == ${number}" def lazyGString = "value == ${ -> number }" assert eagerGString == "value == 1" (2) assert lazyGString == "value == 1" (3) number = 2 (4) assert eagerGString == "value == 1" (5) assert lazyGString == "value == 2" (6) 1 We define a number variable containing 1 that we then interpolate within two GStrings, as an expression in eagerGString and as a closure in lazyGString . 2 We expect the resulting string to contain the same string value of 1 for eagerGString . 3 Similarly for lazyGString 4 Then we change the value of the variable to a new number 5 With a plain interpolated expression, the value was actually bound at the time of creation of the GString. 6 But with a closure expression, the closure is called upon each coercion of the GString into String, resulting in an updated string containing the new number value. An embedded closure expression taking more than one parameter will generate an exception at runtime. Only closures with zero or one parameter are allowed. 4.4.3. Interoperability with Java When a method (whether implemented in Java or Groovy) expects a java.lang.String , but we pass a groovy.lang.GString instance, the toString() method of the GString is automatically and transparently called. String takeString(String message) { (4) assert message instanceof String (5) return message } def message = "The message is ${'hello'}" (1) assert message instanceof GString (2) def result = takeString(message) (3) assert result instanceof String assert result == 'The message is hello' 1 We create a GString variable 2 We double-check it’s an instance of the GString 3 We then pass that GString to a method taking a String as parameter 4 The signature of the takeString() method explicitly says its sole parameter is a String 5 We also verify that the parameter is indeed a String and not a GString. 4.4.4. GString and String hashCodes Although interpolated strings can be used in lieu of plain Java strings, they differ with strings in a particular way: their hashCodes are different. Plain Java strings are immutable, whereas the resulting String representation of a GString can vary, depending on its interpolated values. Even for the same resulting string, GStrings and Strings don’t have the same hashCode. assert "one: ${1}".hashCode() != "one: 1".hashCode() GString and Strings having different hashCode values, using GString as Map keys should be avoided, especially if we try to retrieve an associated value with a String instead of a GString. def key = "a" def m = ["${key}": "letter ${key}"] (1) assert m["a"] == null (2) 1 The map is created with an initial pair whose key is a GString 2 When we try to fetch the value with a String key, we will not find it, as Strings and GString have different hashCode values 4.5. Triple-double-quoted string Triple-double-quoted strings behave like double-quoted strings, with the addition that they are multiline, like the triple-single-quoted strings. def name = 'Groovy' def template = """ Dear Mr ${name}, You're the winner of the lottery! Yours sincerly, Dave """ assert template.toString().contains('Groovy') Neither double quotes nor single quotes need be escaped in triple-double-quoted strings. 4.6. Slashy string Beyond the usual quoted strings, Groovy offers slashy strings, which use / as the opening and closing delimiter. Slashy strings are particularly useful for defining regular expressions and patterns, as there is no need to escape backslashes. Example of a slashy string: def fooPattern = /.*foo.*/ assert fooPattern == '.*foo.*' Only forward slashes need to be escaped with a backslash: def escapeSlash = /The character \/ is a forward slash/ assert escapeSlash == 'The character / is a forward slash' Slashy strings are multiline: def multilineSlashy = /one two three/ assert multilineSlashy.contains('\n') Slashy strings can be thought of as just another way to define a GString but with different escaping rules. They hence support interpolation: def color = 'blue' def interpolatedSlashy = /a ${color} car/ assert interpolatedSlashy == 'a blue car' 4.6.1. Special cases An empty slashy string cannot be represented with a double forward slash, as it’s understood by the Groovy parser as a line comment. That’s why the following assert would actually not compile as it would look like a non-terminated statement: assert '' == // As slashy strings were mostly designed to make regexp easier so a few things that are errors in GStrings like $() or $5 will work with slashy strings. Remember that escaping backslashes is not required. An alternative way of thinking of this is that in fact escaping is not supported. The slashy string /\t/ won’t contain a tab but instead a backslash followed by the character 't'. Escaping is only allowed for the slash character, i.e. /\/folder/ will be a slashy string containing '/folder' . A consequence of slash escaping is that a slashy string can’t end with a backslash. Otherwise that will escape the slashy string terminator. You can instead use a special trick, /ends with slash ${'\\'}/ . But best just avoid using a slashy string in such a case. 4.7. Dollar slashy string Dollar slashy strings are multiline GStrings delimited with an opening $/ and a closing /$ . The escaping character is the dollar sign, and it can escape another dollar, or a forward slash. Escaping for the dollar and forward slash characters is only needed where conflicts arise with the special use of those characters. The characters $foo would normally indicate a GString placeholder, so those four characters can be entered into a dollar slashy string by escaping the dollar, i.e. $$foo . Similarly, you will need to escape a dollar slashy closing delimiter if you want it to appear in your string. Here are a few examples: def name = "Guillaume" def date = "April, 1st" def dollarSlashy = $/ Hello $name, today we're ${date}. $ dollar sign $$ escaped dollar sign \ backslash / forward slash $/ escaped forward slash $$$/ escaped opening dollar slashy $/$$ escaped closing dollar slashy /$ assert [ 'Guillaume', 'April, 1st', '$ dollar sign', '$ escaped dollar sign', '\\ backslash', '/ forward slash', '/ escaped forward slash', '$/ escaped opening dollar slashy', '/$ escaped closing dollar slashy' ].every { dollarSlashy.contains(it) } It was created to overcome some of the limitations of the slashy string escaping rules. Use it when its escaping rules suit your string contents (typically if it has some slashes you don’t want to escape). 4.8. String summary table String name String syntax Interpolated Multiline Escape character Single-quoted '…​' \ Triple-single-quoted '''…​''' \ Double-quoted "…​" \ Triple-double-quoted """…​""" \ Slashy /…​/ \ Dollar slashy $/…​/$ $ 4.9. Characters Unlike Java, Groovy doesn’t have an explicit character literal. However, you can be explicit about making a Groovy string an actual character, by three different means: char c1 = 'A' (1) assert c1 instanceof Character def c2 = 'B' as char (2) assert c2 instanceof Character def c3 = (char)'C' (3) assert c3 instanceof Character 1 by being explicit when declaring a variable holding the character by specifying the char type 2 by using type coercion with the as operator 3 by using a cast to char operation The first option 1 is interesting when the character is held in a variable, while the other two ( 2 and 3 ) are more interesting when a char value must be passed as argument of a method call. 5. Numbers Groovy supports different kinds of integral literals and decimal literals, backed by the usual Number types of Java. 5.1. Integral literals The integral literal types are the same as in Java: byte char short int long java.math.BigInteger You can create integral numbers of those types with the following declarations: // primitive types byte b = 1 char c = 2 short s = 3 int i = 4 long l = 5 // infinite precision BigInteger bi = 6 If you use optional typing by using the def keyword, the type of the integral number will vary: it’ll adapt to the capacity of the type that can hold that number. For positive numbers: def a = 1 assert a instanceof Integer // Integer.MAX_VALUE def b = 2147483647 assert b instanceof Integer // Integer.MAX_VALUE + 1 def c = 2147483648 assert c instanceof Long // Long.MAX_VALUE def d = 9223372036854775807 assert d instanceof Long // Long.MAX_VALUE + 1 def e = 9223372036854775808 assert e instanceof BigInteger As well as for negative numbers: def na = -1 assert na instanceof Integer // Integer.MIN_VALUE def nb = -2147483648 assert nb instanceof Integer // Integer.MIN_VALUE - 1 def nc = -2147483649 assert nc instanceof Long // Long.MIN_VALUE def nd = -9223372036854775808 assert nd instanceof Long // Long.MIN_VALUE - 1 def ne = -9223372036854775809 assert ne instanceof BigInteger 5.1.1. Alternative non-base 10 representations Numbers can also be represented in binary, octal, hexadecimal and decimal bases. Binary literal Binary numbers start with a 0b prefix: int xInt = 0b10101111 assert xInt == 175 short xShort = 0b11001001 assert xShort == 201 as short byte xByte = 0b11 assert xByte == 3 as byte long xLong = 0b101101101101 assert xLong == 2925l BigInteger xBigInteger = 0b111100100001 assert xBigInteger == 3873g int xNegativeInt = -0b10101111 assert xNegativeInt == -175 Octal literal Octal numbers are specified in the typical format of 0 followed by octal digits. int xInt = 077 assert xInt == 63 short xShort = 011 assert xShort == 9 as short byte xByte = 032 assert xByte == 26 as byte long xLong = 0246 assert xLong == 166l BigInteger xBigInteger = 01111 assert xBigInteger == 585g int xNegativeInt = -077 assert xNegativeInt == -63 Hexadecimal literal Hexadecimal numbers are specified in the typical format of 0x followed by hex digits. int xInt = 0x77 assert xInt == 119 short xShort = 0xaa assert xShort == 170 as short byte xByte = 0x3a assert xByte == 58 as byte long xLong = 0xffff assert xLong == 65535l BigInteger xBigInteger = 0xaaaa assert xBigInteger == 43690g Double xDouble = new Double('0x1.0p0') assert xDouble == 1.0d int xNegativeInt = -0x77 assert xNegativeInt == -119 5.2. Decimal literals The decimal literal types are the same as in Java: float double java.math.BigDecimal You can create decimal numbers of those types with the following declarations: // primitive types float f = 1.234 double d = 2.345 // infinite precision BigDecimal bd = 3.456 Decimals can use exponents, with the e or E exponent letter, followed by an optional sign, and an integral number representing the exponent: assert 1e3 == 1_000.0 assert 2E4 == 20_000.0 assert 3e+1 == 30.0 assert 4E-2 == 0.04 assert 5e-1 == 0.5 Conveniently for exact decimal number calculations, Groovy chooses java.math.BigDecimal as its decimal number type. In addition, both float and double are supported, but require an explicit type declaration, type coercion or suffix. Even if BigDecimal is the default for decimal numbers, such literals are accepted in methods or closures taking float or double as parameter types. Decimal numbers can’t be represented using a binary, octal or hexadecimal representation. 5.3. Underscore in literals When writing long literal numbers, it’s harder on the eye to figure out how some numbers are grouped together, for example with groups of thousands, of words, etc. By allowing you to place underscore in number literals, it’s easier to spot those groups: long creditCardNumber = 1234_5678_9012_3456L long socialSecurityNumbers = 999_99_9999L double monetaryAmount = 12_345_132.12 long hexBytes = 0xFF_EC_DE_5E long hexWords = 0xFFEC_DE5E long maxLong = 0x7fff_ffff_ffff_ffffL long alsoMaxLong = 9_223_372_036_854_775_807L long bytes = 0b11010010_01101001_10010100_10010010 5.4. Number type suffixes We can force a number (including binary, octals and hexadecimals) to have a specific type by giving a suffix (see table below), either uppercase or lowercase. Type Suffix BigInteger G or g Long L or l Integer I or i BigDecimal G or g Double D or d Float F or f Examples: assert 42I == Integer.valueOf('42') assert 42i == Integer.valueOf('42') // lowercase i more readable assert 123L == Long.valueOf("123") // uppercase L more readable assert 2147483648 == Long.valueOf('2147483648') // Long type used, value too large for an Integer assert 456G == new BigInteger('456') assert 456g == new BigInteger('456') assert 123.45 == new BigDecimal('123.45') // default BigDecimal type used assert .321 == new BigDecimal('.321') assert 1.200065D == Double.valueOf('1.200065') assert 1.234F == Float.valueOf('1.234') assert 1.23E23D == Double.valueOf('1.23E23') assert 0b1111L.class == Long // binary assert 0xFFi.class == Integer // hexadecimal assert 034G.class == BigInteger // octal 5.5. Math operations Although operators are covered in more detail elsewhere, it’s important to discuss the behavior of math operations and what their resulting types are. Division and power binary operations aside (covered below), binary operations between byte , char , short and int result in int binary operations involving long with byte , char , short and int result in long binary operations involving BigInteger and any other integral type result in BigInteger binary operations involving BigDecimal with byte , char , short , int and BigInteger result in BigDecimal binary operations between float , double and BigDecimal result in double binary operations between two BigDecimal result in BigDecimal The following table summarizes those rules: byte char short int long BigInteger float double BigDecimal byte int int int int long BigInteger double double BigDecimal char int int int long BigInteger double double BigDecimal short int int long BigInteger double double BigDecimal int int long BigInteger double double BigDecimal long long BigInteger double double BigDecimal BigInteger BigInteger double double BigDecimal float double double double double double double BigDecimal BigDecimal Thanks to Groovy’s operator overloading, the usual arithmetic operators work as well with BigInteger and BigDecimal , unlike in Java where you have to use explicit methods for operating on those numbers. 5.5.1. The case of the division operator The division operators / (and /= for division and assignment) produce a double result if either operand is a float or double , and a BigDecimal result otherwise (when both operands are any combination of an integral type short , char , byte , int , long , BigInteger or BigDecimal ). BigDecimal division is performed with the divide() method if the division is exact (i.e. yielding a result that can be represented within the bounds of the same precision and scale), or using a MathContext with a precision of the maximum of the two operands' precision plus an extra precision of 10, and a scale of the maximum of 10 and the maximum of the operands' scale. For integer division like in Java, you should use the intdiv() method, as Groovy doesn’t provide a dedicated integer division operator symbol. 5.5.2. The case of the power operator The power operation is represented by the ** operator, with two parameters: the base and the exponent. The result of the power operation depends on its operands, and the result of the operation (in particular if the result can be represented as an integral value). The following rules are used by Groovy’s power operation to determine the resulting type: If the exponent is a decimal value if the result can be represented as an Integer , then return an Integer else if the result can be represented as a Long , then return a Long otherwise return a Double If the exponent is an integral value if the exponent is strictly negative, then return an Integer , Long or Double if the result value fits in that type if the exponent is positive or zero if the base is a BigDecimal , then return a BigDecimal result value if the base is a BigInteger , then return a BigInteger result value if the base is an Integer , then return an Integer if the result value fits in it, otherwise a BigInteger if the base is a Long , then return a Long if the result value fits in it, otherwise a BigInteger We can illustrate those rules with a few examples: // base and exponent are ints and the result can be represented by an Integer assert 2 ** 3 instanceof Integer // 8 assert 10 ** 9 instanceof Integer // 1_000_000_000 // the base is a long, so fit the result in a Long // (although it could have fit in an Integer) assert 5L ** 2 instanceof Long // 25 // the result can't be represented as an Integer or Long, so return a BigInteger assert 100 ** 10 instanceof BigInteger // 10e20 assert 1234 ** 123 instanceof BigInteger // 170515806212727042875... // the base is a BigDecimal and the exponent a negative int // but the result can be represented as an Integer assert 0.5 ** -2 instanceof Integer // 4 // the base is an int, and the exponent a negative float // but again, the result can be represented as an Integer assert 1 ** -0.3f instanceof Integer // 1 // the base is an int, and the exponent a negative int // but the result will be calculated as a Double // (both base and exponent are actually converted to doubles) assert 10 ** -1 instanceof Double // 0.1 // the base is a BigDecimal, and the exponent is an int, so return a BigDecimal assert 1.2 ** 10 instanceof BigDecimal // 6.1917364224 // the base is a float or double, and the exponent is an int // but the result can only be represented as a Double value assert 3.4f ** 5 instanceof Double // 454.35430372146965 assert 5.6d ** 2 instanceof Double // 31.359999999999996 // the exponent is a decimal value // and the result can only be represented as a Double value assert 7.8 ** 1.9 instanceof Double // 49.542708423868476 assert 2 ** 0.1f instanceof Double // 1.0717734636432956 6. Booleans Boolean is a special data type that is used to represent truth values: true and false . Use this data type for simple flags that track true/false conditions . Boolean values can be stored in variables, assigned into fields, just like any other data type: def myBooleanVariable = true boolean untypedBooleanVar = false booleanField = true true and false are the only two primitive boolean values. But more complex boolean expressions can be represented using logical operators . In addition, Groovy has special rules (often referred to as Groovy Truth ) for coercing non-boolean objects to a boolean value. 7. Lists Groovy uses a comma-separated list of values, surrounded by square brackets, to denote lists. Groovy lists are plain JDK java.util.List , as Groovy doesn’t define its own collection classes. The concrete list implementation used when defining list literals are java.util.ArrayList by default, unless you decide to specify otherwise, as we shall see later on. def numbers = [1, 2, 3] (1) assert numbers instanceof List (2) assert numbers.size() == 3 (3) 1 We define a list numbers delimited by commas and surrounded by square brackets, and we assign that list into a variable 2 The list is an instance of Java’s java.util.List interface 3 The size of the list can be queried with the size() method, and shows our list contains 3 elements In the above example, we used a homogeneous list, but you can also create lists containing values of heterogeneous types: def heterogeneous = [1, "a", true] (1) 1 Our list here contains a number, a string and a boolean value We mentioned that by default, list literals are actually instances of java.util.ArrayList , but it is possible to use a different backing type for our lists, thanks to using type coercion with the as operator, or with explicit type declaration for your variables: def arrayList = [1, 2, 3] assert arrayList instanceof java.util.ArrayList def linkedList = [2, 3, 4] as LinkedList (1) assert linkedList instanceof java.util.LinkedList LinkedList otherLinked = [3, 4, 5] (2) assert otherLinked instanceof java.util.LinkedList 1 We use coercion with the as operator to explicitly request a java.util.LinkedList implementation 2 We can say that the variable holding the list literal is of type java.util.LinkedList You can access elements of the list with the [] subscript operator (both for reading and setting values) with positive indices or negative indices to access elements from the end of the list, as well as with ranges, and use the << leftShift operator to append elements to a list: def letters = ['a', 'b', 'c', 'd'] assert letters[0] == 'a' (1) assert letters[1] == 'b' assert letters[-1] == 'd' (2) assert letters[-2] == 'c' letters[2] = 'C' (3) assert letters[2] == 'C' letters << 'e' (4) assert letters[ 4] == 'e' assert letters[-1] == 'e' assert letters[1, 3] == ['b', 'd'] (5) assert letters[2..4] == ['C', 'd', 'e'] (6) 1 Access the first element of the list (zero-based counting) 2 Access the last element of the list with a negative index: -1 is the first element from the end of the list 3 Use an assignment to set a new value for the third element of the list 4 Use the << leftShift operator to append an element at the end of the list 5 Access two elements at once, returning a new list containing those two elements 6 Use a range to access a range of values from the list, from a start to an end element position As lists can be heterogeneous in nature, lists can also contain other lists to create multidimensional lists: def multi = [[0, 1], [2, 3]] (1) assert multi[1][0] == 2 (2) 1 Define a list of numbers 2 Access the second element of the top-most list, and the first element of the inner list 8. Arrays Groovy reuses the list notation for arrays, but to make such literals arrays, you need to explicitly define the type of the array through coercion or type declaration. String[] arrStr = ['Ananas', 'Banana', 'Kiwi'] (1) assert arrStr instanceof String[] (2) assert !(arrStr instanceof List) def numArr = [1, 2, 3] as int[] (3) assert numArr instanceof int[] (4) assert numArr.size() == 3 1 Define an array of strings using explicit variable type declaration 2 Assert that we created an array of strings 3 Create an array of ints with the as operator 4 Assert that we created an array of primitive ints You can also create multi-dimensional arrays: def matrix3 = new Integer[3][3] (1) assert matrix3.size() == 3 Integer[][] matrix2 (2) matrix2 = [[1, 2], [3, 4]] assert matrix2 instanceof Integer[][] 1 You can define the bounds of a new array 2 Or declare an array without specifying its bounds Access to elements of an array follows the same notation as for lists: String[] names = ['Cédric', 'Guillaume', 'Jochen', 'Paul'] assert names[0] == 'Cédric' (1) names[2] = 'Blackdrag' (2) assert names[2] == 'Blackdrag' 1 Retrieve the first element of the array 2 Set the value of the third element of the array to a new value 8.1. Java-style array initialization Groovy has always supported literal list/array definitions using square brackets and has avoided Java-style curly braces so as not to conflict with closure definitions. In the case where the curly braces come immediately after an array type declaration however, there is no ambiguity with closure definitions, so Groovy 3 and above support that variant of the Java array initialization expression. Examples: def primes = new int[] {2, 3, 5, 7, 11} assert primes.size() == 5 && primes.sum() == 28 assert primes.class.name == '[I' def pets = new String[] {'cat', 'dog'} assert pets.size() == 2 && pets.sum() == 'catdog' assert pets.class.name == '[Ljava.lang.String;' // traditional Groovy alternative still supported String[] groovyBooks = [ 'Groovy in Action', 'Making Java Groovy' ] assert groovyBooks.every{ it.contains('Groovy') } 9. Maps Sometimes called dictionaries or associative arrays in other languages, Groovy features maps. Maps associate keys to values, separating keys and values with colons, and each key/value pairs with commas, and the whole keys and values surrounded by square brackets. def colors = [red: '#FF0000', green: '#00FF00', blue: '#0000FF'] (1) assert colors['red'] == '#FF0000' (2) assert colors.green == '#00FF00' (3) colors['pink'] = '#FF00FF' (4) colors.yellow = '#FFFF00' (5) assert colors.pink == '#FF00FF' assert colors['yellow'] == '#FFFF00' assert colors instanceof java.util.LinkedHashMap 1 We define a map of string color names, associated with their hexadecimal-coded html colors 2 We use the subscript notation to check the content associated with the red key 3 We can also use the property notation to assert the color green’s hexadecimal representation 4 Similarly, we can use the subscript notation to add a new key/value pair 5 Or the property notation, to add the yellow color When using names for the keys, we actually define string keys in the map. Groovy creates maps that are actually instances of java.util.LinkedHashMap . If you try to access a key which is not present in the map: assert colors.unknown == null def emptyMap = [:] assert emptyMap.anyKey == null You will retrieve a null result. In the examples above, we used string keys, but you can also use values of other types as keys: def numbers = [1: 'one', 2: 'two'] assert numbers[1] == 'one' Here, we used numbers as keys, as numbers can unambiguously be recognized as numbers, so Groovy will not create a string key like in our previous examples. But consider the case you want to pass a variable in lieu of the key, to have the value of that variable become the key: def key = 'name' def person = [key: 'Guillaume'] (1) assert !person.containsKey('name') (2) assert person.containsKey('key') (3) 1 The key associated with the 'Guillaume' name will actually be the "key" string, not the value associated with the key variable 2 The map doesn’t contain the 'name' key 3 Instead, the map contains a 'key' key You can also pass quoted strings as well as keys: ["name": "Guillaume"]. This is mandatory if your key string isn’t a valid identifier, for example if you wanted to create a string key containing a dash like in: ["street-name": "Main street"]. When you need to pass variable values as keys in your map definitions, you must surround the variable or expression with parentheses: person = [(key): 'Guillaume'] (1) assert person.containsKey('name') (2) assert !person.containsKey('key') (3) 1 This time, we surround the key variable with parentheses, to instruct the parser we are passing a variable rather than defining a string key 2 The map does contain the name key 3 But the map doesn’t contain the key key as before Groovy Learn Documentation Download Support Contribute Ecosystem Blog posts About Source code Security Books Thanks Sponsorship FAQ Search Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community The Groovy programming language is supported by the Apache Software Foundation and the Groovy community. Apache, Apache Groovy, Groovy, and the ASF logo are either registered trademarks or trademarks of The Apache Software Foundation. © 2003-2025 the Apache Groovy project — Groovy is Open Source: license , privacy policy .
2026-01-13T09:29:32
http://groovy-lang.org/syntax.html#_multiline_comment
The Apache Groovy programming language - Syntax Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community You are using an outdated browser. Please upgrade your browser to improve your experience. Apache Groovy™ Learn Documentation Download Support Contribute Ecosystem Blog posts Socialize Table of contents 1. Comments 1.1. Single-line comment 1.2. Multiline comment 1.3. Groovydoc comment 1.4. Shebang line 2. Keywords 3. Identifiers 3.1. Normal identifiers 3.2. Quoted identifiers 4. Strings 4.1. Single-quoted string 4.2. String concatenation 4.3. Triple-single-quoted string 4.3.1. Escaping special characters 4.3.2. Unicode escape sequence 4.4. Double-quoted string 4.4.1. String interpolation 4.4.2. Special case of interpolating closure expressions 4.4.3. Interoperability with Java 4.4.4. GString and String hashCodes 4.5. Triple-double-quoted string 4.6. Slashy string 4.6.1. Special cases 4.7. Dollar slashy string 4.8. String summary table 4.9. Characters 5. Numbers 5.1. Integral literals 5.1.1. Alternative non-base 10 representations Binary literal Octal literal Hexadecimal literal 5.2. Decimal literals 5.3. Underscore in literals 5.4. Number type suffixes 5.5. Math operations 5.5.1. The case of the division operator 5.5.2. The case of the power operator 6. Booleans 7. Lists 8. Arrays 8.1. Java-style array initialization 9. Maps Syntax This chapter covers the syntax of the Groovy programming language. The grammar of the language derives from the Java grammar, but enhances it with specific constructs for Groovy, and allows certain simplifications. 1. Comments 1.1. Single-line comment Single-line comments start with // and can be found at any position in the line. The characters following // , until the end of the line, are considered part of the comment. // a standalone single line comment println "hello" // a comment till the end of the line 1.2. Multiline comment A multiline comment starts with /* and can be found at any position in the line. The characters following /* will be considered part of the comment, including new line characters, up to the first */ closing the comment. Multiline comments can thus be put at the end of a statement, or even inside a statement. /* a standalone multiline comment spanning two lines */ println "hello" /* a multiline comment starting at the end of a statement */ println 1 /* one */ + 2 /* two */ 1.3. Groovydoc comment Similarly to multiline comments, Groovydoc comments are multiline, but start with /** and end with */ . Lines following the first Groovydoc comment line can optionally start with a star * . Those comments are associated with: type definitions (classes, interfaces, enums, annotations), fields and properties definitions methods definitions Although the compiler will not complain about Groovydoc comments not being associated with the above language elements, you should prepend those constructs with the comment right before it. /** * A Class description */ class Person { /** the name of the person */ String name /** * Creates a greeting method for a certain person. * * @param otherPerson the person to greet * @return a greeting message */ String greet(String otherPerson) { "Hello ${otherPerson}" } } Groovydoc follows the same conventions as Java’s own Javadoc. So you’ll be able to use the same tags as with Javadoc. In addition, Groovy supports Runtime Groovydoc since 3.0.0, i.e. Groovydoc can be retained at runtime. Runtime Groovydoc is disabled by default. It can be enabled by adding JVM option -Dgroovy.attach.runtime.groovydoc=true The Runtime Groovydoc starts with /**@ and ends with */ , for example: /**@ * Some class groovydoc for Foo */ class Foo { /**@ * Some method groovydoc for bar */ void bar() { } } assert Foo.class.groovydoc.content.contains('Some class groovydoc for Foo') (1) assert Foo.class.getMethod('bar', new Class[0]).groovydoc.content.contains('Some method groovydoc for bar') (2) 1 Get the runtime groovydoc for class Foo 2 Get the runtime groovydoc for method bar 1.4. Shebang line Beside the single-line comment, there is a special line comment, often called the shebang line understood by UNIX systems which allows scripts to be run directly from the command-line, provided you have installed the Groovy distribution and the groovy command is available on the PATH . #!/usr/bin/env groovy println "Hello from the shebang line" The # character must be the first character of the file. Any indentation would yield a compilation error. 2. Keywords Groovy has the following reserved keywords: Table 1. Reserved Keywords abstract assert break case catch class const continue def default do else enum extends final finally for goto if implements import instanceof interface native new null non-sealed package public protected private return static strictfp super switch synchronized this threadsafe throw throws transient try while Of these, const , goto , strictfp , and threadsafe are not currently in use. The reserved keywords can’t in general be used for variable, field and method names. A trick allows methods to be defined having the same name as a keyword by surrounding the name in quotes as shown in the following example: // reserved keywords can be used for method names if quoted def "abstract"() { true } // when calling such methods, the name must be qualified using "this." this.abstract() Using such names might be confusing and is often best to avoid. The trick is primarily intended to enable certain Java integration scenarios and certain DSL scenarios where having "verbs" and "nouns" with the same name as keywords may be desirable. In addition, Groovy has the following contextual keywords: Table 2. Contextual Keywords as in permits record sealed trait var yields These words are only keywords in certain contexts and can be more freely used in some places, in particular for variables, fields and method names. This extra lenience allows using method or variable names that were not keywords in earlier versions of Groovy or are not keywords in Java. Examples are shown here: // contextual keywords can be used for field and variable names def as = true assert as // contextual keywords can be used for method names def in() { true } // when calling such methods, the name only needs to be qualified using "this." in scenarios which would be ambiguous this.in() Groovy programmers familiar with these contextual keywords may still wish to avoid using those names unless there is a good reason to use such a name. The restrictions on reserved keywords also apply for the primitive types, the boolean literals and the null literal (all of which are discussed later): Table 3. Other reserved words null true false boolean char byte short int long float double While not recommended, the same trick as for reserved keywords can be used: def "null"() { true } // not recommended; potentially confusing assert this.null() // must be qualified Using such words as method names is potentially confusing and is often best to avoid, however, it might be useful for certain kinds of DSLs . 3. Identifiers 3.1. Normal identifiers Identifiers start with a letter, a dollar or an underscore. They cannot start with a number. A letter can be in the following ranges: 'a' to 'z' (lowercase ascii letter) 'A' to 'Z' (uppercase ascii letter) '\u00C0' to '\u00D6' '\u00D8' to '\u00F6' '\u00F8' to '\u00FF' '\u0100' to '\uFFFE' Then following characters can contain letters and numbers. Here are a few examples of valid identifiers (here, variable names): def name def item3 def with_underscore def $dollarStart But the following ones are invalid identifiers: def 3tier def a+b def a#b All keywords are also valid identifiers when following a dot: foo.as foo.assert foo.break foo.case foo.catch 3.2. Quoted identifiers Quoted identifiers appear after the dot of a dotted expression. For instance, the name part of the person.name expression can be quoted with person."name" or person.'name' . This is particularly interesting when certain identifiers contain illegal characters that are forbidden by the Java Language Specification, but which are allowed by Groovy when quoted. For example, characters like a dash, a space, an exclamation mark, etc. def map = [:] map."an identifier with a space and double quotes" = "ALLOWED" map.'with-dash-signs-and-single-quotes' = "ALLOWED" assert map."an identifier with a space and double quotes" == "ALLOWED" assert map.'with-dash-signs-and-single-quotes' == "ALLOWED" As we shall see in the following section on strings , Groovy provides different string literals. All kind of strings are actually allowed after the dot: map.'single quote' map."double quote" map.'''triple single quote''' map."""triple double quote""" map./slashy string/ map.$/dollar slashy string/$ There’s a difference between plain character strings and Groovy’s GStrings (interpolated strings), as in that the latter case, the interpolated values are inserted in the final string for evaluating the whole identifier: def firstname = "Homer" map."Simpson-${firstname}" = "Homer Simpson" assert map.'Simpson-Homer' == "Homer Simpson" 4. Strings Text literals are represented in the form of chain of characters called strings. Groovy lets you instantiate java.lang.String objects, as well as GStrings ( groovy.lang.GString ) which are also called interpolated strings in other programming languages. 4.1. Single-quoted string Single-quoted strings are a series of characters surrounded by single quotes: 'a single-quoted string' Single-quoted strings are plain java.lang.String and don’t support interpolation. 4.2. String concatenation All the Groovy strings can be concatenated with the + operator: assert 'ab' == 'a' + 'b' 4.3. Triple-single-quoted string Triple-single-quoted strings are a series of characters surrounded by triplets of single quotes: '''a triple-single-quoted string''' Triple-single-quoted strings are plain java.lang.String and don’t support interpolation. Triple-single-quoted strings may span multiple lines. The content of the string can cross line boundaries without the need to split the string in several pieces and without concatenation or newline escape characters: def aMultilineString = '''line one line two line three''' If your code is indented, for example in the body of the method of a class, your string will contain the whitespace of the indentation. The Groovy Development Kit contains methods for stripping out the indentation with the String#stripIndent() method, and with the String#stripMargin() method that takes a delimiter character to identify the text to remove from the beginning of a string. When creating a string as follows: def startingAndEndingWithANewline = ''' line one line two line three ''' You will notice that the resulting string contains a newline character as first character. It is possible to strip that character by escaping the newline with a backslash: def strippedFirstNewline = '''\ line one line two line three ''' assert !strippedFirstNewline.startsWith('\n') 4.3.1. Escaping special characters You can escape single quotes with the backslash character to avoid terminating the string literal: 'an escaped single quote: \' needs a backslash' And you can escape the escape character itself with a double backslash: 'an escaped escape character: \\ needs a double backslash' Some special characters also use the backslash as escape character: Escape sequence Character \b backspace \f formfeed \n newline \r carriage return \s single space \t tabulation \\ backslash \' single quote within a single-quoted string (and optional for triple-single-quoted and double-quoted strings) \" double quote within a double-quoted string (and optional for triple-double-quoted and single-quoted strings) We’ll see some more escaping details when it comes to other types of strings discussed later. 4.3.2. Unicode escape sequence For characters that are not present on your keyboard, you can use unicode escape sequences: a backslash, followed by 'u', then 4 hexadecimal digits. For example, the Euro currency symbol can be represented with: 'The Euro currency symbol: \u20AC' 4.4. Double-quoted string Double-quoted strings are a series of characters surrounded by double quotes: "a double-quoted string" Double-quoted strings are plain java.lang.String if there’s no interpolated expression, but are groovy.lang.GString instances if interpolation is present. To escape a double quote, you can use the backslash character: "A double quote: \"". 4.4.1. String interpolation Any Groovy expression can be interpolated in all string literals, apart from single and triple-single-quoted strings. Interpolation is the act of replacing a placeholder in the string with its value upon evaluation of the string. The placeholder expressions are surrounded by ${} . The curly braces may be omitted for unambiguous dotted expressions, i.e. we can use just a $ prefix in those cases. If the GString is ever passed to a method taking a String, the expression value inside the placeholder is evaluated to its string representation (by calling toString() on that expression) and the resulting String is passed to the method. Here, we have a string with a placeholder referencing a local variable: def name = 'Guillaume' // a plain string def greeting = "Hello ${name}" assert greeting.toString() == 'Hello Guillaume' Any Groovy expression is valid, as we can see in this example with an arithmetic expression: def sum = "The sum of 2 and 3 equals ${2 + 3}" assert sum.toString() == 'The sum of 2 and 3 equals 5' Not only are expressions allowed in between the ${} placeholder, but so are statements. However, a statement’s value is just null . So if several statements are inserted in that placeholder, the last one should somehow return a meaningful value to be inserted. For instance, "The sum of 1 and 2 is equal to ${def a = 1; def b = 2; a + b}" is supported and works as expected but a good practice is usually to stick to simple expressions inside GString placeholders. In addition to ${} placeholders, we can also use a lone $ sign prefixing a dotted expression: def person = [name: 'Guillaume', age: 36] assert "$person.name is $person.age years old" == 'Guillaume is 36 years old' But only dotted expressions of the form a.b , a.b.c , etc, are valid. Expressions containing parentheses like method calls, curly braces for closures, dots which aren’t part of a property expression or arithmetic operators would be invalid. Given the following variable definition of a number: def number = 3.14 The following statement will throw a groovy.lang.MissingPropertyException because Groovy believes you’re trying to access the toString property of that number, which doesn’t exist: shouldFail(MissingPropertyException) { println "$number.toString()" } You can think of "$number.toString()" as being interpreted by the parser as "${number.toString}()" . Similarly, if the expression is ambiguous, you need to keep the curly braces: String thing = 'treasure' assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by $thing.x" // <= Not allowed: ambiguous!! assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by ${thing}.x" // <= Curly braces required If you need to escape the $ or ${} placeholders in a GString so they appear as is without interpolation, you just need to use a \ backslash character to escape the dollar sign: assert '$5' == "\$5" assert '${name}' == "\${name}" 4.4.2. Special case of interpolating closure expressions So far, we’ve seen we could interpolate arbitrary expressions inside the ${} placeholder, but there is a special case and notation for closure expressions. When the placeholder contains an arrow, ${→} , the expression is actually a closure expression — you can think of it as a closure with a dollar prepended in front of it: def sParameterLessClosure = "1 + 2 == ${-> 3}" (1) assert sParameterLessClosure == '1 + 2 == 3' def sOneParamClosure = "1 + 2 == ${ w -> w << 3}" (2) assert sOneParamClosure == '1 + 2 == 3' 1 The closure is a parameterless closure which doesn’t take arguments. 2 Here, the closure takes a single java.io.StringWriter argument, to which you can append content with the << leftShift operator. In either case, both placeholders are embedded closures. In appearance, it looks like a more verbose way of defining expressions to be interpolated, but closures have an interesting advantage over mere expressions: lazy evaluation. Let’s consider the following sample: def number = 1 (1) def eagerGString = "value == ${number}" def lazyGString = "value == ${ -> number }" assert eagerGString == "value == 1" (2) assert lazyGString == "value == 1" (3) number = 2 (4) assert eagerGString == "value == 1" (5) assert lazyGString == "value == 2" (6) 1 We define a number variable containing 1 that we then interpolate within two GStrings, as an expression in eagerGString and as a closure in lazyGString . 2 We expect the resulting string to contain the same string value of 1 for eagerGString . 3 Similarly for lazyGString 4 Then we change the value of the variable to a new number 5 With a plain interpolated expression, the value was actually bound at the time of creation of the GString. 6 But with a closure expression, the closure is called upon each coercion of the GString into String, resulting in an updated string containing the new number value. An embedded closure expression taking more than one parameter will generate an exception at runtime. Only closures with zero or one parameter are allowed. 4.4.3. Interoperability with Java When a method (whether implemented in Java or Groovy) expects a java.lang.String , but we pass a groovy.lang.GString instance, the toString() method of the GString is automatically and transparently called. String takeString(String message) { (4) assert message instanceof String (5) return message } def message = "The message is ${'hello'}" (1) assert message instanceof GString (2) def result = takeString(message) (3) assert result instanceof String assert result == 'The message is hello' 1 We create a GString variable 2 We double-check it’s an instance of the GString 3 We then pass that GString to a method taking a String as parameter 4 The signature of the takeString() method explicitly says its sole parameter is a String 5 We also verify that the parameter is indeed a String and not a GString. 4.4.4. GString and String hashCodes Although interpolated strings can be used in lieu of plain Java strings, they differ with strings in a particular way: their hashCodes are different. Plain Java strings are immutable, whereas the resulting String representation of a GString can vary, depending on its interpolated values. Even for the same resulting string, GStrings and Strings don’t have the same hashCode. assert "one: ${1}".hashCode() != "one: 1".hashCode() GString and Strings having different hashCode values, using GString as Map keys should be avoided, especially if we try to retrieve an associated value with a String instead of a GString. def key = "a" def m = ["${key}": "letter ${key}"] (1) assert m["a"] == null (2) 1 The map is created with an initial pair whose key is a GString 2 When we try to fetch the value with a String key, we will not find it, as Strings and GString have different hashCode values 4.5. Triple-double-quoted string Triple-double-quoted strings behave like double-quoted strings, with the addition that they are multiline, like the triple-single-quoted strings. def name = 'Groovy' def template = """ Dear Mr ${name}, You're the winner of the lottery! Yours sincerly, Dave """ assert template.toString().contains('Groovy') Neither double quotes nor single quotes need be escaped in triple-double-quoted strings. 4.6. Slashy string Beyond the usual quoted strings, Groovy offers slashy strings, which use / as the opening and closing delimiter. Slashy strings are particularly useful for defining regular expressions and patterns, as there is no need to escape backslashes. Example of a slashy string: def fooPattern = /.*foo.*/ assert fooPattern == '.*foo.*' Only forward slashes need to be escaped with a backslash: def escapeSlash = /The character \/ is a forward slash/ assert escapeSlash == 'The character / is a forward slash' Slashy strings are multiline: def multilineSlashy = /one two three/ assert multilineSlashy.contains('\n') Slashy strings can be thought of as just another way to define a GString but with different escaping rules. They hence support interpolation: def color = 'blue' def interpolatedSlashy = /a ${color} car/ assert interpolatedSlashy == 'a blue car' 4.6.1. Special cases An empty slashy string cannot be represented with a double forward slash, as it’s understood by the Groovy parser as a line comment. That’s why the following assert would actually not compile as it would look like a non-terminated statement: assert '' == // As slashy strings were mostly designed to make regexp easier so a few things that are errors in GStrings like $() or $5 will work with slashy strings. Remember that escaping backslashes is not required. An alternative way of thinking of this is that in fact escaping is not supported. The slashy string /\t/ won’t contain a tab but instead a backslash followed by the character 't'. Escaping is only allowed for the slash character, i.e. /\/folder/ will be a slashy string containing '/folder' . A consequence of slash escaping is that a slashy string can’t end with a backslash. Otherwise that will escape the slashy string terminator. You can instead use a special trick, /ends with slash ${'\\'}/ . But best just avoid using a slashy string in such a case. 4.7. Dollar slashy string Dollar slashy strings are multiline GStrings delimited with an opening $/ and a closing /$ . The escaping character is the dollar sign, and it can escape another dollar, or a forward slash. Escaping for the dollar and forward slash characters is only needed where conflicts arise with the special use of those characters. The characters $foo would normally indicate a GString placeholder, so those four characters can be entered into a dollar slashy string by escaping the dollar, i.e. $$foo . Similarly, you will need to escape a dollar slashy closing delimiter if you want it to appear in your string. Here are a few examples: def name = "Guillaume" def date = "April, 1st" def dollarSlashy = $/ Hello $name, today we're ${date}. $ dollar sign $$ escaped dollar sign \ backslash / forward slash $/ escaped forward slash $$$/ escaped opening dollar slashy $/$$ escaped closing dollar slashy /$ assert [ 'Guillaume', 'April, 1st', '$ dollar sign', '$ escaped dollar sign', '\\ backslash', '/ forward slash', '/ escaped forward slash', '$/ escaped opening dollar slashy', '/$ escaped closing dollar slashy' ].every { dollarSlashy.contains(it) } It was created to overcome some of the limitations of the slashy string escaping rules. Use it when its escaping rules suit your string contents (typically if it has some slashes you don’t want to escape). 4.8. String summary table String name String syntax Interpolated Multiline Escape character Single-quoted '…​' \ Triple-single-quoted '''…​''' \ Double-quoted "…​" \ Triple-double-quoted """…​""" \ Slashy /…​/ \ Dollar slashy $/…​/$ $ 4.9. Characters Unlike Java, Groovy doesn’t have an explicit character literal. However, you can be explicit about making a Groovy string an actual character, by three different means: char c1 = 'A' (1) assert c1 instanceof Character def c2 = 'B' as char (2) assert c2 instanceof Character def c3 = (char)'C' (3) assert c3 instanceof Character 1 by being explicit when declaring a variable holding the character by specifying the char type 2 by using type coercion with the as operator 3 by using a cast to char operation The first option 1 is interesting when the character is held in a variable, while the other two ( 2 and 3 ) are more interesting when a char value must be passed as argument of a method call. 5. Numbers Groovy supports different kinds of integral literals and decimal literals, backed by the usual Number types of Java. 5.1. Integral literals The integral literal types are the same as in Java: byte char short int long java.math.BigInteger You can create integral numbers of those types with the following declarations: // primitive types byte b = 1 char c = 2 short s = 3 int i = 4 long l = 5 // infinite precision BigInteger bi = 6 If you use optional typing by using the def keyword, the type of the integral number will vary: it’ll adapt to the capacity of the type that can hold that number. For positive numbers: def a = 1 assert a instanceof Integer // Integer.MAX_VALUE def b = 2147483647 assert b instanceof Integer // Integer.MAX_VALUE + 1 def c = 2147483648 assert c instanceof Long // Long.MAX_VALUE def d = 9223372036854775807 assert d instanceof Long // Long.MAX_VALUE + 1 def e = 9223372036854775808 assert e instanceof BigInteger As well as for negative numbers: def na = -1 assert na instanceof Integer // Integer.MIN_VALUE def nb = -2147483648 assert nb instanceof Integer // Integer.MIN_VALUE - 1 def nc = -2147483649 assert nc instanceof Long // Long.MIN_VALUE def nd = -9223372036854775808 assert nd instanceof Long // Long.MIN_VALUE - 1 def ne = -9223372036854775809 assert ne instanceof BigInteger 5.1.1. Alternative non-base 10 representations Numbers can also be represented in binary, octal, hexadecimal and decimal bases. Binary literal Binary numbers start with a 0b prefix: int xInt = 0b10101111 assert xInt == 175 short xShort = 0b11001001 assert xShort == 201 as short byte xByte = 0b11 assert xByte == 3 as byte long xLong = 0b101101101101 assert xLong == 2925l BigInteger xBigInteger = 0b111100100001 assert xBigInteger == 3873g int xNegativeInt = -0b10101111 assert xNegativeInt == -175 Octal literal Octal numbers are specified in the typical format of 0 followed by octal digits. int xInt = 077 assert xInt == 63 short xShort = 011 assert xShort == 9 as short byte xByte = 032 assert xByte == 26 as byte long xLong = 0246 assert xLong == 166l BigInteger xBigInteger = 01111 assert xBigInteger == 585g int xNegativeInt = -077 assert xNegativeInt == -63 Hexadecimal literal Hexadecimal numbers are specified in the typical format of 0x followed by hex digits. int xInt = 0x77 assert xInt == 119 short xShort = 0xaa assert xShort == 170 as short byte xByte = 0x3a assert xByte == 58 as byte long xLong = 0xffff assert xLong == 65535l BigInteger xBigInteger = 0xaaaa assert xBigInteger == 43690g Double xDouble = new Double('0x1.0p0') assert xDouble == 1.0d int xNegativeInt = -0x77 assert xNegativeInt == -119 5.2. Decimal literals The decimal literal types are the same as in Java: float double java.math.BigDecimal You can create decimal numbers of those types with the following declarations: // primitive types float f = 1.234 double d = 2.345 // infinite precision BigDecimal bd = 3.456 Decimals can use exponents, with the e or E exponent letter, followed by an optional sign, and an integral number representing the exponent: assert 1e3 == 1_000.0 assert 2E4 == 20_000.0 assert 3e+1 == 30.0 assert 4E-2 == 0.04 assert 5e-1 == 0.5 Conveniently for exact decimal number calculations, Groovy chooses java.math.BigDecimal as its decimal number type. In addition, both float and double are supported, but require an explicit type declaration, type coercion or suffix. Even if BigDecimal is the default for decimal numbers, such literals are accepted in methods or closures taking float or double as parameter types. Decimal numbers can’t be represented using a binary, octal or hexadecimal representation. 5.3. Underscore in literals When writing long literal numbers, it’s harder on the eye to figure out how some numbers are grouped together, for example with groups of thousands, of words, etc. By allowing you to place underscore in number literals, it’s easier to spot those groups: long creditCardNumber = 1234_5678_9012_3456L long socialSecurityNumbers = 999_99_9999L double monetaryAmount = 12_345_132.12 long hexBytes = 0xFF_EC_DE_5E long hexWords = 0xFFEC_DE5E long maxLong = 0x7fff_ffff_ffff_ffffL long alsoMaxLong = 9_223_372_036_854_775_807L long bytes = 0b11010010_01101001_10010100_10010010 5.4. Number type suffixes We can force a number (including binary, octals and hexadecimals) to have a specific type by giving a suffix (see table below), either uppercase or lowercase. Type Suffix BigInteger G or g Long L or l Integer I or i BigDecimal G or g Double D or d Float F or f Examples: assert 42I == Integer.valueOf('42') assert 42i == Integer.valueOf('42') // lowercase i more readable assert 123L == Long.valueOf("123") // uppercase L more readable assert 2147483648 == Long.valueOf('2147483648') // Long type used, value too large for an Integer assert 456G == new BigInteger('456') assert 456g == new BigInteger('456') assert 123.45 == new BigDecimal('123.45') // default BigDecimal type used assert .321 == new BigDecimal('.321') assert 1.200065D == Double.valueOf('1.200065') assert 1.234F == Float.valueOf('1.234') assert 1.23E23D == Double.valueOf('1.23E23') assert 0b1111L.class == Long // binary assert 0xFFi.class == Integer // hexadecimal assert 034G.class == BigInteger // octal 5.5. Math operations Although operators are covered in more detail elsewhere, it’s important to discuss the behavior of math operations and what their resulting types are. Division and power binary operations aside (covered below), binary operations between byte , char , short and int result in int binary operations involving long with byte , char , short and int result in long binary operations involving BigInteger and any other integral type result in BigInteger binary operations involving BigDecimal with byte , char , short , int and BigInteger result in BigDecimal binary operations between float , double and BigDecimal result in double binary operations between two BigDecimal result in BigDecimal The following table summarizes those rules: byte char short int long BigInteger float double BigDecimal byte int int int int long BigInteger double double BigDecimal char int int int long BigInteger double double BigDecimal short int int long BigInteger double double BigDecimal int int long BigInteger double double BigDecimal long long BigInteger double double BigDecimal BigInteger BigInteger double double BigDecimal float double double double double double double BigDecimal BigDecimal Thanks to Groovy’s operator overloading, the usual arithmetic operators work as well with BigInteger and BigDecimal , unlike in Java where you have to use explicit methods for operating on those numbers. 5.5.1. The case of the division operator The division operators / (and /= for division and assignment) produce a double result if either operand is a float or double , and a BigDecimal result otherwise (when both operands are any combination of an integral type short , char , byte , int , long , BigInteger or BigDecimal ). BigDecimal division is performed with the divide() method if the division is exact (i.e. yielding a result that can be represented within the bounds of the same precision and scale), or using a MathContext with a precision of the maximum of the two operands' precision plus an extra precision of 10, and a scale of the maximum of 10 and the maximum of the operands' scale. For integer division like in Java, you should use the intdiv() method, as Groovy doesn’t provide a dedicated integer division operator symbol. 5.5.2. The case of the power operator The power operation is represented by the ** operator, with two parameters: the base and the exponent. The result of the power operation depends on its operands, and the result of the operation (in particular if the result can be represented as an integral value). The following rules are used by Groovy’s power operation to determine the resulting type: If the exponent is a decimal value if the result can be represented as an Integer , then return an Integer else if the result can be represented as a Long , then return a Long otherwise return a Double If the exponent is an integral value if the exponent is strictly negative, then return an Integer , Long or Double if the result value fits in that type if the exponent is positive or zero if the base is a BigDecimal , then return a BigDecimal result value if the base is a BigInteger , then return a BigInteger result value if the base is an Integer , then return an Integer if the result value fits in it, otherwise a BigInteger if the base is a Long , then return a Long if the result value fits in it, otherwise a BigInteger We can illustrate those rules with a few examples: // base and exponent are ints and the result can be represented by an Integer assert 2 ** 3 instanceof Integer // 8 assert 10 ** 9 instanceof Integer // 1_000_000_000 // the base is a long, so fit the result in a Long // (although it could have fit in an Integer) assert 5L ** 2 instanceof Long // 25 // the result can't be represented as an Integer or Long, so return a BigInteger assert 100 ** 10 instanceof BigInteger // 10e20 assert 1234 ** 123 instanceof BigInteger // 170515806212727042875... // the base is a BigDecimal and the exponent a negative int // but the result can be represented as an Integer assert 0.5 ** -2 instanceof Integer // 4 // the base is an int, and the exponent a negative float // but again, the result can be represented as an Integer assert 1 ** -0.3f instanceof Integer // 1 // the base is an int, and the exponent a negative int // but the result will be calculated as a Double // (both base and exponent are actually converted to doubles) assert 10 ** -1 instanceof Double // 0.1 // the base is a BigDecimal, and the exponent is an int, so return a BigDecimal assert 1.2 ** 10 instanceof BigDecimal // 6.1917364224 // the base is a float or double, and the exponent is an int // but the result can only be represented as a Double value assert 3.4f ** 5 instanceof Double // 454.35430372146965 assert 5.6d ** 2 instanceof Double // 31.359999999999996 // the exponent is a decimal value // and the result can only be represented as a Double value assert 7.8 ** 1.9 instanceof Double // 49.542708423868476 assert 2 ** 0.1f instanceof Double // 1.0717734636432956 6. Booleans Boolean is a special data type that is used to represent truth values: true and false . Use this data type for simple flags that track true/false conditions . Boolean values can be stored in variables, assigned into fields, just like any other data type: def myBooleanVariable = true boolean untypedBooleanVar = false booleanField = true true and false are the only two primitive boolean values. But more complex boolean expressions can be represented using logical operators . In addition, Groovy has special rules (often referred to as Groovy Truth ) for coercing non-boolean objects to a boolean value. 7. Lists Groovy uses a comma-separated list of values, surrounded by square brackets, to denote lists. Groovy lists are plain JDK java.util.List , as Groovy doesn’t define its own collection classes. The concrete list implementation used when defining list literals are java.util.ArrayList by default, unless you decide to specify otherwise, as we shall see later on. def numbers = [1, 2, 3] (1) assert numbers instanceof List (2) assert numbers.size() == 3 (3) 1 We define a list numbers delimited by commas and surrounded by square brackets, and we assign that list into a variable 2 The list is an instance of Java’s java.util.List interface 3 The size of the list can be queried with the size() method, and shows our list contains 3 elements In the above example, we used a homogeneous list, but you can also create lists containing values of heterogeneous types: def heterogeneous = [1, "a", true] (1) 1 Our list here contains a number, a string and a boolean value We mentioned that by default, list literals are actually instances of java.util.ArrayList , but it is possible to use a different backing type for our lists, thanks to using type coercion with the as operator, or with explicit type declaration for your variables: def arrayList = [1, 2, 3] assert arrayList instanceof java.util.ArrayList def linkedList = [2, 3, 4] as LinkedList (1) assert linkedList instanceof java.util.LinkedList LinkedList otherLinked = [3, 4, 5] (2) assert otherLinked instanceof java.util.LinkedList 1 We use coercion with the as operator to explicitly request a java.util.LinkedList implementation 2 We can say that the variable holding the list literal is of type java.util.LinkedList You can access elements of the list with the [] subscript operator (both for reading and setting values) with positive indices or negative indices to access elements from the end of the list, as well as with ranges, and use the << leftShift operator to append elements to a list: def letters = ['a', 'b', 'c', 'd'] assert letters[0] == 'a' (1) assert letters[1] == 'b' assert letters[-1] == 'd' (2) assert letters[-2] == 'c' letters[2] = 'C' (3) assert letters[2] == 'C' letters << 'e' (4) assert letters[ 4] == 'e' assert letters[-1] == 'e' assert letters[1, 3] == ['b', 'd'] (5) assert letters[2..4] == ['C', 'd', 'e'] (6) 1 Access the first element of the list (zero-based counting) 2 Access the last element of the list with a negative index: -1 is the first element from the end of the list 3 Use an assignment to set a new value for the third element of the list 4 Use the << leftShift operator to append an element at the end of the list 5 Access two elements at once, returning a new list containing those two elements 6 Use a range to access a range of values from the list, from a start to an end element position As lists can be heterogeneous in nature, lists can also contain other lists to create multidimensional lists: def multi = [[0, 1], [2, 3]] (1) assert multi[1][0] == 2 (2) 1 Define a list of numbers 2 Access the second element of the top-most list, and the first element of the inner list 8. Arrays Groovy reuses the list notation for arrays, but to make such literals arrays, you need to explicitly define the type of the array through coercion or type declaration. String[] arrStr = ['Ananas', 'Banana', 'Kiwi'] (1) assert arrStr instanceof String[] (2) assert !(arrStr instanceof List) def numArr = [1, 2, 3] as int[] (3) assert numArr instanceof int[] (4) assert numArr.size() == 3 1 Define an array of strings using explicit variable type declaration 2 Assert that we created an array of strings 3 Create an array of ints with the as operator 4 Assert that we created an array of primitive ints You can also create multi-dimensional arrays: def matrix3 = new Integer[3][3] (1) assert matrix3.size() == 3 Integer[][] matrix2 (2) matrix2 = [[1, 2], [3, 4]] assert matrix2 instanceof Integer[][] 1 You can define the bounds of a new array 2 Or declare an array without specifying its bounds Access to elements of an array follows the same notation as for lists: String[] names = ['Cédric', 'Guillaume', 'Jochen', 'Paul'] assert names[0] == 'Cédric' (1) names[2] = 'Blackdrag' (2) assert names[2] == 'Blackdrag' 1 Retrieve the first element of the array 2 Set the value of the third element of the array to a new value 8.1. Java-style array initialization Groovy has always supported literal list/array definitions using square brackets and has avoided Java-style curly braces so as not to conflict with closure definitions. In the case where the curly braces come immediately after an array type declaration however, there is no ambiguity with closure definitions, so Groovy 3 and above support that variant of the Java array initialization expression. Examples: def primes = new int[] {2, 3, 5, 7, 11} assert primes.size() == 5 && primes.sum() == 28 assert primes.class.name == '[I' def pets = new String[] {'cat', 'dog'} assert pets.size() == 2 && pets.sum() == 'catdog' assert pets.class.name == '[Ljava.lang.String;' // traditional Groovy alternative still supported String[] groovyBooks = [ 'Groovy in Action', 'Making Java Groovy' ] assert groovyBooks.every{ it.contains('Groovy') } 9. Maps Sometimes called dictionaries or associative arrays in other languages, Groovy features maps. Maps associate keys to values, separating keys and values with colons, and each key/value pairs with commas, and the whole keys and values surrounded by square brackets. def colors = [red: '#FF0000', green: '#00FF00', blue: '#0000FF'] (1) assert colors['red'] == '#FF0000' (2) assert colors.green == '#00FF00' (3) colors['pink'] = '#FF00FF' (4) colors.yellow = '#FFFF00' (5) assert colors.pink == '#FF00FF' assert colors['yellow'] == '#FFFF00' assert colors instanceof java.util.LinkedHashMap 1 We define a map of string color names, associated with their hexadecimal-coded html colors 2 We use the subscript notation to check the content associated with the red key 3 We can also use the property notation to assert the color green’s hexadecimal representation 4 Similarly, we can use the subscript notation to add a new key/value pair 5 Or the property notation, to add the yellow color When using names for the keys, we actually define string keys in the map. Groovy creates maps that are actually instances of java.util.LinkedHashMap . If you try to access a key which is not present in the map: assert colors.unknown == null def emptyMap = [:] assert emptyMap.anyKey == null You will retrieve a null result. In the examples above, we used string keys, but you can also use values of other types as keys: def numbers = [1: 'one', 2: 'two'] assert numbers[1] == 'one' Here, we used numbers as keys, as numbers can unambiguously be recognized as numbers, so Groovy will not create a string key like in our previous examples. But consider the case you want to pass a variable in lieu of the key, to have the value of that variable become the key: def key = 'name' def person = [key: 'Guillaume'] (1) assert !person.containsKey('name') (2) assert person.containsKey('key') (3) 1 The key associated with the 'Guillaume' name will actually be the "key" string, not the value associated with the key variable 2 The map doesn’t contain the 'name' key 3 Instead, the map contains a 'key' key You can also pass quoted strings as well as keys: ["name": "Guillaume"]. This is mandatory if your key string isn’t a valid identifier, for example if you wanted to create a string key containing a dash like in: ["street-name": "Main street"]. When you need to pass variable values as keys in your map definitions, you must surround the variable or expression with parentheses: person = [(key): 'Guillaume'] (1) assert person.containsKey('name') (2) assert !person.containsKey('key') (3) 1 This time, we surround the key variable with parentheses, to instruct the parser we are passing a variable rather than defining a string key 2 The map does contain the name key 3 But the map doesn’t contain the key key as before Groovy Learn Documentation Download Support Contribute Ecosystem Blog posts About Source code Security Books Thanks Sponsorship FAQ Search Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community The Groovy programming language is supported by the Apache Software Foundation and the Groovy community. Apache, Apache Groovy, Groovy, and the ASF logo are either registered trademarks or trademarks of The Apache Software Foundation. © 2003-2025 the Apache Groovy project — Groovy is Open Source: license , privacy policy .
2026-01-13T09:29:32
https://www.chinadaily.com.cn/china/59b8d010a3108c54ed7dfc25
Military - Chinadaily.com.cn Search HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER MOBILE Global Edition ASIA 中文 双语 Français HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE China News Society Innovation HK/Macao Cross-Strait Cover Story Photo Environment Health Military Video Home / China / Military Home China Military Several BRICS countries to conduct maritime military exercises near South Africa 2026-01-09 20:43 China urges global vigilance against revival of Japanese militarism 2026-01-08 19:30 China committed to fostering peace, friendship, cooperation in South China Sea: spokesperson 2026-01-08 13:30 China's patrols around Diaoyu Island lawful, justified: spokesperson 2026-01-08 11:31 China urges international community to prevent revival of Japanese militarism 2026-01-08 11:10 Chinese troops step up combat-focused drills 2026-01-06 09:36 China rebuffs criticism over drills around Taiwan 2026-01-02 13:46 PLA wraps up military drills around Taiwan 2026-01-01 08:07 PLA completes the Justice Mission 2025 exercise 2025-12-31 18:07 Rockets for Taiwan like 'porcupine in glass box': expert 2025-12-31 17:39 PLA and China Coast Guard conduct patrols in territorial waters of Huangyan Island 2025-12-31 17:16 Explainer: Three key takeaways of PLA's 'Justice Mission 2025' drills around Taiwan 2025-12-31 09:57 PLA tests joint combat strength for second day 2025-12-31 00:06 PLA rocket artillery can strike all of Taiwan, expert says 2025-12-30 17:40 PLA simulates port seizures in drills east of Taiwan 2025-12-30 17:21 Fujian coast guard conducts law enforcement, control drills near Taiwan Island 2025-12-30 16:50 PLA drills 'encircle' Taiwan to demonstrate ability to cut off energy supply: Expert 2025-12-30 16:32 PLA practices seizure of key ports during drills in waters to east of Taiwan 2025-12-30 16:15 PLA conducts long-range live fire drills to south of Taiwan Island 2025-12-30 14:06 Theme poster on military drills 'Justice Hammer, Blockade and Disruption' 2025-12-30 10:19 1 2 3 4 5 6 7 8 9 10 Next    >>| 1/119 Next --> Latest China launches new AI model for agriculture China introduces national standard for valuing terrestrial ecosystems Government agencies announce regulations of online hiring information Ministry pledges to continue solid waste disposal crackdown Shandong upgrades ancient canal shipping with smart tech and cleaner ships Night view of Central Street in Harbin Exclusive Salute to everyday heroes A tech pro's lens on AI development Chinese AI company to showcase the warmth of technology at US exhibition Newsmaker Chinese couple turns 100,000 photos of Great Wall into a museum Beating the drum of heritage preservation Ten photos you don't wanna miss Ten photos from across China: Jan 2 - 8 Special Coverage Live: Hong Kong residential area fire 4th Plenary Session of the 20th CPC Central Committee From Qiushi Boosting High-Quality Belt and Road Cooperation Through Rigorous and Sustained Efforts China’s Hydropower: Empowering a Clean and Beautiful World Top BACK TO THE TOP English 中文 HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment FOLLOW US Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. -->
2026-01-13T09:29:32
https://wordpress.com/ar/support/github-deployments/
استخدام عمليات نشر GitHub في WordPress.com – الدعم المنتجات الميزات الموارد الباقات والأسعار تسجيل الدخول ابدأ القائمة استضافة ووردبريس ووردبريس للوكالات كن جهة تابعة اسم النطاق منشئ مواقع الذكاء الاصطناعي منشئ المواقع الإلكترونية إنشاء مدونة رسائل إخبارية بريد إلكتروني احترافي خدمات تصميم موقع الويب التجارة WordPress Studio ووردبريس للمؤسسات   نظرة عامة قوالب ووردبريس.كوم المكوِّنات الإضافية في ووردبريس أنماط ووردبريس Google Apps مركز الدعم أخبار ووردبريس منشئ أسماء الشركات صانع الشعارات اكتشف تدوينات جديدة الوسوم الشائعة بحث عن المدوّنات إغلاق قائمة التنقل ابدأ تسجيل تسجيل الدخول معلومات عنّا الباقات والأسعار المنتجات استضافة ووردبريس ووردبريس للوكالات كن جهة تابعة اسم النطاق منشئ مواقع الذكاء الاصطناعي منشئ المواقع الإلكترونية إنشاء مدونة رسائل إخبارية بريد إلكتروني احترافي خدمات تصميم موقع الويب التجارة WordPress Studio ووردبريس للمؤسسات   الميزات نظرة عامة قوالب ووردبريس.كوم المكوِّنات الإضافية في ووردبريس أنماط ووردبريس Google Apps الموارد مركز الدعم أخبار ووردبريس منشئ أسماء الشركات صانع الشعارات اكتشف تدوينات جديدة الوسوم الشائعة بحث عن المدوّنات تطبيق Jetpack تعرف على المزيد مركز الدعم الأدلة الدورات التدريبية منتديات اتصل بنا بحث مركز الدعم / الأدلة مركز الدعم الأدلة الدورات التدريبية منتديات اتصل بنا الأدلة / الأدوات / استخدام عمليات نشر GitHub في WordPress.com استخدام عمليات نشر GitHub في WordPress.com تُتيح ميزة GitHub Deployments إمكانية دمج مستودعات GitHub الخاصة بك مباشرةً مع موقعك على WordPress.com، ما يمنحك سير عمل مؤتمتًا وخاضعًا لنظام إدارة الإصدارات لنشر الإضافات أو القوالب أو تغييرات الموقع الكاملة. يغطي هذا الدليل عملية الإعداد وكيفية إدارة مستودعاتك المرتبطة. تتوفر هذه الميزة على المواقع التي تستخدم خطة الأعمال وخطة التجارة  على منصة WordPress.com. إذا كنت تستخدم خطة أعمال، فتأكد من  تفعيلها . فيما يتعلق بالمواقع المجّانية والمواقع التي تستخدم الخطّة الشّخصيّة والخطة المميزة، قم بترقية خطتك للوصول إلى هذه الميزة. في هذا الدليل فيديو تعليمي ربط المستودع إدارة إعدادات النشر النشر المتقدم نشر الكود الخاص بك إدارة عمليات الربط الحالية سجلات تشغيل النشر إلغاء ربط المستودع إلغاء الربط بين WordPress.com وGitHub هل لديك سؤال؟ سؤال مساعد الذكاء الاصطناعي (AI Assistant) الرجوع إلى فوق فيديو تعليمي ربط المستودع قبل أن تتمكن من نشر مستودع GitHub على موقعك على WordPress.com، ستحتاج أولاً إلى إعداد الربط بينهما باتباع الخطوات التالية: تفضَّل بزيارة صفحة المواقع الخاصة بك: https://wordpress.com/sites/ انقر على اسم موقعك لإلقاء نظرة عامة على الموقع. انقر على علامة تبويب عمليات النشر . انقر على الزر “ ربط المستودع “. بعد ذلك، إذا ظهرت لك المستودعات مدرجة في قائمة، فهذا يعني أنك قد قمت بالفعل بربط حسابك على GitHub. تابع إلى الخطوة 11. انقر على الزر “ تثبيت تطبيق WordPress.com “. ستظهر نافذة جديدة، وسيُطلب منك تسجيل الدخول إلى حسابك على GitHub إذا لم تكن قد فعلت ذلك من قبل. وبعد ذلك سترى أمامك هذه الشاشة: انقر على الزر “ التصريح لتطبيق WordPress.com للمطورين “. حدد مؤسسة GitHub أو الحساب الذي يحتوي على مستودعك. حدد المستودع/المستودعات التي ترغب في ربطها: كل المستودعات: سيؤدي تحديد هذا الخيار إلى منح WordPress.com صلاحية الوصول إلى جميع المستودعات الحالية و المستقبلية التابعة لحساب GitHub المحدد. يتضمن ذلك المستودعات العامة المتاحة للقراءة فقط. مستودعات محددة فقط: سيؤدي تحديد هذا الخيار إلى السماح لك باختيار المستودعات التي يمكن لـ WordPress.com الوصول إليها على حساب GitHub المحدد.  بمجرد تحديد أي من الخيارات، انقر على الزر تثبيت . سيتم إغلاق النافذة الجديدة، وستتم إعادة توجيهك إلى WordPress.com. يجب إدراج مستودعك/مستودعاتك المحددة مع حساب GitHub المرتبط بذلك المستودع: انقر على الخيار تحديد الموجود بجوار المستودع الذي ترغب في ربطه. في هذه المرحلة، يجب أن يظهر لك تطبيق WordPress.com للمطورين ضمن تطبيقات GitHub المصرح بها و تطبيقات GitHub المثبتة لديك. إدارة إعدادات النشر بمجرد تحديد أي مستودع، ستحتاج إلى ضبط إعدادات النشر: فرع النشر: يتم تعيينه افتراضيًا على الفرع الافتراضي للمستودع (عادةً ما يُسمى الفرع الرئيسي ) ولكن يمكن تغييره إلى الفرع الذي ترغب في استخدامه. الدليل الوجهة: مجلد الخادم الذي تريد نشر الملفات فيه. فيما يتعلق بالإضافات، سيكون المسار /wp-content/plugins/my-plugin-name . وفيما يتعلق بالقوالب، سيكون المسار /wp-content/themes/my-theme-name . للنشر الجزئي للموقع (أي: عدة إضافات أو قوالب)، يمكنك استخدام /wp-content . وسيتم دمج محتويات المستودع مع المحتويات الحالية لموقع ووردبريس في الدليل المحدد. عمليات النشر التلقائية: هناك طريقتان يمكنك اتباعهما للنشر على WordPress.com: تلقائي: بمجرد حفظ الكود، سيتم نشره على موقعك على WordPress.com. ويوصى باستخدام عمليات النشر التلقائية لمواقع التشغيل المرحلي. يدوي: سيتم نشر الكود بمجرد أن تقوم بطلب النشر . ويوصى باستخدام عمليات النشر اليدوية لمواقع الإنتاج. وضع النشر: هناك نوعان من عمليات النشر: بسيط: في هذا الوضع، سيتم نسخ جميع الملفات من فرع المستودع إلى الموقع ونشرها دون الحاجة إلى معالجة إضافية. متقدم: في هذا الوضع، يمكنك استخدام برنامج نصي لسير العمل، ما يتيح تنفيذ خطوات إنشاء مخصصة مثل تثبيت تبعيات Composer، وإجراء اختبارات على الكود قبل عملية النشر، والتحكم في نشر الملفات. ويُعد هذا الوضع مثاليًا للمستودعات التي تحتاج إلى برنامج Node أو Composer. للحصول على مزيد من المعلومات، اطلع على “النشر المتقدم” أدناه . بمجرد أن يتم تكوين جميع الإعدادات، انقر على الزر ربط . ستتم إضافة مستودعك: لاحظ أنه يجب عليك تنفيذ عملية النشر الأولى، إما تلقائيًا أو يدويًا . وبعد ذلك، يمكنك ربط مستودع آخر في أي وقت عن طريق النقر على الزر “ ربط المستودع “. النشر المتقدم من خلال النشر المتقدم، يمكنك تقديم برنامج نصي لسير العمل لمعالجة الملفات في مستودعك قبل النشر. حيث يفتح هذا المجال للعديد من الخيارات، مثل التحقق من الكود الخاص بك للتأكد من أنه يتوافق مع معايير التعليمات البرمجية لفريقك، وتشغيل اختبارات الوحدة، واستبعاد ملفات من عملية النشر، وتثبيت التبعيات، وأكثر من ذلك بكثير. للبدء، اطلع على وصفات سير العمل لدينا . لإعداد النشر المتقدم: سيظهر لك نموذج حيث يمكنك تكوين النشر. انقر على اسم المستودع لإدارة عملية الربط. على الجانب الأيمن، وضمن الخيار “ اختر وضع النشر الخاص بك “، اختر متقدم . إذا كان المستودع يحتوي بالفعل على ملف سير عمل، يمكنك تحديده هنا. وسيفحص النظام الملف للكشف عن أي أخطاء. وإذا لم يتم العثور على أي أخطاء، فانتقل إلى الخطوة 7. يمكنك أيضًا تحديد الخيار “ إنشاء ملف سير عمل جديد ” لإضافة ملف سير عمل تم تكوينه مسبقًا. وسيؤدي اختيار هذا الخيار إلى استبدال ملف سير العمل wpcom.yml إذا كان موجودًا بالفعل في مستودعك. انقر على الزر “ تثبيت سير العمل نيابةً عني ” لحفظ ملف سير العمل في المستودع. وبمجرد أن تتم إضافة ملف سير العمل والتحقق منه، انقر على تحديث . سيستخدم مستودعك الآن وضع النشر المتقدم. نشر الكود الخاص بك بعد ربط مستودع GitHub الخاص بك بموقع ما، فإن الخطوة التالية ستكون نشر الكود الخاص بك بالفعل. هناك طريقتان متاحتان للنشر: تلقائي و يدوي . لا يوصى بعمليات النشر التلقائية لمواقع الإنتاج الفعلية، حيث يتم نشر أي تغييرات مُجراة على الكود في المستودع تلقائيًا من GitHub إلى الموقع الفعلي. بدلاً من ذلك، فكّر في إعداد النشر التلقائي على موقع تشغيل مرحلي ومزامنته مع موقع الإنتاج بمجرد أن تكون مستعدًا. تمنحك عمليات النشر اليدوية مزيدًا من التحكم في توقيت نشر تغييرات الكود الخاص بك على الموقع الفعلي، حيث سيتعين عليك تشغيل كل عملية نشر يدويًا. نوصي بعمليات النشر اليدوية إذا كنت لا ترغب في استخدام موقع تشغيل مرحلي. لتشغيل أي عملية نشر يدويًا: تفضَّل بزيارة صفحة المواقع الخاصة بك: https://wordpress.com/sites/ انقر على اسم موقعك لإلقاء نظرة عامة على الموقع. انقر على علامة تبويب عمليات النشر . انقر على القائمة الممثلة في أيقونة النقاط الثلاث (⋮) في المستودع الذي ترغب في نشره. اختر “ تشغيل النشر اليدوي “. يجب أن يظهر لك الآن تنبيه على شكل شريط يحتوي على الرسالة “تم إنشاء عملية تشغيل النشر”، وستتغير حالة النشر إلى “مُدرج في قائمة الانتظار”. انتظر حتى يكتمل النشر (ستتغير الحالة إلى “منشور”). انقر على القائمة الممثلة في أيقونة النقاط الثلاث (⋮) مرة أخرى واختر “ عرض عمليات تشغيل النشر “.  يعرض سجل تشغيل النشر المؤلف والنسخة المحفوظة التي تم نشرها. ويمكنك عرض مزيد من المعلومات من خلال النقر على إدخال تشغيل النشر. إدارة عمليات الربط الحالية لإدارة عمليات الربط الحالية لمستودع GitHub لديك: تفضَّل بزيارة صفحة المواقع الخاصة بك: https://wordpress.com/sites/ انقر على اسم موقعك لإلقاء نظرة عامة على الموقع. انقر على علامة تبويب عمليات النشر . يجب أن تظهر لك بعد ذلك قائمة بعمليات الربط.  تظهر قائمة عمليات الربط إذا تم إجراء عملية ربط واحدة على الأقل بين مستودع GitHub وموقعك. تتضمن القائمة معلومات ذات صلة لكل عملية ربط، مثل اسم المستودع والفرع، وآخر نسخة محفوظة تم نشرها على موقع ما، وتوقيت عملية الربط، ومكان وضع الكود، ومدة تشغيل النشر، وحالة عملية الربط. هناك إجراءات إضافية تكون متاحة بعد النقر على القائمة الممثلة في أيقونة النقاط الثلاث (⋮): تشغيل النشر اليدوي: بدء تشغيل النشر على أحدث نسخة محفوظة للفرع الذي تم تكوينه. عرض عمليات تشغيل النشر: فتح واجهة عرض سجلات تشغيل النشر للمستودع المرتبط. تكوين الاتصال: فتح واجهة عرض إدارة الربط للمستودع. إلغاء ربط المستودع: إلغاء الربط بين المستودع والموقع. سجلات تشغيل النشر توفر سجلات تشغيل النشر سجلاً تفصيليًا يوضح كل خطوة من خطوات عملية النشر، سواء تم تشغيلها تلقائيًا أم يدويًا. تساعدك هذه السجلات على تتبع التغييرات، ومراقبة حالة النشر، وحل أي مشكلات قد تنشأ. وبفضل إتاحة إمكانية الوصول إلى السجلات الخاصة بآخر 10 عمليات تشغيل خلال 30 يومًا، يمكنك بسهولة مراجعة ما حدث خلال كل عملية نشر والتأكد من أن كل شيء يعمل بسلاسة. لمراجعة سجلات النشر: تفضَّل بزيارة صفحة المواقع الخاصة بك: https://wordpress.com/sites/ انقر على اسم موقعك لإلقاء نظرة عامة على الموقع. انقر على علامة تبويب عمليات النشر . انقر على القائمة الممثلة في أيقونة النقاط الثلاث (⋮) الموجودة بجوار المستودع الذي ترغب في عرض السجلات له. حدد “ عرض عمليات تشغيل النشر “. تُظهر طريقة عرض قائمة  عمليات تشغيل النشر   النُسخ المحفوظة التي تم نشرها على الموقع، وحالة النشر، والتاريخ، والمدة. انقر على أي مكان خلال عملية التشغيل للتوسيع وعرض مزيد من المعلومات حول النشر. توفر السجلات سجلاً لجميع الأوامر التي تم تنفيذها، بداية من إحضار الكود من GitHub وحتى وضعه في الدليل الهدف. ويمكنك توسيع أسطر السجل للاطلاع على مزيد من المعلومات عن طريق النقر على “ عرض المزيد “. إلغاء ربط المستودع عندما تقوم بإلغاء الربط بين مستودع GitHub وموقعك، لن يتم تطبيق أي تغييرات مستقبلية تُجرى على المستودع على موقعك. بشكل افتراضي، تظل الملفات المنشورة على موقعك، ولكن يمكنك اختيار إزالتها خلال عملية إلغاء الربط. لإزالة مستودع: تفضَّل بزيارة صفحة المواقع الخاصة بك: https://wordpress.com/sites/ انقر على اسم موقعك لإلقاء نظرة عامة على الموقع. انقر على علامة تبويب عمليات النشر . انقر على القائمة الممثلة في أيقونة النقاط الثلاث (⋮) في المستودع. حدد “ إلغاء ربط المستودع “. ستظهر نافذة حوار. انقر على المفتاح لإزالة الملفات المرتبطة من الموقع. انقر على “ إلغاء ربط المستودع ” لإغلاق نافذة الحوار وإلغاء ربط المستودع. لاحظ أن تطبيق WordPress.com للمطورين سيظل ظاهرًا في تطبيقات GitHub المثبتة و تطبيقات GitHub المصرح بها لديك. هذا لأن WordPress.com لا يزال لديه صلاحية الوصول إلى المستودع، ولكن تم حذف عملية الربط. إلغاء الربط بين WordPress.com وGitHub قد تختار أيضًا سحب الصلاحية الممنوحة لـ WordPress.com للوصول إلى حسابك على GitHub. يمكنك القيام بذلك في أي وقت عن طريق زيارة  إعدادات التطبيقات  لديك على GitHub.  لسحب الصلاحية الممنوحة للتطبيق المصرح به للوصول إلى حسابك على GitHub: انتقل إلى  تطبيقات GitHub المصرح بها . انقر على  سحب صلاحية الوصول  بجوار تطبيق  WordPress.com للمطورين . انقر على الزر “ أفهم، اسحب صلاحية الوصول “. حتى إذا سحبت صلاحية الوصول من التطبيق المصرح به، فسيظل بالإمكان نشر الكود لأن تطبيق WordPress.com للمطورين سيظل مثبتًا على الحسابات المحددة. لسحب صلاحية الوصول إلى عملية تثبيت WordPress.com وتعطيل إمكانية نشر الكود على موقعك على WordPress.com: انتقل إلى  تطبيقات GitHub المثبَّتة . انقر على  تكوين  بجوار تطبيق  WordPress.com للمطورين . في الجزء  منطقة الخطر ، انقر على  إلغاء التثبيت ، ثم انقر على  موافق  عند ظهور رسالة التأكيد. إزالة WordPress.com من قائمة التطبيقات المصرح بها  لا  يعني أن المستودعات سيتم حذفها أو إيقافها عن العمل؛ ستظل مستودعاتك موجودة على GitHub بعد سحب صلاحية الوصول من WordPress.com، ولكن لن يتمكن WordPress.com من نشر الكود بعد الآن. الأدلة ذات الصلة شريط الإجراءات تفعيل وضع الدفاع الاتصال عبر البروتوكول SSH الوصول إلى قاعدة بيانات موقعك في هذا الدليل فيديو تعليمي ربط المستودع إدارة إعدادات النشر النشر المتقدم نشر الكود الخاص بك إدارة عمليات الربط الحالية سجلات تشغيل النشر إلغاء ربط المستودع إلغاء الربط بين WordPress.com وGitHub هل لديك سؤال؟ سؤال مساعد الذكاء الاصطناعي (AI Assistant) الرجوع إلى فوق لم تتمكن من إيجاد ما تحتاجه؟ اتصل بنا احصل على إجابات من AI assistant الخاص بنا، مع إمكانية الوصول إلى دعم الخبراء البشري على مدار الساعة طوال أيام الأسبوع بخصوص الخطط المدفوعة. اطرح سؤالًا في منتدانا تصفح الأسئلة واحصل على إجابات من مستخدمين آخرين من ذوي الخبرة. Copied to clipboard! WordPress.com المنتجات استضافة ووردبريس ووردبريس للوكالات كن جهة تابعة اسم النطاق منشئ مواقع الذكاء الاصطناعي منشئ المواقع الإلكترونية إنشاء مدونة بريد إلكتروني احترافي خدمات تصميم موقع الويب WordPress Studio ووردبريس للمؤسسات الميزات نظرة عامة قوالب ووردبريس.كوم المكوِّنات الإضافية في ووردبريس أنماط ووردبريس Google Apps الموارد مدونة ووردبريس.كوم منشئ أسماء الشركات صانع الشعارات قارئ ووردبريس.كوم إمكانية الوصول إزالة الاشتراكات مساعدة مركز الدعم الأدلة الدورات التدريبية منتديات اتصل بنا مصادر للمطور الشركة معلومات عنّا صحافة شروط الخدمة سياسة الخصوصية عدم بيع معلوماتي الشخصية أو مشاركتها إشعار الخصوصية الخاص بالمستخدمين في كاليفورنيا Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English تطبيقات الهاتف المحمول تنزيل من على متجر التطبيقات الحصول عليه على Google Play وسائل التواصل الاجتماعي ووردبريس.كوم على فيسبوك ووردبريس.كوم على X (تويتر) ووردبريس.كوم على إنستغرام ووردبريس.كوم على يوتيوب Automattic Automattic اعمل معنا   تحميل التعليقات...   اكتب تعليقاً... البريد الإلكتروني (مطلوب) الاسم (مطلوب) الموقع الدعم تسجيل تسجيل الدخول نسخ الرابط القصير إبلاغ عن هذا المحتوى إدارة الاشتراكات
2026-01-13T09:29:32
https://developer.wordpress.com/docs/api/getting-started/
Getting Started - Build Your First REST API App Skip to content Search Search Menu Search Search At a glance WordPress and WordPress.com Tech stack Glossary Interface styles Support Get started Step 1: Create a site Step 2: Set up your local environment Step 3: Set up GitHub Step 4: Develop locally Step 5: Deploy to your production or staging site WordPress Studio Studio sites Blueprints Open in WordPress Studio button How to create custom Blueprints Preview Sites Studio Sync Studio Assistant Studio CLI Import & export SSL in Studio Frequently asked questions Changelog Roadmap Beta features MCP MCP tools reference MCP prompt examples Developer tools WP-CLI WP-CLI overview Platform-specific commands Common commands Troubleshooting REST API Getting started with the REST API REST API reference Namespaces & versions OAuth2 authentication WordPress.com Connect Using the REST API from JavaScript & the browser (CORS) Guidelines for responsible use of Automattic’s APIs Site Accelerator API Platform features Site performance Domain management User management Real time backup Storage Sitemaps Jetpack Scan Account security Guides Add HTTP headers Block patterns Manage user, file, and folder permissions Manually restore your site from a Jetpack Backup Symlinked files and folders WordPress.com oEmbed provider Troubleshooting Enabling WP_DEBUG Jetpack Activity Log At a glance WordPress and WordPress.com Tech stack Glossary Interface styles Support Get started Step 1: Create a site Step 2: Set up your local environment Step 3: Set up GitHub Step 4: Develop locally Step 5: Deploy to your production or staging site WordPress Studio Studio sites Blueprints Open in WordPress Studio button How to create custom Blueprints Preview Sites Studio Sync Studio Assistant Studio CLI Import & export SSL in Studio Frequently asked questions Changelog Roadmap Beta features MCP MCP tools reference MCP prompt examples Developer tools WP-CLI WP-CLI overview Platform-specific commands Common commands Troubleshooting REST API Getting started with the REST API REST API reference Namespaces & versions OAuth2 authentication WordPress.com Connect Using the REST API from JavaScript & the browser (CORS) Guidelines for responsible use of Automattic’s APIs Site Accelerator API Platform features Site performance Domain management User management Real time backup Storage Sitemaps Jetpack Scan Account security Guides Add HTTP headers Block patterns Manage user, file, and folder permissions Manually restore your site from a Jetpack Backup Symlinked files and folders WordPress.com oEmbed provider Troubleshooting Enabling WP_DEBUG Jetpack Activity Log Getting started with the REST API WordPress.com REST API allows you to view, create or edit content on any WordPress.com site, as well as any self-hosted (WordPress.org) site connected via Jetpack . This includes not only blog posts and pages but also comments, tags, categories, media, site stats, notifications, sharing settings, user profiles, and many other WordPress.com features. Some requests (e.g. listing public posts) do not need to be authenticated, but any action that would require a user to be logged in (such as creating a post) requires an authentication token. To make authenticated requests, you’ll first need to set up an account on WordPress.com if you don’t have one already. Looking for code examples? Check out the WordPress.com REST API Examples repository , which contains sample projects demonstrating OAuth authentication and API usage in various programming languages and frameworks. The repository includes examples of both OAuth-based authentication for user-authorized operations and Application Password authentication for direct API endpoint access. How To Use It There are two ways to explore the endpoints available for WordPress.com REST API: The REST API Reference docs page lists available endpoints and details the input and output of each one, along with example code in curl and PHP. The REST API development console allows you to construct and try out real API requests. Making unauthenticated requests is simple. Since there are no special headers required, you can even open this one in your browser to see what it will return: https://public-api.wordpress.com/rest/v1.1/sites/en.blog.wordpress.com/posts/?number=2\&pretty=true Making authenticated requests requires a few more steps. All authenticated requests to the WordPress.com REST API require an OAuth2 access token. This token must be obtained from WordPress.com’s OAuth2 endpoints and can be acquired through different flows, with the most relevant being: Full OAuth2 Flow – Users authorize your application through WordPress.com’s interface, granting specific permissions. This is the most secure approach and required for third-party applications. Credentials Direct Token Exchange – Use an Application Password with grant_type=password to directly obtain a token for your own sites. This bypasses the user authorization step but requires your WordPress.com credentials. Both methods result in the same type of OAuth2 access token that you include in requests as Authorization: Bearer YOUR_ACCESS_TOKEN . The token-based approach ensures consistent security and enables per-application access control. We recommend OAuth2 authentication as the most secure and granular way to access the WordPress.com REST API. If you’re already familiar with OAuth2, you can skip directly to the technical documentation . OAuth2 lets your application act on behalf of a user without ever seeing their password. Here’s how it works: When someone wants to use your app with their WordPress.com account, your app sends them to WordPress.com to log in. WordPress.com shows them exactly what your app wants to do (like read their posts or create new ones) and asks if that’s okay. If they say yes, WordPress.com gives your app a special access token. This token is like a temporary key that lets your app do only the things the user agreed to. You can think of it as a three-way conversation: User: “I’d like to make a post via this API client.” Client (App): “Okay. Hey, WordPress.com, I’d like to do something on behalf of this user. Can you ask them if it’s okay?” WordPress.com: “Sure. Hey, user, is it okay if Client acts on your behalf?” User: “Yes, that is okay. I trust this client to take actions for me in the future.” WordPress.com: “Okay, Client, here is a token that will allow you to take actions for this user. Keep it secret. Keep it safe.” Once the Client (App) has obtained the token, it can make authenticated requests to WordPress.com. Here’s how a typical interaction works: Client (App): “Hello WordPress.com, I’d like to create a new post. Here’s my access token proving I’m authorized to act on behalf of the user, along with the post title, content, and other details.” WordPress.com: “I’ve validated your token and confirmed you have permission to create posts. The post has been successfully created and published. Here’s the response with the new post ID, URL, and other metadata.” This OAuth2 token-based authentication workflow provides secure, granular access control – the Client can only perform actions that the user explicitly authorized during the OAuth flow. The token can be revoked at any time if needed, and WordPress.com validates the token’s permissions on every request. The beauty of this system is that users stay in control. They can see exactly what your app is asking for, and they can revoke access anytime. Your app never stores passwords, and if a token gets compromised, it only affects that one app’s access—not the user’s entire account. You’ve probably seen this before when logging into websites using your Google or Facebook account. The process works the same way: you click “Log in with Facebook,” get sent to Facebook to confirm, and then get redirected back to the original site. From your app’s perspective, the process involves a few steps: First, you register your application on WordPress.com to get a client ID. Then you direct users to WordPress.com with a special link that includes your client ID and tells WordPress.com where to send the user back to. When users authorize your app, WordPress.com redirects them back to your app with an authorization code. You exchange this code for an access token using your client secret, and then you can use that token to make API requests on behalf of the user. Once you have an access token, making authenticated requests is straightforward. You include the token in the Authorization header of your requests like this: Authorization: Bearer your_token_here . For complete implementation details, code examples, and security best practices, check out the OAuth2 authentication guide . Base URL Structure The WordPress.com REST API provides a standardized base URL structure that ensures consistent access across all site types, hosting configurations, and API namespaces. All available endpoints are organized and grouped under different namespaces (such as wp , rest , and wpcom ) and their respective versions (like v1 , v1.4 , v2 , v4 ), providing logical separation between different API functionalities and allowing for independent versioning strategies. This unified approach simplifies API integration and eliminates the need to determine different URL formats based on site characteristics or API versions. For detailed information about available namespaces, their versions, and what endpoints each namespace provides, see the Namespaces & Versions documentation. General URL Structure All WordPress.com REST API endpoints follow this standardized pattern: https://public-api.wordpress.com/{namespace}/{version}/{endpoint} https://public-api.wordpress.com/{namespace}/{version}/{endpoint} Copy Copied Placeholders: {namespace} : The API namespace (e.g., ‘rest’, ‘wp’, ‘wpcom’) {version} : The API version (e.g., ‘v1’, ‘v1.4’, ‘v2’, ‘v4’) {endpoint} : The specific API endpoint you want to access Examples: https://public-api.wordpress.com/rest/v1.4/me https://public-api.wordpress.com/wpcom/v4/notifications https://public-api.wordpress.com/wp/v2/posts https://public-api.wordpress.com/rest/v1.4/me https://public-api.wordpress.com/wpcom/v4/notifications https://public-api.wordpress.com/wp/v2/posts Copy Copied Site-Specific URL Structure When accessing endpoints that operate on specific WordPress.com sites, the URL structure includes a site identifier: https://public-api.wordpress.com/{namespace}/{version}/sites/{site_id}/{endpoint} https://public-api.wordpress.com/{namespace}/{version}/sites/{site_id}/{endpoint} Copy Copied Parameters: {namespace} : The API namespace (e.g., ‘rest’, ‘wp’, ‘wpcom’) {version} : The API version (e.g., ‘v1’, ‘v1.4’, ‘v2’, ‘v4’) {site_id} : Your WordPress.com site’s unique numeric identifier {endpoint} : The specific site-related endpoint (e.g., ‘posts’, ‘pages’, ‘media’, ‘users’) Examples: https://public-api.wordpress.com/wp/v2/sites/241031857/posts https://public-api.wordpress.com/rest/v1.4/sites/241031857/stats https://public-api.wordpress.com/wpcom/v2/sites/241031857/follows https://public-api.wordpress.com/wp/v2/sites/241031857/posts https://public-api.wordpress.com/rest/v1.4/sites/241031857/stats https://public-api.wordpress.com/wpcom/v2/sites/241031857/follows Copy Copied Getting Your Site ID To use site-specific endpoints, you’ll need to obtain your site’s unique numeric identifier. You can get this info by doing a request to /rest/v1.1/me/sites endpoint from the API Console: Visit the WordPress.com API Console Navigate to the /rest/v1.1/me/sites endpoint (that can be found at WP.COM API - v1.1/me/sites in the Console ) Execute the request to retrieve all sites associated with your account Locate the ID field in the response for your desired site The /rest/v1.1/me/sites endpoint returns comprehensive details about all sites associated with your WordPress.com account, including: ID : The unique numeric site identifier (what you need for API calls) name : The site’s display name URL : The site’s public URL jetpack : Whether the site is a Jetpack-connected site is_private : Whether the site is private capabilities : What actions you can perform on the site Example Response: { "sites": [ { "ID": 241031857, "name": "My Blog", "URL": "https://myblog.wordpress.com", "jetpack": false, "is_private": false, "capabilities": { "edit_posts": true, "publish_posts": true } } ] } { "sites": [ { "ID": 241031857, "name": "My Blog", "URL": "https://myblog.wordpress.com", "jetpack": false, "is_private": false, "capabilities": { "edit_posts": true, "publish_posts": true } } ] } Copy Copied Alternative URL Formats You may encounter some alternative URL formats: Direct site access , like https://yoursite.com/wp-json/wp/v2/posts – This format works only for self-hosted sites with Jetpack. May fail due to security settings, firewall rules, or authentication issues. Domain-based WordPress.com access , like https://public-api.wordpress.com/wp/v2/sites/yoursite.com/posts – This format is unreliable for sites with custom domains, DNS configurations, or when domains change. To avoid any issues the recommended approach is to use the format with numeric site IDs which is more reliable, faster, it works consistently across all site types, and supports full WordPress.com features and authentication methods. Authentication Requirements The WordPress.com REST API supports both authenticated and unauthenticated requests, depending on the endpoint and the data you’re trying to access. Understanding when and how to authenticate is crucial for successful API integration. Unauthenticated requests work for: Public site information (e.g., site details, public posts) Reading public content from WordPress.com sites Accessing publicly available stats and data Examples of unauthenticated requests: # Get public information about a site curl https://public-api.wordpress.com/rest/v1.1/sites/en.blog.wordpress.com/ # Get public posts from a site curl https://public-api.wordpress.com/wp/v2/sites/en.blog.wordpress.com/posts?per_page=5 # Get public information about a site curl https://public-api.wordpress.com/rest/v1.1/sites/en.blog.wordpress.com/ # Get public posts from a site curl https://public-api.wordpress.com/wp/v2/sites/en.blog.wordpress.com/posts?per_page=5 Copy Copied Authentication is required for: Creating, editing, or deleting content (posts, pages, comments) Accessing private sites or private content Managing site settings and configuration Accessing user-specific data (notifications, followed sites, personal stats) Any operation that would require a user to be logged in when using WordPress.com directly Examples of authenticated requests (require a token): # Get your user profile (requires authentication) curl -H "Authorization: Bearer YOUR_ACCESS_TOKEN" \ https://public-api.wordpress.com/rest/v1.4/me # Create a new post (requires authentication) curl -X POST \ -H "Authorization: Bearer YOUR_ACCESS_TOKEN" \ -H "Content-Type: application/json" \ -d '{"title":"My New Post","content":"This is the post content","status":"publish"}' \ https://public-api.wordpress.com/wp/v2/sites/YOUR_SITE_ID/posts # Get your site's stats (requires authentication) curl -H "Authorization: Bearer YOUR_ACCESS_TOKEN" \ https://public-api.wordpress.com/rest/v1.4/sites/YOUR_SITE_ID/stats # Get your user profile (requires authentication) curl -H "Authorization: Bearer YOUR_ACCESS_TOKEN" \ https://public-api.wordpress.com/rest/v1.4/me # Create a new post (requires authentication) curl -X POST \ -H "Authorization: Bearer YOUR_ACCESS_TOKEN" \ -H "Content-Type: application/json" \ -d '{"title":"My New Post","content":"This is the post content","status":"publish"}' \ https://public-api.wordpress.com/wp/v2/sites/YOUR_SITE_ID/posts # Get your site's stats (requires authentication) curl -H "Authorization: Bearer YOUR_ACCESS_TOKEN" \ https://public-api.wordpress.com/rest/v1.4/sites/YOUR_SITE_ID/stats Copy Copied Authentication Methods All WordPress.com REST API authentication is token-based. Every authenticated request requires an OAuth2 access token obtained from WordPress.com’s OAuth2 endpoints. The most relevant methods to obtain these tokens are: Credentials Direct Token Exchange (for personal use and development) Full OAuth2 Flow (recommended for third-party applications) Credentials Direct Token Exchange Application Passwords provide a shortcut to obtain OAuth2 access tokens without implementing the full user authorization flow. This method uses the OAuth2 grant_type=password flow to directly exchange your WordPress.com username and Application Password for an access token. This approach can work with both regular passwords and Application Passwords (when 2FA is enabled). However, it is recommended to avoid using your regular password and instead create and use an Application Password. When to use this method: Personal projects and development Command-line tools and scripts Applications that only access your own WordPress.com sites Testing and prototyping How it works: Instead of redirecting users through WordPress.com’s authorization interface , you use your Application Password to directly request a token from the OAuth2 endpoint. This bypasses the user consent step but requires your actual WordPress.com credentials. How to use the Credentials Direct Token Exchange: To use this method, you’ll need to: Create a new WordPress.com application to obtain your app’s Client ID and Client Secret. If you have two-factor authentication enabled (strongly recommended), create a new Application Password . Otherwise, use your regular password. This method uses the OAuth2 grant_type=password flow to directly exchange your Application Password for an access token: # Step 1: Generate an OAuth2 access token using your Application Password curl -X POST "https://public-api.wordpress.com/oauth2/token" \ -d "client_id=<CLIENT_ID>" \ -d "client_secret=<CLIENT_SECRET>" \ -d "grant_type=password" \ -d "username=<USERNAME>" \ -d "password=<APPLICATION_PASSWORD>" # Response will contain your access token: # { # "access_token": "your_oauth2_token_here", # "token_type": "bearer", # "scope": "global" # } # Step 2: Use the OAuth2 token for all API requests curl -X GET \ 'https://public-api.wordpress.com/rest/v1.1/sites/YOUR_SITE_ID/posts' \ -H 'Authorization: Bearer your_oauth2_token_here' \ -H 'Content-Type: application/json' # Create a post using the token curl -X POST \ 'https://public-api.wordpress.com/wp/v2/sites/YOUR_SITE_ID/posts' \ -H 'Authorization: Bearer your_oauth2_token_here' \ -H 'Content-Type: application/json' \ -d '{"title":"My New Post","content":"Post content here","status":"publish"}' # Step 1: Generate an OAuth2 access token using your Application Password curl -X POST "https://public-api.wordpress.com/oauth2/token" \ -d "client_id=<CLIENT_ID>" \ -d "client_secret=<CLIENT_SECRET>" \ -d "grant_type=password" \ -d "username=<USERNAME>" \ -d "password=<APPLICATION_PASSWORD>" # Response will contain your access token: # { # "access_token": "your_oauth2_token_here", # "token_type": "bearer", # "scope": "global" # } # Step 2: Use the OAuth2 token for all API requests curl -X GET \ 'https://public-api.wordpress.com/rest/v1.1/sites/YOUR_SITE_ID/posts' \ -H 'Authorization: Bearer your_oauth2_token_here' \ -H 'Content-Type: application/json' # Create a post using the token curl -X POST \ 'https://public-api.wordpress.com/wp/v2/sites/YOUR_SITE_ID/posts' \ -H 'Authorization: Bearer your_oauth2_token_here' \ -H 'Content-Type: application/json' \ -d '{"title":"My New Post","content":"Post content here","status":"publish"}' Copy Copied Key Points: Application Passwords are never used directly with public-api.wordpress.com endpoints They are only used with the OAuth2 token endpoint to obtain access tokens The resulting token is identical to tokens obtained through the full OAuth2 flow All subsequent API requests use the OAuth2 token, not the Application Password Full OAuth2 Flow The full OAuth2 flow is the recommended approach for third-party applications that need users to authorize access to their WordPress.com sites and data. This method provides the most secure and granular permission system. When to use this method: Third-party applications accessing user data Web applications with multiple users Mobile applications Any app that needs user-controlled permissions How it works: Users are redirected to WordPress.com where they can review and authorize the specific permissions your application is requesting. After authorization, your application receives an access token that can be used to make API requests on behalf of the user. Full OAuth2 Flow Summary: Register your application at WordPress.com Apps to get your client ID and secret Redirect users to WordPress.com’s authorization URL with your client ID and requested scopes User reviews and grants permission through WordPress.com’s interface WordPress.com redirects back to your app with an authorization code Exchange the authorization code for an OAuth2 access token using your client secret Use the OAuth2 access token in all API requests with Authorization: Bearer YOUR_TOKEN The result is the same OAuth2 access token format used by the Credentials Direct Token Exchange method, ensuring consistent authentication across both approaches. For detailed OAuth2 implementation guidance, including code examples and security considerations, refer to the OAuth2 Authentication documentation. Authentication Troubleshooting and Best Practices Common Authentication Errors 401 Unauthorized Cause: Invalid or missing access token Solution: Verify your token is correct and included in the Authorization header 403 Forbidden Cause: Valid token but insufficient permissions for the requested action Solution: Check that your user account has the necessary capabilities for the site Invalid Token Format Cause: Incorrect header format Solution: Ensure you’re using Authorization: Bearer YOUR_TOKEN (note the space after “Bearer”) Security Best Practices Never expose credentials in client-side code – Application passwords should only be used in server-side applications Use environment variables – Store usernames and passwords in environment variables, not in your source code Rotate passwords regularly – Generate new application passwords periodically and revoke old ones Use OAuth2 for user-facing apps – Don’t use application passwords for applications that other users will authenticate with Understand the unified token system – Both authentication methods result in the same OAuth2 access tokens, providing consistent API access and security Choose the right method – Use the Application Password shortcut for personal/development use, full OAuth2 flow for third-party applications Token management – Tokens can be revoked per-application without affecting other apps, providing better security than sharing passwords Browser-Based Applications If you’re building a browser-based application, you’ll need to: Use OAuth2 implicit flow – Application passwords should not be used in client-side code Whitelist your domains – Configure allowed origins in your WordPress.com app settings Handle CORS properly – The API will send appropriate CORS headers for whitelisted domains For detailed guidance on browser-based implementations, see Using the REST API from JS and the Browser . Resources and Documentation API Console – Interactive testing and exploration API Reference – Comprehensive endpoint documentation WordPress REST API Handbook – Official WordPress core REST API documentation Developer Blog – Updates and announcements about API changes Last updated: October 08, 2025 Ready to get started with WordPress.com? Get started Documentation is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License An Automattic Creation
2026-01-13T09:29:32
https://developer.wordpress.com/docs/developer-tools/studio/blueprints/
WordPress Studio Blueprints: A Complete Guide Skip to content Search Search Menu Search Search At a glance WordPress and WordPress.com Tech stack Glossary Interface styles Support Get started Step 1: Create a site Step 2: Set up your local environment Step 3: Set up GitHub Step 4: Develop locally Step 5: Deploy to your production or staging site WordPress Studio Studio sites Blueprints Open in WordPress Studio button How to create custom Blueprints Preview Sites Studio Sync Studio Assistant Studio CLI Import & export SSL in Studio Frequently asked questions Changelog Roadmap Beta features MCP MCP tools reference MCP prompt examples Developer tools WP-CLI WP-CLI overview Platform-specific commands Common commands Troubleshooting REST API Getting started with the REST API REST API reference Namespaces & versions OAuth2 authentication WordPress.com Connect Using the REST API from JavaScript & the browser (CORS) Guidelines for responsible use of Automattic’s APIs Site Accelerator API Platform features Site performance Domain management User management Real time backup Storage Sitemaps Jetpack Scan Account security Guides Add HTTP headers Block patterns Manage user, file, and folder permissions Manually restore your site from a Jetpack Backup Symlinked files and folders WordPress.com oEmbed provider Troubleshooting Enabling WP_DEBUG Jetpack Activity Log At a glance WordPress and WordPress.com Tech stack Glossary Interface styles Support Get started Step 1: Create a site Step 2: Set up your local environment Step 3: Set up GitHub Step 4: Develop locally Step 5: Deploy to your production or staging site WordPress Studio Studio sites Blueprints Open in WordPress Studio button How to create custom Blueprints Preview Sites Studio Sync Studio Assistant Studio CLI Import & export SSL in Studio Frequently asked questions Changelog Roadmap Beta features MCP MCP tools reference MCP prompt examples Developer tools WP-CLI WP-CLI overview Platform-specific commands Common commands Troubleshooting REST API Getting started with the REST API REST API reference Namespaces & versions OAuth2 authentication WordPress.com Connect Using the REST API from JavaScript & the browser (CORS) Guidelines for responsible use of Automattic’s APIs Site Accelerator API Platform features Site performance Domain management User management Real time backup Storage Sitemaps Jetpack Scan Account security Guides Add HTTP headers Block patterns Manage user, file, and folder permissions Manually restore your site from a Jetpack Backup Symlinked files and folders WordPress.com oEmbed provider Troubleshooting Enabling WP_DEBUG Jetpack Activity Log Blueprints in WordPress Studio A Blueprint is a JSON file that describes how to build a site in WordPress Studio. This “recipe” tells Studio which WordPress and PHP versions to use, which plugins and themes to install, what content or settings to apply, and more. Unlike full-site Blueprints in other local development environments, Studio Blueprints are lightweight, declarative, and easy to share. Choose from one of our free starter Blueprints or upload a Blueprint of your own . How Blueprints work in Studio When you launch a site with a Blueprint, Studio reads the JSON file and builds the site according to the instructions inside. Instead of copying a pre-existing site, Studio installs and configures everything fresh each time. This ensures that anyone using the same Blueprint ends up with the same environment. A Blueprint can configure: Core versions : Specify which WordPress and PHP versions the site should use. Plugins and themes : Define which should be installed and activated automatically. Site options : Set values such as the site title, permalink structure, and other WordPress settings. Content : Import demo posts, pages, or other starter content. Custom steps : Run PHP or SQL commands during site creation to further customize the setup. Blueprints in Studio follow the same format as WordPress Playground Blueprints. That means a Blueprint you create for Studio can also be opened in Playground (and vice versa), making them portable across different development contexts. Studio does not support every Playground feature. Unsupported steps are skipped without affecting the rest of the Blueprint. For a comprehensive list of these steps, refer to the Blueprints guide . Creating a Studio site from a Blueprint Creating local sites from Blueprints is incorporated into the site creation flow within Studio. Click the “ Add site ” button in the lower left corner of the Studio app. The following screen will appear. Select “ Start from a blueprint, ” and you will see a gallery of featured Blueprints and an option to choose your own custom Blueprint file. Select a featured Blueprint that fits your needs or “ Choose blueprint file ” and select the JSON file from your computer. Click Continue . On the setup screen, give your site a name. You can open “ Advanced settings ” for more options. Click “ Add site. “ Behind the scenes, Studio builds the site from whichever Blueprint you selected or added.  Featured Blueprints Studio currently has three free featured Blueprints that you can use when setting up a new local site. Quick Start : A WordPress.com-like environment that mirrors the Business plan. It includes the same core plugins and themes you’d find pre-installed on a WordPress.com Business plan, so you can spin up a production-like site right away. Development : Designed for building themes and plugins, this Blueprint enables debug settings and includes tools like Query Monitor, Plugin Check, Theme Check, and Create Block Theme. Commerce : Tailored for launching an online store, this Blueprint comes with WooCommerce and companion plugins pre-installed, along with optional extensions such as payment, advertising, and product listing tools. It provides a store-ready framework that you can extend for client projects. Building your own Blueprints Beyond the featured Blueprints, you can also create a custom JSON file to define your specific site requirements. For details on supported steps, JSON structure, and examples, refer to How to create custom Blueprints . Opening Blueprints in Studio You can use a custom Blueprint when creating a new site in Studio, but you can also generate shareable links that open your Blueprint directly in the app (as long as the user has Studio installed). This makes it easy to share demos and examples that others can explore locally. Use the button below to learn how to create your own links. Open in WordPress Studio button Last updated: December 09, 2025 Ready to get started with WordPress.com? Get started Documentation is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License An Automattic Creation   Loading Comments...   Write a Comment... Email (Required) Name (Required) Website
2026-01-13T09:29:32
http://groovy-lang.org/syntax.html#_identifiers
The Apache Groovy programming language - Syntax Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community You are using an outdated browser. Please upgrade your browser to improve your experience. Apache Groovy™ Learn Documentation Download Support Contribute Ecosystem Blog posts Socialize Table of contents 1. Comments 1.1. Single-line comment 1.2. Multiline comment 1.3. Groovydoc comment 1.4. Shebang line 2. Keywords 3. Identifiers 3.1. Normal identifiers 3.2. Quoted identifiers 4. Strings 4.1. Single-quoted string 4.2. String concatenation 4.3. Triple-single-quoted string 4.3.1. Escaping special characters 4.3.2. Unicode escape sequence 4.4. Double-quoted string 4.4.1. String interpolation 4.4.2. Special case of interpolating closure expressions 4.4.3. Interoperability with Java 4.4.4. GString and String hashCodes 4.5. Triple-double-quoted string 4.6. Slashy string 4.6.1. Special cases 4.7. Dollar slashy string 4.8. String summary table 4.9. Characters 5. Numbers 5.1. Integral literals 5.1.1. Alternative non-base 10 representations Binary literal Octal literal Hexadecimal literal 5.2. Decimal literals 5.3. Underscore in literals 5.4. Number type suffixes 5.5. Math operations 5.5.1. The case of the division operator 5.5.2. The case of the power operator 6. Booleans 7. Lists 8. Arrays 8.1. Java-style array initialization 9. Maps Syntax This chapter covers the syntax of the Groovy programming language. The grammar of the language derives from the Java grammar, but enhances it with specific constructs for Groovy, and allows certain simplifications. 1. Comments 1.1. Single-line comment Single-line comments start with // and can be found at any position in the line. The characters following // , until the end of the line, are considered part of the comment. // a standalone single line comment println "hello" // a comment till the end of the line 1.2. Multiline comment A multiline comment starts with /* and can be found at any position in the line. The characters following /* will be considered part of the comment, including new line characters, up to the first */ closing the comment. Multiline comments can thus be put at the end of a statement, or even inside a statement. /* a standalone multiline comment spanning two lines */ println "hello" /* a multiline comment starting at the end of a statement */ println 1 /* one */ + 2 /* two */ 1.3. Groovydoc comment Similarly to multiline comments, Groovydoc comments are multiline, but start with /** and end with */ . Lines following the first Groovydoc comment line can optionally start with a star * . Those comments are associated with: type definitions (classes, interfaces, enums, annotations), fields and properties definitions methods definitions Although the compiler will not complain about Groovydoc comments not being associated with the above language elements, you should prepend those constructs with the comment right before it. /** * A Class description */ class Person { /** the name of the person */ String name /** * Creates a greeting method for a certain person. * * @param otherPerson the person to greet * @return a greeting message */ String greet(String otherPerson) { "Hello ${otherPerson}" } } Groovydoc follows the same conventions as Java’s own Javadoc. So you’ll be able to use the same tags as with Javadoc. In addition, Groovy supports Runtime Groovydoc since 3.0.0, i.e. Groovydoc can be retained at runtime. Runtime Groovydoc is disabled by default. It can be enabled by adding JVM option -Dgroovy.attach.runtime.groovydoc=true The Runtime Groovydoc starts with /**@ and ends with */ , for example: /**@ * Some class groovydoc for Foo */ class Foo { /**@ * Some method groovydoc for bar */ void bar() { } } assert Foo.class.groovydoc.content.contains('Some class groovydoc for Foo') (1) assert Foo.class.getMethod('bar', new Class[0]).groovydoc.content.contains('Some method groovydoc for bar') (2) 1 Get the runtime groovydoc for class Foo 2 Get the runtime groovydoc for method bar 1.4. Shebang line Beside the single-line comment, there is a special line comment, often called the shebang line understood by UNIX systems which allows scripts to be run directly from the command-line, provided you have installed the Groovy distribution and the groovy command is available on the PATH . #!/usr/bin/env groovy println "Hello from the shebang line" The # character must be the first character of the file. Any indentation would yield a compilation error. 2. Keywords Groovy has the following reserved keywords: Table 1. Reserved Keywords abstract assert break case catch class const continue def default do else enum extends final finally for goto if implements import instanceof interface native new null non-sealed package public protected private return static strictfp super switch synchronized this threadsafe throw throws transient try while Of these, const , goto , strictfp , and threadsafe are not currently in use. The reserved keywords can’t in general be used for variable, field and method names. A trick allows methods to be defined having the same name as a keyword by surrounding the name in quotes as shown in the following example: // reserved keywords can be used for method names if quoted def "abstract"() { true } // when calling such methods, the name must be qualified using "this." this.abstract() Using such names might be confusing and is often best to avoid. The trick is primarily intended to enable certain Java integration scenarios and certain DSL scenarios where having "verbs" and "nouns" with the same name as keywords may be desirable. In addition, Groovy has the following contextual keywords: Table 2. Contextual Keywords as in permits record sealed trait var yields These words are only keywords in certain contexts and can be more freely used in some places, in particular for variables, fields and method names. This extra lenience allows using method or variable names that were not keywords in earlier versions of Groovy or are not keywords in Java. Examples are shown here: // contextual keywords can be used for field and variable names def as = true assert as // contextual keywords can be used for method names def in() { true } // when calling such methods, the name only needs to be qualified using "this." in scenarios which would be ambiguous this.in() Groovy programmers familiar with these contextual keywords may still wish to avoid using those names unless there is a good reason to use such a name. The restrictions on reserved keywords also apply for the primitive types, the boolean literals and the null literal (all of which are discussed later): Table 3. Other reserved words null true false boolean char byte short int long float double While not recommended, the same trick as for reserved keywords can be used: def "null"() { true } // not recommended; potentially confusing assert this.null() // must be qualified Using such words as method names is potentially confusing and is often best to avoid, however, it might be useful for certain kinds of DSLs . 3. Identifiers 3.1. Normal identifiers Identifiers start with a letter, a dollar or an underscore. They cannot start with a number. A letter can be in the following ranges: 'a' to 'z' (lowercase ascii letter) 'A' to 'Z' (uppercase ascii letter) '\u00C0' to '\u00D6' '\u00D8' to '\u00F6' '\u00F8' to '\u00FF' '\u0100' to '\uFFFE' Then following characters can contain letters and numbers. Here are a few examples of valid identifiers (here, variable names): def name def item3 def with_underscore def $dollarStart But the following ones are invalid identifiers: def 3tier def a+b def a#b All keywords are also valid identifiers when following a dot: foo.as foo.assert foo.break foo.case foo.catch 3.2. Quoted identifiers Quoted identifiers appear after the dot of a dotted expression. For instance, the name part of the person.name expression can be quoted with person."name" or person.'name' . This is particularly interesting when certain identifiers contain illegal characters that are forbidden by the Java Language Specification, but which are allowed by Groovy when quoted. For example, characters like a dash, a space, an exclamation mark, etc. def map = [:] map."an identifier with a space and double quotes" = "ALLOWED" map.'with-dash-signs-and-single-quotes' = "ALLOWED" assert map."an identifier with a space and double quotes" == "ALLOWED" assert map.'with-dash-signs-and-single-quotes' == "ALLOWED" As we shall see in the following section on strings , Groovy provides different string literals. All kind of strings are actually allowed after the dot: map.'single quote' map."double quote" map.'''triple single quote''' map."""triple double quote""" map./slashy string/ map.$/dollar slashy string/$ There’s a difference between plain character strings and Groovy’s GStrings (interpolated strings), as in that the latter case, the interpolated values are inserted in the final string for evaluating the whole identifier: def firstname = "Homer" map."Simpson-${firstname}" = "Homer Simpson" assert map.'Simpson-Homer' == "Homer Simpson" 4. Strings Text literals are represented in the form of chain of characters called strings. Groovy lets you instantiate java.lang.String objects, as well as GStrings ( groovy.lang.GString ) which are also called interpolated strings in other programming languages. 4.1. Single-quoted string Single-quoted strings are a series of characters surrounded by single quotes: 'a single-quoted string' Single-quoted strings are plain java.lang.String and don’t support interpolation. 4.2. String concatenation All the Groovy strings can be concatenated with the + operator: assert 'ab' == 'a' + 'b' 4.3. Triple-single-quoted string Triple-single-quoted strings are a series of characters surrounded by triplets of single quotes: '''a triple-single-quoted string''' Triple-single-quoted strings are plain java.lang.String and don’t support interpolation. Triple-single-quoted strings may span multiple lines. The content of the string can cross line boundaries without the need to split the string in several pieces and without concatenation or newline escape characters: def aMultilineString = '''line one line two line three''' If your code is indented, for example in the body of the method of a class, your string will contain the whitespace of the indentation. The Groovy Development Kit contains methods for stripping out the indentation with the String#stripIndent() method, and with the String#stripMargin() method that takes a delimiter character to identify the text to remove from the beginning of a string. When creating a string as follows: def startingAndEndingWithANewline = ''' line one line two line three ''' You will notice that the resulting string contains a newline character as first character. It is possible to strip that character by escaping the newline with a backslash: def strippedFirstNewline = '''\ line one line two line three ''' assert !strippedFirstNewline.startsWith('\n') 4.3.1. Escaping special characters You can escape single quotes with the backslash character to avoid terminating the string literal: 'an escaped single quote: \' needs a backslash' And you can escape the escape character itself with a double backslash: 'an escaped escape character: \\ needs a double backslash' Some special characters also use the backslash as escape character: Escape sequence Character \b backspace \f formfeed \n newline \r carriage return \s single space \t tabulation \\ backslash \' single quote within a single-quoted string (and optional for triple-single-quoted and double-quoted strings) \" double quote within a double-quoted string (and optional for triple-double-quoted and single-quoted strings) We’ll see some more escaping details when it comes to other types of strings discussed later. 4.3.2. Unicode escape sequence For characters that are not present on your keyboard, you can use unicode escape sequences: a backslash, followed by 'u', then 4 hexadecimal digits. For example, the Euro currency symbol can be represented with: 'The Euro currency symbol: \u20AC' 4.4. Double-quoted string Double-quoted strings are a series of characters surrounded by double quotes: "a double-quoted string" Double-quoted strings are plain java.lang.String if there’s no interpolated expression, but are groovy.lang.GString instances if interpolation is present. To escape a double quote, you can use the backslash character: "A double quote: \"". 4.4.1. String interpolation Any Groovy expression can be interpolated in all string literals, apart from single and triple-single-quoted strings. Interpolation is the act of replacing a placeholder in the string with its value upon evaluation of the string. The placeholder expressions are surrounded by ${} . The curly braces may be omitted for unambiguous dotted expressions, i.e. we can use just a $ prefix in those cases. If the GString is ever passed to a method taking a String, the expression value inside the placeholder is evaluated to its string representation (by calling toString() on that expression) and the resulting String is passed to the method. Here, we have a string with a placeholder referencing a local variable: def name = 'Guillaume' // a plain string def greeting = "Hello ${name}" assert greeting.toString() == 'Hello Guillaume' Any Groovy expression is valid, as we can see in this example with an arithmetic expression: def sum = "The sum of 2 and 3 equals ${2 + 3}" assert sum.toString() == 'The sum of 2 and 3 equals 5' Not only are expressions allowed in between the ${} placeholder, but so are statements. However, a statement’s value is just null . So if several statements are inserted in that placeholder, the last one should somehow return a meaningful value to be inserted. For instance, "The sum of 1 and 2 is equal to ${def a = 1; def b = 2; a + b}" is supported and works as expected but a good practice is usually to stick to simple expressions inside GString placeholders. In addition to ${} placeholders, we can also use a lone $ sign prefixing a dotted expression: def person = [name: 'Guillaume', age: 36] assert "$person.name is $person.age years old" == 'Guillaume is 36 years old' But only dotted expressions of the form a.b , a.b.c , etc, are valid. Expressions containing parentheses like method calls, curly braces for closures, dots which aren’t part of a property expression or arithmetic operators would be invalid. Given the following variable definition of a number: def number = 3.14 The following statement will throw a groovy.lang.MissingPropertyException because Groovy believes you’re trying to access the toString property of that number, which doesn’t exist: shouldFail(MissingPropertyException) { println "$number.toString()" } You can think of "$number.toString()" as being interpreted by the parser as "${number.toString}()" . Similarly, if the expression is ambiguous, you need to keep the curly braces: String thing = 'treasure' assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by $thing.x" // <= Not allowed: ambiguous!! assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by ${thing}.x" // <= Curly braces required If you need to escape the $ or ${} placeholders in a GString so they appear as is without interpolation, you just need to use a \ backslash character to escape the dollar sign: assert '$5' == "\$5" assert '${name}' == "\${name}" 4.4.2. Special case of interpolating closure expressions So far, we’ve seen we could interpolate arbitrary expressions inside the ${} placeholder, but there is a special case and notation for closure expressions. When the placeholder contains an arrow, ${→} , the expression is actually a closure expression — you can think of it as a closure with a dollar prepended in front of it: def sParameterLessClosure = "1 + 2 == ${-> 3}" (1) assert sParameterLessClosure == '1 + 2 == 3' def sOneParamClosure = "1 + 2 == ${ w -> w << 3}" (2) assert sOneParamClosure == '1 + 2 == 3' 1 The closure is a parameterless closure which doesn’t take arguments. 2 Here, the closure takes a single java.io.StringWriter argument, to which you can append content with the << leftShift operator. In either case, both placeholders are embedded closures. In appearance, it looks like a more verbose way of defining expressions to be interpolated, but closures have an interesting advantage over mere expressions: lazy evaluation. Let’s consider the following sample: def number = 1 (1) def eagerGString = "value == ${number}" def lazyGString = "value == ${ -> number }" assert eagerGString == "value == 1" (2) assert lazyGString == "value == 1" (3) number = 2 (4) assert eagerGString == "value == 1" (5) assert lazyGString == "value == 2" (6) 1 We define a number variable containing 1 that we then interpolate within two GStrings, as an expression in eagerGString and as a closure in lazyGString . 2 We expect the resulting string to contain the same string value of 1 for eagerGString . 3 Similarly for lazyGString 4 Then we change the value of the variable to a new number 5 With a plain interpolated expression, the value was actually bound at the time of creation of the GString. 6 But with a closure expression, the closure is called upon each coercion of the GString into String, resulting in an updated string containing the new number value. An embedded closure expression taking more than one parameter will generate an exception at runtime. Only closures with zero or one parameter are allowed. 4.4.3. Interoperability with Java When a method (whether implemented in Java or Groovy) expects a java.lang.String , but we pass a groovy.lang.GString instance, the toString() method of the GString is automatically and transparently called. String takeString(String message) { (4) assert message instanceof String (5) return message } def message = "The message is ${'hello'}" (1) assert message instanceof GString (2) def result = takeString(message) (3) assert result instanceof String assert result == 'The message is hello' 1 We create a GString variable 2 We double-check it’s an instance of the GString 3 We then pass that GString to a method taking a String as parameter 4 The signature of the takeString() method explicitly says its sole parameter is a String 5 We also verify that the parameter is indeed a String and not a GString. 4.4.4. GString and String hashCodes Although interpolated strings can be used in lieu of plain Java strings, they differ with strings in a particular way: their hashCodes are different. Plain Java strings are immutable, whereas the resulting String representation of a GString can vary, depending on its interpolated values. Even for the same resulting string, GStrings and Strings don’t have the same hashCode. assert "one: ${1}".hashCode() != "one: 1".hashCode() GString and Strings having different hashCode values, using GString as Map keys should be avoided, especially if we try to retrieve an associated value with a String instead of a GString. def key = "a" def m = ["${key}": "letter ${key}"] (1) assert m["a"] == null (2) 1 The map is created with an initial pair whose key is a GString 2 When we try to fetch the value with a String key, we will not find it, as Strings and GString have different hashCode values 4.5. Triple-double-quoted string Triple-double-quoted strings behave like double-quoted strings, with the addition that they are multiline, like the triple-single-quoted strings. def name = 'Groovy' def template = """ Dear Mr ${name}, You're the winner of the lottery! Yours sincerly, Dave """ assert template.toString().contains('Groovy') Neither double quotes nor single quotes need be escaped in triple-double-quoted strings. 4.6. Slashy string Beyond the usual quoted strings, Groovy offers slashy strings, which use / as the opening and closing delimiter. Slashy strings are particularly useful for defining regular expressions and patterns, as there is no need to escape backslashes. Example of a slashy string: def fooPattern = /.*foo.*/ assert fooPattern == '.*foo.*' Only forward slashes need to be escaped with a backslash: def escapeSlash = /The character \/ is a forward slash/ assert escapeSlash == 'The character / is a forward slash' Slashy strings are multiline: def multilineSlashy = /one two three/ assert multilineSlashy.contains('\n') Slashy strings can be thought of as just another way to define a GString but with different escaping rules. They hence support interpolation: def color = 'blue' def interpolatedSlashy = /a ${color} car/ assert interpolatedSlashy == 'a blue car' 4.6.1. Special cases An empty slashy string cannot be represented with a double forward slash, as it’s understood by the Groovy parser as a line comment. That’s why the following assert would actually not compile as it would look like a non-terminated statement: assert '' == // As slashy strings were mostly designed to make regexp easier so a few things that are errors in GStrings like $() or $5 will work with slashy strings. Remember that escaping backslashes is not required. An alternative way of thinking of this is that in fact escaping is not supported. The slashy string /\t/ won’t contain a tab but instead a backslash followed by the character 't'. Escaping is only allowed for the slash character, i.e. /\/folder/ will be a slashy string containing '/folder' . A consequence of slash escaping is that a slashy string can’t end with a backslash. Otherwise that will escape the slashy string terminator. You can instead use a special trick, /ends with slash ${'\\'}/ . But best just avoid using a slashy string in such a case. 4.7. Dollar slashy string Dollar slashy strings are multiline GStrings delimited with an opening $/ and a closing /$ . The escaping character is the dollar sign, and it can escape another dollar, or a forward slash. Escaping for the dollar and forward slash characters is only needed where conflicts arise with the special use of those characters. The characters $foo would normally indicate a GString placeholder, so those four characters can be entered into a dollar slashy string by escaping the dollar, i.e. $$foo . Similarly, you will need to escape a dollar slashy closing delimiter if you want it to appear in your string. Here are a few examples: def name = "Guillaume" def date = "April, 1st" def dollarSlashy = $/ Hello $name, today we're ${date}. $ dollar sign $$ escaped dollar sign \ backslash / forward slash $/ escaped forward slash $$$/ escaped opening dollar slashy $/$$ escaped closing dollar slashy /$ assert [ 'Guillaume', 'April, 1st', '$ dollar sign', '$ escaped dollar sign', '\\ backslash', '/ forward slash', '/ escaped forward slash', '$/ escaped opening dollar slashy', '/$ escaped closing dollar slashy' ].every { dollarSlashy.contains(it) } It was created to overcome some of the limitations of the slashy string escaping rules. Use it when its escaping rules suit your string contents (typically if it has some slashes you don’t want to escape). 4.8. String summary table String name String syntax Interpolated Multiline Escape character Single-quoted '…​' \ Triple-single-quoted '''…​''' \ Double-quoted "…​" \ Triple-double-quoted """…​""" \ Slashy /…​/ \ Dollar slashy $/…​/$ $ 4.9. Characters Unlike Java, Groovy doesn’t have an explicit character literal. However, you can be explicit about making a Groovy string an actual character, by three different means: char c1 = 'A' (1) assert c1 instanceof Character def c2 = 'B' as char (2) assert c2 instanceof Character def c3 = (char)'C' (3) assert c3 instanceof Character 1 by being explicit when declaring a variable holding the character by specifying the char type 2 by using type coercion with the as operator 3 by using a cast to char operation The first option 1 is interesting when the character is held in a variable, while the other two ( 2 and 3 ) are more interesting when a char value must be passed as argument of a method call. 5. Numbers Groovy supports different kinds of integral literals and decimal literals, backed by the usual Number types of Java. 5.1. Integral literals The integral literal types are the same as in Java: byte char short int long java.math.BigInteger You can create integral numbers of those types with the following declarations: // primitive types byte b = 1 char c = 2 short s = 3 int i = 4 long l = 5 // infinite precision BigInteger bi = 6 If you use optional typing by using the def keyword, the type of the integral number will vary: it’ll adapt to the capacity of the type that can hold that number. For positive numbers: def a = 1 assert a instanceof Integer // Integer.MAX_VALUE def b = 2147483647 assert b instanceof Integer // Integer.MAX_VALUE + 1 def c = 2147483648 assert c instanceof Long // Long.MAX_VALUE def d = 9223372036854775807 assert d instanceof Long // Long.MAX_VALUE + 1 def e = 9223372036854775808 assert e instanceof BigInteger As well as for negative numbers: def na = -1 assert na instanceof Integer // Integer.MIN_VALUE def nb = -2147483648 assert nb instanceof Integer // Integer.MIN_VALUE - 1 def nc = -2147483649 assert nc instanceof Long // Long.MIN_VALUE def nd = -9223372036854775808 assert nd instanceof Long // Long.MIN_VALUE - 1 def ne = -9223372036854775809 assert ne instanceof BigInteger 5.1.1. Alternative non-base 10 representations Numbers can also be represented in binary, octal, hexadecimal and decimal bases. Binary literal Binary numbers start with a 0b prefix: int xInt = 0b10101111 assert xInt == 175 short xShort = 0b11001001 assert xShort == 201 as short byte xByte = 0b11 assert xByte == 3 as byte long xLong = 0b101101101101 assert xLong == 2925l BigInteger xBigInteger = 0b111100100001 assert xBigInteger == 3873g int xNegativeInt = -0b10101111 assert xNegativeInt == -175 Octal literal Octal numbers are specified in the typical format of 0 followed by octal digits. int xInt = 077 assert xInt == 63 short xShort = 011 assert xShort == 9 as short byte xByte = 032 assert xByte == 26 as byte long xLong = 0246 assert xLong == 166l BigInteger xBigInteger = 01111 assert xBigInteger == 585g int xNegativeInt = -077 assert xNegativeInt == -63 Hexadecimal literal Hexadecimal numbers are specified in the typical format of 0x followed by hex digits. int xInt = 0x77 assert xInt == 119 short xShort = 0xaa assert xShort == 170 as short byte xByte = 0x3a assert xByte == 58 as byte long xLong = 0xffff assert xLong == 65535l BigInteger xBigInteger = 0xaaaa assert xBigInteger == 43690g Double xDouble = new Double('0x1.0p0') assert xDouble == 1.0d int xNegativeInt = -0x77 assert xNegativeInt == -119 5.2. Decimal literals The decimal literal types are the same as in Java: float double java.math.BigDecimal You can create decimal numbers of those types with the following declarations: // primitive types float f = 1.234 double d = 2.345 // infinite precision BigDecimal bd = 3.456 Decimals can use exponents, with the e or E exponent letter, followed by an optional sign, and an integral number representing the exponent: assert 1e3 == 1_000.0 assert 2E4 == 20_000.0 assert 3e+1 == 30.0 assert 4E-2 == 0.04 assert 5e-1 == 0.5 Conveniently for exact decimal number calculations, Groovy chooses java.math.BigDecimal as its decimal number type. In addition, both float and double are supported, but require an explicit type declaration, type coercion or suffix. Even if BigDecimal is the default for decimal numbers, such literals are accepted in methods or closures taking float or double as parameter types. Decimal numbers can’t be represented using a binary, octal or hexadecimal representation. 5.3. Underscore in literals When writing long literal numbers, it’s harder on the eye to figure out how some numbers are grouped together, for example with groups of thousands, of words, etc. By allowing you to place underscore in number literals, it’s easier to spot those groups: long creditCardNumber = 1234_5678_9012_3456L long socialSecurityNumbers = 999_99_9999L double monetaryAmount = 12_345_132.12 long hexBytes = 0xFF_EC_DE_5E long hexWords = 0xFFEC_DE5E long maxLong = 0x7fff_ffff_ffff_ffffL long alsoMaxLong = 9_223_372_036_854_775_807L long bytes = 0b11010010_01101001_10010100_10010010 5.4. Number type suffixes We can force a number (including binary, octals and hexadecimals) to have a specific type by giving a suffix (see table below), either uppercase or lowercase. Type Suffix BigInteger G or g Long L or l Integer I or i BigDecimal G or g Double D or d Float F or f Examples: assert 42I == Integer.valueOf('42') assert 42i == Integer.valueOf('42') // lowercase i more readable assert 123L == Long.valueOf("123") // uppercase L more readable assert 2147483648 == Long.valueOf('2147483648') // Long type used, value too large for an Integer assert 456G == new BigInteger('456') assert 456g == new BigInteger('456') assert 123.45 == new BigDecimal('123.45') // default BigDecimal type used assert .321 == new BigDecimal('.321') assert 1.200065D == Double.valueOf('1.200065') assert 1.234F == Float.valueOf('1.234') assert 1.23E23D == Double.valueOf('1.23E23') assert 0b1111L.class == Long // binary assert 0xFFi.class == Integer // hexadecimal assert 034G.class == BigInteger // octal 5.5. Math operations Although operators are covered in more detail elsewhere, it’s important to discuss the behavior of math operations and what their resulting types are. Division and power binary operations aside (covered below), binary operations between byte , char , short and int result in int binary operations involving long with byte , char , short and int result in long binary operations involving BigInteger and any other integral type result in BigInteger binary operations involving BigDecimal with byte , char , short , int and BigInteger result in BigDecimal binary operations between float , double and BigDecimal result in double binary operations between two BigDecimal result in BigDecimal The following table summarizes those rules: byte char short int long BigInteger float double BigDecimal byte int int int int long BigInteger double double BigDecimal char int int int long BigInteger double double BigDecimal short int int long BigInteger double double BigDecimal int int long BigInteger double double BigDecimal long long BigInteger double double BigDecimal BigInteger BigInteger double double BigDecimal float double double double double double double BigDecimal BigDecimal Thanks to Groovy’s operator overloading, the usual arithmetic operators work as well with BigInteger and BigDecimal , unlike in Java where you have to use explicit methods for operating on those numbers. 5.5.1. The case of the division operator The division operators / (and /= for division and assignment) produce a double result if either operand is a float or double , and a BigDecimal result otherwise (when both operands are any combination of an integral type short , char , byte , int , long , BigInteger or BigDecimal ). BigDecimal division is performed with the divide() method if the division is exact (i.e. yielding a result that can be represented within the bounds of the same precision and scale), or using a MathContext with a precision of the maximum of the two operands' precision plus an extra precision of 10, and a scale of the maximum of 10 and the maximum of the operands' scale. For integer division like in Java, you should use the intdiv() method, as Groovy doesn’t provide a dedicated integer division operator symbol. 5.5.2. The case of the power operator The power operation is represented by the ** operator, with two parameters: the base and the exponent. The result of the power operation depends on its operands, and the result of the operation (in particular if the result can be represented as an integral value). The following rules are used by Groovy’s power operation to determine the resulting type: If the exponent is a decimal value if the result can be represented as an Integer , then return an Integer else if the result can be represented as a Long , then return a Long otherwise return a Double If the exponent is an integral value if the exponent is strictly negative, then return an Integer , Long or Double if the result value fits in that type if the exponent is positive or zero if the base is a BigDecimal , then return a BigDecimal result value if the base is a BigInteger , then return a BigInteger result value if the base is an Integer , then return an Integer if the result value fits in it, otherwise a BigInteger if the base is a Long , then return a Long if the result value fits in it, otherwise a BigInteger We can illustrate those rules with a few examples: // base and exponent are ints and the result can be represented by an Integer assert 2 ** 3 instanceof Integer // 8 assert 10 ** 9 instanceof Integer // 1_000_000_000 // the base is a long, so fit the result in a Long // (although it could have fit in an Integer) assert 5L ** 2 instanceof Long // 25 // the result can't be represented as an Integer or Long, so return a BigInteger assert 100 ** 10 instanceof BigInteger // 10e20 assert 1234 ** 123 instanceof BigInteger // 170515806212727042875... // the base is a BigDecimal and the exponent a negative int // but the result can be represented as an Integer assert 0.5 ** -2 instanceof Integer // 4 // the base is an int, and the exponent a negative float // but again, the result can be represented as an Integer assert 1 ** -0.3f instanceof Integer // 1 // the base is an int, and the exponent a negative int // but the result will be calculated as a Double // (both base and exponent are actually converted to doubles) assert 10 ** -1 instanceof Double // 0.1 // the base is a BigDecimal, and the exponent is an int, so return a BigDecimal assert 1.2 ** 10 instanceof BigDecimal // 6.1917364224 // the base is a float or double, and the exponent is an int // but the result can only be represented as a Double value assert 3.4f ** 5 instanceof Double // 454.35430372146965 assert 5.6d ** 2 instanceof Double // 31.359999999999996 // the exponent is a decimal value // and the result can only be represented as a Double value assert 7.8 ** 1.9 instanceof Double // 49.542708423868476 assert 2 ** 0.1f instanceof Double // 1.0717734636432956 6. Booleans Boolean is a special data type that is used to represent truth values: true and false . Use this data type for simple flags that track true/false conditions . Boolean values can be stored in variables, assigned into fields, just like any other data type: def myBooleanVariable = true boolean untypedBooleanVar = false booleanField = true true and false are the only two primitive boolean values. But more complex boolean expressions can be represented using logical operators . In addition, Groovy has special rules (often referred to as Groovy Truth ) for coercing non-boolean objects to a boolean value. 7. Lists Groovy uses a comma-separated list of values, surrounded by square brackets, to denote lists. Groovy lists are plain JDK java.util.List , as Groovy doesn’t define its own collection classes. The concrete list implementation used when defining list literals are java.util.ArrayList by default, unless you decide to specify otherwise, as we shall see later on. def numbers = [1, 2, 3] (1) assert numbers instanceof List (2) assert numbers.size() == 3 (3) 1 We define a list numbers delimited by commas and surrounded by square brackets, and we assign that list into a variable 2 The list is an instance of Java’s java.util.List interface 3 The size of the list can be queried with the size() method, and shows our list contains 3 elements In the above example, we used a homogeneous list, but you can also create lists containing values of heterogeneous types: def heterogeneous = [1, "a", true] (1) 1 Our list here contains a number, a string and a boolean value We mentioned that by default, list literals are actually instances of java.util.ArrayList , but it is possible to use a different backing type for our lists, thanks to using type coercion with the as operator, or with explicit type declaration for your variables: def arrayList = [1, 2, 3] assert arrayList instanceof java.util.ArrayList def linkedList = [2, 3, 4] as LinkedList (1) assert linkedList instanceof java.util.LinkedList LinkedList otherLinked = [3, 4, 5] (2) assert otherLinked instanceof java.util.LinkedList 1 We use coercion with the as operator to explicitly request a java.util.LinkedList implementation 2 We can say that the variable holding the list literal is of type java.util.LinkedList You can access elements of the list with the [] subscript operator (both for reading and setting values) with positive indices or negative indices to access elements from the end of the list, as well as with ranges, and use the << leftShift operator to append elements to a list: def letters = ['a', 'b', 'c', 'd'] assert letters[0] == 'a' (1) assert letters[1] == 'b' assert letters[-1] == 'd' (2) assert letters[-2] == 'c' letters[2] = 'C' (3) assert letters[2] == 'C' letters << 'e' (4) assert letters[ 4] == 'e' assert letters[-1] == 'e' assert letters[1, 3] == ['b', 'd'] (5) assert letters[2..4] == ['C', 'd', 'e'] (6) 1 Access the first element of the list (zero-based counting) 2 Access the last element of the list with a negative index: -1 is the first element from the end of the list 3 Use an assignment to set a new value for the third element of the list 4 Use the << leftShift operator to append an element at the end of the list 5 Access two elements at once, returning a new list containing those two elements 6 Use a range to access a range of values from the list, from a start to an end element position As lists can be heterogeneous in nature, lists can also contain other lists to create multidimensional lists: def multi = [[0, 1], [2, 3]] (1) assert multi[1][0] == 2 (2) 1 Define a list of numbers 2 Access the second element of the top-most list, and the first element of the inner list 8. Arrays Groovy reuses the list notation for arrays, but to make such literals arrays, you need to explicitly define the type of the array through coercion or type declaration. String[] arrStr = ['Ananas', 'Banana', 'Kiwi'] (1) assert arrStr instanceof String[] (2) assert !(arrStr instanceof List) def numArr = [1, 2, 3] as int[] (3) assert numArr instanceof int[] (4) assert numArr.size() == 3 1 Define an array of strings using explicit variable type declaration 2 Assert that we created an array of strings 3 Create an array of ints with the as operator 4 Assert that we created an array of primitive ints You can also create multi-dimensional arrays: def matrix3 = new Integer[3][3] (1) assert matrix3.size() == 3 Integer[][] matrix2 (2) matrix2 = [[1, 2], [3, 4]] assert matrix2 instanceof Integer[][] 1 You can define the bounds of a new array 2 Or declare an array without specifying its bounds Access to elements of an array follows the same notation as for lists: String[] names = ['Cédric', 'Guillaume', 'Jochen', 'Paul'] assert names[0] == 'Cédric' (1) names[2] = 'Blackdrag' (2) assert names[2] == 'Blackdrag' 1 Retrieve the first element of the array 2 Set the value of the third element of the array to a new value 8.1. Java-style array initialization Groovy has always supported literal list/array definitions using square brackets and has avoided Java-style curly braces so as not to conflict with closure definitions. In the case where the curly braces come immediately after an array type declaration however, there is no ambiguity with closure definitions, so Groovy 3 and above support that variant of the Java array initialization expression. Examples: def primes = new int[] {2, 3, 5, 7, 11} assert primes.size() == 5 && primes.sum() == 28 assert primes.class.name == '[I' def pets = new String[] {'cat', 'dog'} assert pets.size() == 2 && pets.sum() == 'catdog' assert pets.class.name == '[Ljava.lang.String;' // traditional Groovy alternative still supported String[] groovyBooks = [ 'Groovy in Action', 'Making Java Groovy' ] assert groovyBooks.every{ it.contains('Groovy') } 9. Maps Sometimes called dictionaries or associative arrays in other languages, Groovy features maps. Maps associate keys to values, separating keys and values with colons, and each key/value pairs with commas, and the whole keys and values surrounded by square brackets. def colors = [red: '#FF0000', green: '#00FF00', blue: '#0000FF'] (1) assert colors['red'] == '#FF0000' (2) assert colors.green == '#00FF00' (3) colors['pink'] = '#FF00FF' (4) colors.yellow = '#FFFF00' (5) assert colors.pink == '#FF00FF' assert colors['yellow'] == '#FFFF00' assert colors instanceof java.util.LinkedHashMap 1 We define a map of string color names, associated with their hexadecimal-coded html colors 2 We use the subscript notation to check the content associated with the red key 3 We can also use the property notation to assert the color green’s hexadecimal representation 4 Similarly, we can use the subscript notation to add a new key/value pair 5 Or the property notation, to add the yellow color When using names for the keys, we actually define string keys in the map. Groovy creates maps that are actually instances of java.util.LinkedHashMap . If you try to access a key which is not present in the map: assert colors.unknown == null def emptyMap = [:] assert emptyMap.anyKey == null You will retrieve a null result. In the examples above, we used string keys, but you can also use values of other types as keys: def numbers = [1: 'one', 2: 'two'] assert numbers[1] == 'one' Here, we used numbers as keys, as numbers can unambiguously be recognized as numbers, so Groovy will not create a string key like in our previous examples. But consider the case you want to pass a variable in lieu of the key, to have the value of that variable become the key: def key = 'name' def person = [key: 'Guillaume'] (1) assert !person.containsKey('name') (2) assert person.containsKey('key') (3) 1 The key associated with the 'Guillaume' name will actually be the "key" string, not the value associated with the key variable 2 The map doesn’t contain the 'name' key 3 Instead, the map contains a 'key' key You can also pass quoted strings as well as keys: ["name": "Guillaume"]. This is mandatory if your key string isn’t a valid identifier, for example if you wanted to create a string key containing a dash like in: ["street-name": "Main street"]. When you need to pass variable values as keys in your map definitions, you must surround the variable or expression with parentheses: person = [(key): 'Guillaume'] (1) assert person.containsKey('name') (2) assert !person.containsKey('key') (3) 1 This time, we surround the key variable with parentheses, to instruct the parser we are passing a variable rather than defining a string key 2 The map does contain the name key 3 But the map doesn’t contain the key key as before Groovy Learn Documentation Download Support Contribute Ecosystem Blog posts About Source code Security Books Thanks Sponsorship FAQ Search Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community The Groovy programming language is supported by the Apache Software Foundation and the Groovy community. Apache, Apache Groovy, Groovy, and the ASF logo are either registered trademarks or trademarks of The Apache Software Foundation. © 2003-2025 the Apache Groovy project — Groovy is Open Source: license , privacy policy .
2026-01-13T09:29:32
https://www.chinadaily.com.cn/a/202512/14/WS693ec288a310d6866eb2e870.html
Geminid meteor shower seen across China - Chinadaily.com.cn Search HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL WATCHTHIS SPORTS OPINION REGIONAL FORUM NEWSPAPER MOBILE Home China China Photos Home / China / China Photos Geminid meteor shower seen across China Xinhua | Updated: 2025-12-14 21:58 Share Share - WeChat --> CLOSE This photo taken on Dec 14, 2025 shows the Geminid meteor shower in the sky over Yabuli town of Shangzhi city, Northeast China's Heilongjiang province. [Photo/Xinhua] BEIJING -- The Geminid meteor shower, one of the most spectacular meteor showers of the year, reached its peak on Sunday.   --> 1 2 3 4 5 6 7 Next    >>| --> 1/7 Next Photo Archives detailing crimes of Japanese unit released Remember history, cherish peace Wave of freezing weather brings snow to northern China IMF chief: China met the growth objective China's key economic tasks for 2026 Watch it again: Memorial Day for Nanjing Massacre Victims --> --> Top BACK TO THE TOP English 中文 HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment FOLLOW US Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. -->
2026-01-13T09:29:32
https://cloudflare.com/zh-cn/ai-solution/
人工智能(AI)解决方案 | Cloudflare 注册 语言 English English (United Kingdom) Deutsch Español (Latinoamérica) Español (España) Français Italiano 日本語 한국어 Polski Português (Brasil) Русский 繁體中文 简体中文 平台 全球连通云 Cloudflare 全球连通云提供 60 多种网络、安全和性能服务。 Enterprisee 适用于中大型组织 小型公司 对于小型组织 合作伙伴 成为 Cloudflare 合作伙伴 用户案例 现代化应用 加速性能 确保应用的可用性 优化网络体验 现代化安全 VPN 替代品 网络钓鱼防护 保护 Web 应用和 API 现代化网络 咖啡店网络 WAN 现代化 简化您的企业网络 CXO 主题 采用 AI 将 AI 融入员工团队与数字体验 AI 安全 保护智能体式 AI 和生成式 AI 应用 数据合规 简化合规并最小化风险 后量子加密技术 保护数据并满足合规标准 行业 医疗保健 银行 零售 游戏 公共部门 资源 产品指南 参考架构 分析师报告 互动 活动 演示 网络研讨会 研讨会 请求演示 产品 产品 工作空间安全 Zero Trust 网络访问 安全 Web 网关 电子邮件安全 云访问安全代理 应用安全 L7 DDoS 防护 Web 应用防火墙 API 安全解决方案 机器人管理 应用性能 CDN DNS 智能路由 Load balancing 网络和 SASE L3/4 DDoS 保护 NaaS / SD- WAN 防火墙即服务 网络互连 计划与价格 Enterprise 计划 小型企业计划 个人计划 比较各项计划 全球服务 支持和 Success 捆绑包 优化的 Cloudflare 体验 专业服务 专家引导部署 技术帐户管理 专注的技术管理 安全运营服务 Cloudflare 监控与响应 域名注册 购买和管理域名 1.1.1.1 免费 DNS 解析器 资源 产品指南 参考架构 分析师报告 产品演示和导览 帮助我选择 开发人员 文档 开发人员图书馆 文档和指南 应用演示 探索您能构建什么 教程 分步构建教程 参考架构 图表和设计模式 产品 人工智能 AI Gateway 观测和控制 AI 应用 Workers AI 在我们的网络上运行 ML 模型 计算 Observability 日志、指标和追踪 Workers 构建和部署无服务器应用 媒体 Images 转换、优化图像 Realtime 构建实时音频和视频应用 存储和数据库 D1 创建无服务器 SQL 数据库 R2 存储数据无需支付昂贵的出口费用 计划与价格 Workers 构建并部署无服务器应用 Workers KV 应用的无服务器键值存储 R2 轻松存储数据,无高昂出口费用 探索项目 客户故事 30 秒 AI 演示 快速入门指南 探索 Workers Playground 构建、测试和部署 开发人员 Discord 加入社区 开始构建 合作伙伴 合作伙伴网络 通过 Cloudflare 发展、创新并满足客户需求 合作伙伴门户 查找资源并注册交易 合作关系类型 PowerUP 计划 发展业务的同时保障客户连接和安全 技术合作伙伴 探索我们的技术合作伙伴和集成生态系统 全球系统集成商 支持无缝的大规模数字化转型 服务提供商 发现我们的重要服务提供商网络 自助服务代理计划 为您的客户管理自助帐户 对等互连门户 为您的网络提供流量洞察 查找合作伙伴 为您的业务赋能 —— 与 Cloudflare Powered+ 合作伙伴携手 资源 互动 演示 + 产品导览 按需产品演示 案例研究 Cloudflare 助力成功 网络研讨会 深入洞察的讨论 研讨会 虚拟论坛 图书馆 实用指南、技术路线图及其他资源 报告 来自 Cloudflare 研究的见解 博客 技术深挖和产品资讯 学习中心 教育工具和操作指南 构建 参考架构 技术指南 解决方案与产品指南 产品文档 文档 开发者文档 探索 theNET 数字企业战略洞察 Cloudflare TV 创新系列和活动 Cloudforce One 威胁研究与运营 Radar 互联网流量和安全趋势 分析师报告 行业研究报告 活动 即将举行的区域活动 信任、隐私和合规 合规信息和政策 支持 联系我们 社区论坛 无法访问帐户? 开发人员 Discord 获取帮助 公司 公司信息 领导力 认识我们的领导团队 投资者关系 投资者信息 媒体中心 探索近期新闻 招聘 探索空缺职位 信任,隐私与安全 隐私 政策、数据和保护 信任 政策、流程和安全 合规性 认证与监管 透明度 政策与披露 公众利益 人道主义 Project Galileo 政府机构 Athenian Project 选举 Cloudflare For Campaigns 健康 Project Fair Shot 全球网络 全球节点和状态 登录 联系销售 加速您的 AI 落地 您已确立 AI 发展愿景。Cloudflare 的统一安全、连接和开发者平台,助力您更快速、更安全地实现这一愿景。 请求咨询 问题 复杂性削弱了 AI 的影响 企业设定了远大的 AI 目标。但是,许多项目受到开发缓慢、扩展问题以及新型风险的阻碍。 缓慢的 AI 开发 复杂的工具链和不断变化的技术环境阻碍着 AI 创新。 具有挑战性的应对 AI 扩展 全球用户群、使用量激增以及缺乏灵活性的计算成本制约 AI 的发展。 日益增长的 AI 风险 有限的可见性、复杂的风险管理和不完善的数据治理制约着 AI 的影响力,包括利用 AI 生成代码。 解决方案 Cloudflare 就是您的单一 AI 控制点 Cloudflare 的 全球连通云 使组织能够从单一全球平台构建、连接和扩展 AI 应用,并保护其整个 AI 生命周期。 构建 AI 保护 AI 关键 AI 需求 制定 AI 战略以防落后 在过去的一年里,AI 释放的进步和用例显示了它在改变我们工作和消费信息的方式方面具有巨大潜力。 企业面临制定 AI 战略的巨大压力,覆盖公司使用 AI、保护知识产权以及在内部和外部应用程序中添加 AI 驱动组件的方式。 加快创新 以更快速度、更低成本和更高敏捷性构建 AI 应用,无论使用什么 AI 模型。 全球规模 为复杂的 AI 堆栈和全球用户群提供可靠、快速的体验。 内置安全性 理解并管理 AI 风险,避免陷入各种仪表盘或频繁的策略更新中。 电子书:企业 AI 保护和扩展指南 了解为何企业难以大规模地构建和保护 AI 基础设施,为何超大规模云服务商的 AI 基础设施为何常常达不到预期,以及如何克服这些挑战。 阅读电子书 全球领袖 —— 包括财富 1000 强的 30% ——依赖 Cloudflare 提供的服务 准备好和专家交谈了吗? 请求咨询 工作方式 AI 安全、连接与开发者服务的统一平台 Cloudflare 的 AI 服务设计为在我们覆盖 330+ 个城市的全球网络中任何位置运行,已被 80% 的 50 强生成式 AI 公司采用。 灵活构建 构建全栈 AI 应用,可通过我们的全球网络中访问 50 多个 AI 模型。构建和运行智能体,无需为等待时间付费。 了解更多 连接 管控和监测 AI 驱动应用运行,同时降低推理成本并动态路由流量。构建在我们的全球网络中运行的 MCP 服务器 了解更多 保护 在整个 AI 生命周期扩展可见性、降低风险并保护数据。控制 AI 爬虫如何访问您的 Web 内容。 了解更多 Cloudflare 帮助 Indeed 发现和管理影子 AI 的使用 Indeed 是一家领先的招聘网站,希望更好地了解和控制员工所用的 AI 应用。 他们转而使用 Cloudflare 的 AI 安全套件 ,该套件可帮助发现 AI 使用模式并执行数据使用策略。现在,Indeed 正逐步实现创新与管控的合理平衡。 “Cloudflare 帮助我们找到存在的影子 AI 风险,并阻止未经批准的 AI 应用和聊天机器人。” 开始使用 Free 计划 小型企业计划 企业级服务 获得推荐 请求演示 联系销售 解决方案 全球连通云 应用程序服务 SASE 和工作空间安全 网络服务 开发人员平台 支持 帮助中心 客户支持 社区论坛 开发人员 Discord 无法访问帐户? Cloudflare 状态 合规性 合规资源 信任 GDPR 负责任的 AI 透明度报告 报告滥用行为 公共利益 Project Galileo Athenian Project Cloudflare for Campaigns Project Fairshot 公司 关于 Cloudflare 网络地图 我们的团队 标识与媒体资料包 多样性、公平性与包容性 影响/ESG © 2026 Cloudflare 公司 隐私政策 使用条款 报告安全问题 信任与安全 Cookie 首选项 商标
2026-01-13T09:29:32
https://www.chinadaily.com.cn/a/202512/12/WS693c0c9ba310d6866eb2e640.html
Beijing mobilizes for winter's first major snowfall - Chinadaily.com.cn Search HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL WATCHTHIS SPORTS OPINION REGIONAL FORUM NEWSPAPER MOBILE Home China Society Home / China / Society Beijing mobilizes for winter's first major snowfall By Yang Cheng and Wang Songsong | chinadaily.com.cn | Updated: 2025-12-12 20:37 Share Share - WeChat --> CLOSE At an expressway checkpoint in Mentougou district, police officers and auxiliary police work in the wind and snow to ensure the safe and smooth passage of travelers. [Photo by Wang Hanyi/provided to chinadaily.com.cn] China's capital is making a swift response to this winter's first snowfall, as forecasts indicate that the snow will continue into the early hours of Saturday, Beijing News reported on Friday. The Beijing Meteorological Service predicts moderate snow across most areas, while Fangshan, Mentougou, Changping, Yanqing, Huairou, and Miyun districts may face heavier snowfall, with some areas potentially experiencing blizzard conditions.   --> 1 2 3 4 5 6 7 8 9 10 11 12 13 Next    >>| --> 1/13 Next Photo China's key economic tasks for 2026 LIVE: Special coverage of National Memorial Day for Nanjing Massacre victims Beijing welcomes its first snowfall this winter Yanshiping, Xizang's highest railway station, begins service Salt of the earth Moment of truth --> --> Top BACK TO THE TOP English 中文 HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment FOLLOW US Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. -->
2026-01-13T09:29:32
https://www.chinadaily.com.cn/a/202512/08/WS69360774a310d6866eb2d502.html
Results of HKSAR's 8th-term LegCo election unveiled - Chinadaily.com.cn --> Search HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER MOBILE Global Edition ASIA 中文 双语 Français HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE China News Society Innovation HK/Macao Cross-Strait Cover Story Photo Environment Health Military Video Home / China / HK Macao Home China HK Macao Results of HKSAR's 8th-term LegCo election unveiled Xinhua | Updated: 2025-12-08 07:02 Share Share - WeChat --> CLOSE Staff members of the Immigration Department of Hong Kong Special Administrative Region line up on Sunday to enter a polling station at the Hong Kong International Airport to cast their ballots for the election of the eighth-term Legislative Council of the SAR. ANDY CHONG/CHINA DAILY HONG KONG - The results of the election of the eighth-term Legislative Council (LegCo) of China's Hong Kong Special Administrative Region (HKSAR) were unveiled early on Monday. All 90 members of the new-term LegCo of the HKSAR have been elected. It comprises 40 elected by the Election Committee, 30 by functional constituencies, and 20 by geographical constituencies through direct elections. It was encouraging to see Hong Kong people go out and vote, said David Lok, chairman of the Electoral Affairs Commission, adding that personnel at polling stations and voters interviewed have all offered positive feedback during the process. Lee Wai-king, re-elected as a lawmaker this time, said each election presents candidates with distinct conditions and challenges. She pledged to listen to the voices of every sector of society and better respond to public expectations. The eighth-term LegCo of the HKSAR will commence its four-year term on Jan. 1, 2026. Voting ran from 7:30 am to 11:30 pm on Sunday, with 161 candidates competing for seats, all of which are contested. --> --> Photo Allan Zeman slams Western media bias in Tai Po fire tragedy 'Oriental gem' makes wetland comeback Media tour explores Xiamen's tech surge and smart manufacturing Discover Xiamen with beauty of ecological governance Global influencers unlock scenic and cultural charms of Hechi Dragon-lion festival highlights tradition, unity in Jianghua --> Latest Silk Road forum highlights Xinjiang's key role in BRI CPC leadership holds meeting on 2026 economic work, regulations on law-based governance Successful election of HKSAR's 8th-term LegCo is of milestone significance: State Council spokesperson When the Olympics meets tai chi Allan Zeman slams Western media bias in Tai Po fire tragedy Retired ornithologist recalls search for last of a species --> State Council News CPC issues revised regulations on its working bodies China's economy in October, 2025 Chinese premier chairs meeting on carbon reduction, administrative law enforcement Exclusive When the Olympics meets tai chi AI robots shine at Tianjin's smart zero-carbon terminal Exhibition highlights connection between tech and humans Newsmaker The 'Gyrfalcon' mounted police team safeguards grasslands in northern borderland of China Bruce Lee's legacy drives Foshan tourism Ten photos you don't wanna miss Ten photos from across China: Nov 28 - Dec 4 Special Coverage Independent judge-chaired commission for fire investigation 4th Plenary Session of the 20th CPC Central Committee Top BACK TO THE TOP English 中文 HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment FOLLOW US Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form.  
2026-01-13T09:29:32
https://wordpress.com/pt-br/support/implantacoes-do-github/
Usar as implantações do GitHub no WordPress.com – Suporte Produtos Funcionalidades Recursos Planos e preços Fazer login Comece agora Menu Hospedagem WordPress WordPress para agências Seja um afiliado Nomes de domínio Construtor de sites com IA Construtor de sites Crie um Blog Newsletter E-mail Profissional Serviços de design do site Commerce WordPress Studio WordPress para empresas   Visão Geral Temas WordPress Plugins WordPress Padrões do WordPress Google Apps Central de ajuda Novidades do WordPress Gerador de nomes de negócios Criador de logos Descubra novos posts Tags populares Pesquisar blog Fechar o menu de navegação Comece agora Registre-se Fazer login Sobre Planos e preços Produtos Hospedagem WordPress WordPress para agências Seja um afiliado Nomes de domínio Construtor de sites com IA Construtor de sites Crie um Blog Newsletter E-mail Profissional Serviços de design do site Commerce WordPress Studio WordPress para empresas   Funcionalidades Visão Geral Temas WordPress Plugins WordPress Padrões do WordPress Google Apps Recursos Central de ajuda Novidades do WordPress Gerador de nomes de negócios Criador de logos Descubra novos posts Tags populares Pesquisar blog Aplicativo Jetpack Saiba mais Central de ajuda Guias Cursos Fórum Contato Search Central de ajuda / Guias Central de ajuda Guias Cursos Fórum Contato Guias / Ferramentas / Usar as implantações do GitHub no WordPress.com Usar as implantações do GitHub no WordPress.com O GitHub Deployments integra seus repositórios do GitHub diretamente ao seu site do WordPress.com, proporcionando um fluxo de trabalho automatizado e controlado por versão para implantar plugins, temas ou alterações completas no site. Este guia trata do processo de configuração e como gerenciar seus repositórios conectados. Esta funcionalidade está disponível nos sites com os planos WordPress.com  Negócios e Commerce . Se você tiver um plano Negócios, certifique-se de  ativá-lo . Para sites gratuitos e sites com os planos Pessoal e Premium, faça upgrade do seu plano para acessar essa funcionalidade. Neste guia Tutorial em vídeo Conectar um repositório Gerenciar configurações de implantação Implantação avançada Implantar seu código Gerenciar conexões existentes Logs de execução da implantação Desconectar um repositório Desconectar o WordPress.com do GitHub Dúvidas? Pergunte à Assistente de IA Voltar ao topo Tutorial em vídeo Este vídeo está em inglês. O YouTube oferece recursos de tradução automática para que você possa assisti-lo no seu idioma: Para ativar legendas com tradução automática: Reproduza o vídeo. Clique no ícone ⚙️ Configurações (no canto inferior direito do vídeo). Selecione Legendas/CC . Escolha Tradução automática . Selecione o idioma de sua preferência. Para ouvir com dublagem automática (experimental): Clique no ícone ⚙️ Configurações . Selecione Faixa de áudio . Escolha o idioma em que deseja ouvir o vídeo. ℹ️ As traduções e dublagens são geradas automaticamente pelo Google, podem não ser perfeitas e a dublagem automática ainda está em fase de testes, podendo não estar disponível em todos os idiomas. Conectar um repositório Antes de implantar um repositório do GitHub no seu site do WordPress.com, primeiro você precisará configurar a conexão entre os dois usando as seguintes etapas: Acesse a página Sites: https://wordpress.com/sites Clique no nome do seu site para abrir a visão geral. Clique na guia Implantações . Clique no botão “ Conectar o repositório “. Se houver repositórios listados, significa que você já conectou sua conta do GitHub. Passe para a etapa 11. Clique no botão “ Instale o aplicativo do WordPress.com “. Uma nova janela será aberta e você receberá uma solicitação para fazer login em sua conta do GitHub se ainda não tiver feito isso. Você verá esta tela: Clique no botão “ Autorizar WordPress.com para desenvolvedores “. Selecione a organização ou conta do GitHub onde seu repositório está localizado. Selecione qual repositório/repositórios você gostaria de conectar: Todos os repositórios: selecionar esta opção concederá ao WordPress.com acesso a todos os repositórios atuais e futuros de propriedade da conta do GitHub selecionada. Isso inclui repositórios públicos que são somente leitura. Apenas repositórios selecionados: selecionar esta opção permitirá escolher quais repositórios o WordPress.com pode acessar na conta do GitHub selecionada.  Após selecionar uma opção, clique no botão Instalar . A nova janela será fechada e você voltará para o WordPress.com. Seus repositórios selecionados devem ser listados junto com a conta do GitHub associada a esse repositório: Clique em Selecionar ao lado do repositório que você deseja conectar. Nesse momento, você verá WordPress.com for Developers em Aplicativos GitHub autorizados e Aplicativos GitHub instalados . Gerenciar configurações de implantação Após selecionar um repositório, você precisará ajustar as configurações de implantação: Ramificação de implantação: tem como padrão a ramificação padrão do repositório (geralmente main ), mas pode ser alterada para a ramificação que você quiser usar. Diretório de destino: a pasta do servidor onde você deseja implantar os arquivos. Para plugins, será /wp-content/plugins/my-plugin-name . Para temas, será /wp-content/themes/my-theme-name . Para uma implantação parcial do site (ou seja, vários plugins ou temas), você pode usar /wp-content . O conteúdo de um repositório será mesclado com o conteúdo existente do site do WordPress no diretório especificado. Implantações automáticas: há duas maneiras de implantar no WordPress.com: Automática: assim que o código for confirmado, ele será implantado no seu site do WordPress.com. Implantações automáticas são recomendadas para sites de teste. Manual: o código será implantado assim que você solicitar uma implantação . Implantações manuais são recomendadas para sites de produção. Modo de implantação: há dois tipos de implantações: Simples: esse modo copiará todos os arquivos de uma ramificação do repositório para o site e os implantará sem pós-processamento. Avançado: com esse modo, você pode usar um script de fluxo de trabalho, habilitando etapas de desenvolvimento personalizadas, como instalar dependências do Composer, realizar testes de código pré-implantação e controlar a implantação de arquivos. Ideal para repositórios que precisam do software Composer ou Node. Consulte Implantação avançada abaixo para saber mais . Após definir todas as configurações, clique no botão Conectar . Seu repositório será adicionado: Observe que você deve acionar a primeira implantação, automática ou manualmente . Depois disso, você pode conectar outro repositório a qualquer momento clicando no botão “ Conectar o repositório “. Implantação avançada Com a Implantação avançada, você pode fornecer um script de fluxo de trabalho para processar arquivos em seu repositório antes da implantação. Isso abre muitas possibilidades, como verificar seu código para garantir que atenda aos padrões de programação da sua equipe, executar testes de unidade, excluir arquivos da implantação, instalar dependências e muito mais. Para começar, confira nossas receitas para fluxo de trabalho . Para configurar a Implantação avançada: Um formulário será exibido para você configurar a implantação. Clique no nome do repositório para gerenciar a conexão. No lado direito, em “ Escolha seu modo de implantação “, escolha Avançado . Se o repositório já incluir um arquivo de fluxo de trabalho, você pode selecioná-lo aqui. O sistema verificará se há erros no arquivo. Se nenhum erro for encontrado, vá para a etapa 7. Você também pode selecionar a opção “ Criar novo fluxo de trabalho ” para adicionar um arquivo de fluxo de trabalho pré-configurado. Escolher essa opção substituirá o arquivo de fluxo de trabalho wpcom.yml se ele já existir em seu repositório. Clique no botão “ Instalar fluxo de trabalho para mim ” para executar commit do arquivo de fluxo de trabalho no repositório. Após adicionar e verificar um fluxo de trabalho, clique em Atualizar . Seu repositório agora usará implantação avançada. Implantar seu código Após conectar seu repositório do GitHub a um site, a próxima etapa é implantar seu código. Há dois métodos de implantação disponíveis: Automática e Manual . Implantações automáticas não são recomendadas para sites de produção ativos, pois todas as alterações de código no repositório são implantadas automaticamente do GitHub para o site ativo. Em vez disso, considere configurar a implantação automática em um site de teste e sincronizá-lo para produção assim que estiver pronto. Implantações manuais dão a você mais controle sobre quando suas alterações de código são ativadas, pois você precisará acionar manualmente cada implantação. Recomendamos implantações manuais se você não quiser usar um site de teste. Para acionar manualmente uma implantação: Acesse a página Sites: https://wordpress.com/sites Clique no nome do seu site para abrir a visão geral. Clique na guia Implantações . Clique no menu de reticências (⋮) no repositório que você deseja implantar. Escolha “ Acionar implantação manual “. Você verá uma notificação de banner que diz, “Execução de implantação criada”, e o status da implantação mudará para “Na fila”. Aguarde a conclusão da implantação (o status mudará para “Implantado”). Clique novamente no menu de reticências (⋮) e escolha “ Ver execuções de implantação “.  O Registro de execução da implantação exibe o Autor e o commit implantado. Se você clicar na entrada de execução da implantação, verá mais informações. Gerenciar conexões existentes Para gerenciar as conexões existentes do repositório do GitHub: Acesse a página Sites: https://wordpress.com/sites Clique no nome do seu site para abrir a visão geral. Clique na guia Implantações . Você verá a lista de conexões.  A lista de conexões será exibida se houver pelo menos uma conexão entre um repositório do GitHub e seu site. A lista inclui informações relevantes para cada conexão, como o nome e a ramificação do repositório, o último commit implantado em um site, quando ele ocorreu, onde o código foi colocado, quanto tempo a execução da implantação demorou e seu status. Há ações adicionais disponíveis após clicar no menu de reticências (⋮): Acionar implantação manual: inicia uma execução de implantação no commit mais recente da ramificação configurada. Ver execuções de implantação: abre a visualização dos registros de execução de implantação para o repositório conectado. Configurar conexão: abre a visualização gerenciar conexão para o repositório. Desconectar repositório: remove a conexão entre o repositório e o site. Logs de execução da implantação Os registros de execução da implantação fornecem um registro detalhado passo a passo de cada implantação, seja ela acionada automática ou manualmente. Esses registros ajudam você a rastrear alterações, monitorar o status da implantação e solucionar quaisquer problemas que surjam. Com o acesso aos registros das últimas 10 execuções em até 30 dias, você pode facilmente avaliar o que aconteceu durante cada implantação e garantir que tudo funcione sem problemas. Para verificar os registros de uma implantação: Acesse a página Sites: https://wordpress.com/sites Clique no nome do seu site para abrir a visão geral. Clique na guia Implantações . Clique no menu de reticências (⋮) ao lado do repositório para o qual você deseja visualizar os registros. Selecione “ Ver execuções de implantação “. A visualização de lista de  Execuções de implantação   mostra os commits implantados no site, o status da implantação, a data e a duração. Clique em qualquer lugar em uma execução para expandir e ver mais informações sobre a implantação. Os registros incluem todos os comandos executados, desde a busca de código do GitHub até a inclusão no diretório de destino. Você pode expandir as linhas de registro para ver mais informações clicando em “ mostrar mais “. Desconectar um repositório Quando você desconecta um repositório do GitHub do seu site, qualquer alteração futura no repositório não afetará mais seu site. Por padrão, os arquivos implantados permanecem no seu site, mas você tem a opção de removê-los durante o processo de desconexão. Para remover um repositório: Acesse a página Sites: https://wordpress.com/sites Clique no nome do seu site para abrir a visão geral. Clique na guia Implantações . Clique no menu de reticências (⋮) no repositório. Selecione “ Desconectar repositório “. Uma caixa de diálogo será exibida. Clique na opção para remover os arquivos associados do site. Clique em “ Desconectar repositório ” para fechar a caixa de diálogo e desconectar o repositório. Observe que o WordPress.com para desenvolvedores ainda aparecerá em Aplicativos GitHub instalados e Aplicativos GitHub autorizados . Isso ocorre porque o WordPress.com ainda tem acesso ao repositório, mas a conexão foi excluída. Desconectar o WordPress.com do GitHub Você também pode revogar o acesso do WordPress.com à sua conta do GitHub. Você pode fazer isso a qualquer momento acessando suas Configurações de aplicativos  no GitHub.  Para revogar o acesso de aplicativo autorizado à sua conta do GitHub: Vá para  Aplicativos GitHub autorizados . Clique em  Revogar  ao lado de  WordPress.com para desenvolvedores . Clique no botão “ Entendido, revogar acesso “. Mesmo que você revogue o acesso ao aplicativo autorizado, o código ainda poderá ser implantado porque o aplicativo WordPress.com para desenvolvedores permanece instalado nas contas selecionadas. Para revogar o acesso à instalação do WordPress.com e desativar a capacidade de implantar código em seu site do WordPress.com: Vá para  Aplicativos GitHub instalados . Clique em  Configurar  ao lado de  WordPress.com para desenvolvedores . Na área  Zona de perigo , clique em  Desinstalar e, quando for solicitado, clique em  OK  . Remover o WordPress.com da lista de aplicativos autorizados  não  significa que os repositórios serão excluídos ou deixarão de funcionar. Seus repositórios ainda existirão no GitHub depois que você revogar o acesso do WordPress.com, mas o WordPress.com não poderá mais implantar código. Guias relacionados Conectar-se ao SSH 4 min. de leitura Ativar o modo defensivo 2 min. de leitura Acesse o banco de dados do seu site 3 min. de leitura Neste guia Tutorial em vídeo Conectar um repositório Gerenciar configurações de implantação Implantação avançada Implantar seu código Gerenciar conexões existentes Logs de execução da implantação Desconectar um repositório Desconectar o WordPress.com do GitHub Dúvidas? Pergunte à Assistente de IA Voltar ao topo Não encontrou o que precisava? Contate-nos Obtenha respostas da nossa assistente de IA, com acesso a suporte humano especializado sem interrupções, em planos pagos. Faça uma pergunta em nosso fórum Confira as perguntas e obtenha respostas de outros usuários experientes. Copied to clipboard! WordPress.com Produtos Hospedagem WordPress WordPress para agências Seja um afiliado Nomes de domínio Construtor de sites com IA Construtor de sites Crie um Blog E-mail Profissional Serviços de design do site WordPress Studio WordPress para empresas Funcionalidades Visão Geral Temas WordPress Plugins WordPress Padrões do WordPress Google Apps Recursos Blogs WordPress.com Gerador de nomes de negócios Criador de logos Leitor WordPress.com Acessibilidade Remover assinaturas Ajuda Central de ajuda Guias Cursos Fórum Contato Recursos para desenvolvedores Empresa Sobre Imprensa Termos de Serviço Política de Privacidade Não venda ou compartilhe minhas informações pessoais Aviso de privacidade para usuários da Califórnia Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English Aplicativos móveis Baixar na App Store Obter no Google Play Mídia social WordPress.com no Facebook WordPress.com no X (Twitter) WordPress.com no Instagram WordPress.com no YouTube Automattic Automattic Trabalhe conosco   Carregando comentários...   Escreva um Comentário E-mail (obrigatório) Nome (obrigatório) Site Suporte Registre-se Fazer login Copiar link curto Denunciar este conteúdo Gerenciar assinaturas
2026-01-13T09:29:32
https://developer.wordpress.com/docs/troubleshooting/wp-debug/
Enable WP_DEBUG - Activate WordPress Debug Mode on WordPress.com Skip to content Search Search Menu Search Search At a glance WordPress and WordPress.com Tech stack Glossary Interface styles Support Get started Step 1: Create a site Step 2: Set up your local environment Step 3: Set up GitHub Step 4: Develop locally Step 5: Deploy to your production or staging site WordPress Studio Studio sites Blueprints Preview Sites Studio Sync Studio Assistant Studio CLI Import & export SSL in Studio Frequently asked questions Changelog Roadmap MCP MCP tools reference MCP prompt examples Developer tools WP-CLI WP-CLI overview Platform-specific commands Common commands Troubleshooting REST API Getting started with the REST API REST API reference Namespaces & versions OAuth2 authentication WordPress.com Connect Using the REST API from JavaScript & the browser (CORS) Guidelines for responsible use of Automattic’s APIs Site Accelerator API Platform features Site performance Domain management User management Real time backup Storage Sitemaps Jetpack Scan Account security Guides How to create custom Blueprints Add HTTP headers Block patterns Manage user, file, and folder permissions Manually restore your site from a Jetpack Backup Symlinked files and folders WordPress.com oEmbed provider Troubleshooting Enabling WP_DEBUG Jetpack Activity Log At a glance WordPress and WordPress.com Tech stack Glossary Interface styles Support Get started Step 1: Create a site Step 2: Set up your local environment Step 3: Set up GitHub Step 4: Develop locally Step 5: Deploy to your production or staging site WordPress Studio Studio sites Blueprints Preview Sites Studio Sync Studio Assistant Studio CLI Import & export SSL in Studio Frequently asked questions Changelog Roadmap MCP MCP tools reference MCP prompt examples Developer tools WP-CLI WP-CLI overview Platform-specific commands Common commands Troubleshooting REST API Getting started with the REST API REST API reference Namespaces & versions OAuth2 authentication WordPress.com Connect Using the REST API from JavaScript & the browser (CORS) Guidelines for responsible use of Automattic’s APIs Site Accelerator API Platform features Site performance Domain management User management Real time backup Storage Sitemaps Jetpack Scan Account security Guides How to create custom Blueprints Add HTTP headers Block patterns Manage user, file, and folder permissions Manually restore your site from a Jetpack Backup Symlinked files and folders WordPress.com oEmbed provider Troubleshooting Enabling WP_DEBUG Jetpack Activity Log Enabling WP_DEBUG When debugging issues on your WordPress.com site, it’s often useful to enable the built in debugging mode available to WordPress. This feature is available on sites with the WordPress.com Business or Commerce plan . Before you enable WP_DEBUG By default, any web server or PHP errors or warnings for your site are automatically logged and available from your site’s  Settings  page. You can learn how to access and download these logs in the Site Monitoring documentation under Access logs . You can still enable WP_DEBUG , but please note that doing so may cause excessive warnings and break the default logging WordPress.com provides. It may also cause excessive disk usage if it’s not disabled and the debug.log file deleted after using it. Enable WP_DEBUG To activate debugging mode, take the following steps: Connect to your WordPress site using your preferred SFTP client. Once connected, locate the wp-config.php file in the root directory of your WordPress installation. Open the wp-config.php file in your text editor. Find the section titled For developers: WordPress debugging mode. Update the code to look like this: if ( ! defined( 'WP_DEBUG') ) { define( 'WP_DEBUG', true ); if ( WP_DEBUG ) { define( 'WP_DEBUG_DISPLAY', false ); define( 'WP_DEBUG_LOG', true ); } } if ( ! defined( 'WP_DEBUG') ) { define( 'WP_DEBUG', true ); if ( WP_DEBUG ) { define( 'WP_DEBUG_DISPLAY', false ); define( 'WP_DEBUG_LOG', true ); } } Copy Copied 6. Save the changes you made to the wp-config.php file. This will enable debug mode, prevent any logging from being displayed on the front end, and log any errors or calls to error_log to a debug.log file. You can read more about these settings, as well as additional debugging settings you can enable the WordPress Advanced Administration Handbook Retrieve logs Now you’ve enabled debug mode, you can retrieve the logs to help diagnose issues: Reconnect to your WordPress site using SFTP . Navigate to the wp-content directory and locate the debug.log file. Download or view the debug.log file. You can download the debug.log file to your computer or view it directly using a text editor. Disable WP_DEBUG To prevent performance issues and keep sensitive information secure, it’s important to disable debugging mode in your production environment after you’ve finished debugging. Once you’ve finished debugging, disable WP_DEBUG with the following steps: Reconnect to your WordPress site again with SFTP . Locate the wp-config.php file in the root directory of your WordPress installation. Open the wp-config.php file in your text editor. Find the section titled For developers: WordPress debugging mode. Update the code to look like this: if ( ! defined( 'WP_DEBUG') ) { define( 'WP_DEBUG', false ); } if ( ! defined( 'WP_DEBUG') ) { define( 'WP_DEBUG', false ); } Copy Copied 6. Save the changes you made to the wp-config.php file. Last updated: August 15, 2025 Ready to get started with WordPress.com? Get started Documentation is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License An Automattic Creation
2026-01-13T09:29:32
https://chromewebstore.google.com/detail/category/detail/volume-master/detail/jetwriter-ai-reply-emails/detail/jetbrains-grazie-writing/detail/grammarly-ai-writing-assi/kbfnbcaeplbcioakkpcpgfkobkghlhen
Chrome Web Store Skip to main content Chrome Web Store My extensions & themes Developer Dashboard Give feedback Sign in Discover Extensions Themes Welcome to Chrome Web Store Welcome to the Chrome Web Store Supercharge your browser with extensions and themes for Chrome See collection Favorites of 2025 Discover the standout AI extensions that made our year See collection Every day is Earth Day Plant trees, shop sustainably, and more See collection Adobe Photoshop Easily remove backgrounds, adjust colors and more. Plus, get 6 months free access to Photoshop web. 3.7 600K Users See details The future of writing Elevate your writing and create engaging and high-quality content effortlessly See collection 1 / 5 Top categories Shopping Entertainment Tools Art & Design Accessibility Top charts Trending Kami for Google Chrome™ Education 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. BetterCampus (prev. BetterCanvas) Education 4.9 Average rating 4.9 out of 5 stars. Learn more about results and reviews. Read&Write for Google Chrome™ Accessibility 3.4 Average rating 3.4 out of 5 stars. Learn more about results and reviews. See more Popular Volume Master Accessibility 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Free VPN for Chrome - VPN Proxy VeePN Workflow & Planning 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. AdBlock — block ads across the web Workflow & Planning 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. See more New and notable Ad Block Wonder Privacy & Security 4.3 Average rating 4.3 out of 5 stars. Learn more about results and reviews. Smart popup blocker Tools 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Manus AI Browser Operator Tools 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. See more Editors' Picks for you Handpicked by Chrome Editors See collection Extend your browser See more Discover a new level of convenience and customization with side panel extensions Chat with all AI models (Gemini, Claude, DeepSeek…) & AI Agents | AITOPIA 4.9 Average rating 4.9 out of 5 stars. Learn more about results and reviews. AI Agent Marketplace & AI Sidebar with all AI models (Gemini, Claude, DeepSeek & more) and hundreds of AI Agents Adobe Photoshop 3.7 Average rating 3.7 out of 5 stars. Learn more about results and reviews. Easily remove backgrounds, adjust colors and more. Plus, get 6 months free access to Photoshop web. BrowserGPT: ChatGPT Anywhere Powered by GPT 4 4.4 Average rating 4.4 out of 5 stars. Learn more about results and reviews. Write, reword, and translate 8x faster. Reply to emails in a click. Works on Google Docs, Gmail, YouTube, Twitter, Instagram, etc. Sidebar: ChatGPT, Bookmarks, GPT-4o | Meomni 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Ultimate Sidebar ChatGPT Assistant, Bookmarks with AI, Calendar and Tasks Fleeting Notes 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Quick notes from the browser to Obsidian Eclipse your screen Dim the lights with our dark mode selections See collection Chrome monthly spotlight Promising extensions to try out Web Highlights: PDF & Web Highlighter + Notes & AI Summary Productivity Highlighter & Annotation Tool for Websites & PDFs with AI Summary - free, easy to use, no sign-up required. Moonlight: AI Colleague for Research Papers Everything you need to read a paper: explanation, summary, translation, chat, and reference search. Reboost - Track Water Intake and Set Reminders Track your water intake and set custom reminders. Stay hydrated, stay on track, and never miss a break! ✨ YouTube Notes to Notion with Udemy, Coursera, BiliBili and more by Snipo Take YouTube notes directly to Notion, generate AI flashcards, capture screenshots, and sync learning courses with Notion Works with Gmail See more Boost your email productivity Boomerang for Gmail 4.2 Average rating 4.2 out of 5 stars. Learn more about results and reviews. Meeting scheduling and email management tool trusted by millions. Schedule meetings, track responses, send later, and more. Checker Plus for Gmail™ 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Get notifications, read, listen to or delete emails without opening Gmail and easily manage multiple accounts. Email Tracker by Mailtrack® 4.4 Average rating 4.4 out of 5 stars. Learn more about results and reviews. Free, unlimited email tracker for Gmail, trusted by millions. Accurate, reliable, GDPR-compliant, and Google-audited. Streak CRM for Gmail 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Manage sales and customer relationships directly inside Gmail. GMass: Powerful mail merge for Gmail 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. A powerful mass email and mail merge system for Gmail. Just for fun Bring some joy to your browser See collection Learn a new language See more Study while you browse Google Translate 4.2 Average rating 4.2 out of 5 stars. Learn more about results and reviews. View translations easily as you browse the web. By the Google Translate team. Rememberry - Translate and Memorize with Flashcards 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Translate words while browsing and turn them into spaced repetition flashcards to build foreign language vocabulary. DeepL: translate and write with AI 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Translate while you read and write with DeepL Translate, the world’s most accurate translator. Relingo - Master vocabulary while browsing websites and watching YouTube 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Relingo extract words, full-text immersive translation while browsing. Also supports bilingual subtitles for Youtube, Netflix, etc. Readlang Web Reader 4.3 Average rating 4.3 out of 5 stars. Learn more about results and reviews. Read websites in the language you're learning, translate words you don't know, and we'll create flashcards to help you remember. Game on See more Beat boredom with bite-sized games in your browser BattleTabs 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Multiplayer Battles in your New Tab Tiny Tycoon 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Build a tiny tycoon on a tiny planet. Boxel 3D 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Boxel 3D is a speedrunning game packed with challenging levels, custom skins, online multiplayer, and a creative level editor. Ice Dodo 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Play 3D game easily by clicking the little icon at the top right corner of your browser. Boxel Golf 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Boxel Golf is a multiplayer golf game packed with challenging courses, custom hats, and a powerful level builder. Work smarter, not harder with AI Automate tasks and stay focused and organized with AI-powered productivity extensions See collection For music lovers See more Equalizers, radios, playlists, and more Volume Master 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Up to 600% volume boost Music Mode for YouTube™ 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Hides the video and thumbnails on YouTube. Blocks the video keeping only the audio on YouTube Music. Smart Mute 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Listen to audio one tab at a time. Modest Guitar | Columns for Ultimate-Guitar 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Multiple columns and fullscreen for Ultimate-Guitar tabs Chrome Piano 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Play the piano in your browser Google apps About Chrome Web Store Developer Dashboard Privacy Policy Terms of Service Help
2026-01-13T09:29:32
https://docs.aws.amazon.com/ja_jp/cost-management/latest/userguide/ce-exploring-data.html
Cost Explorer を使用してデータを探索する - AWS コスト管理 Cost Explorer を使用してデータを探索する - AWS コスト管理 ドキュメント AWS Billing and Cost Management ユーザーガイド Cost Explorer をナビゲートする Cost Explorer のコスト Cost Explorer の傾向 日別の非ブレンドコスト 月別の非ブレンドコスト 非ブレンドの純コスト 最近の Cost Explorer レポート 償却コスト 償却純コスト 翻訳は機械翻訳により提供されています。提供された翻訳内容と英語版の間で齟齬、不一致または矛盾がある場合、英語版が優先します。 Cost Explorer を使用してデータを探索する Cost Explorer ダッシュボードでは、Cost Explorer により、過去 1 か月の推定コスト、同月の予測コスト、日別コストのグラフ、上位 5 つのコストの傾向、最近表示したレポートのリストが表示されます。 すべてのコストには、前日までの使用量が反映されます。例えば、今日の日付が 12 月 2 日だとすると、データには 12 月 1 日までの使用状況が反映されます。 注記 現在の請求期間では、データは請求アプリケーションのアップストリームデータに依存し、一部のデータが 24 時間より後に更新される場合があります。 Cost Explorer のコスト Cost Explorer の傾向 日別の非ブレンドコスト 月別の非ブレンドコスト 非ブレンドの純コスト 最近の Cost Explorer レポート 償却コスト 償却純コスト Cost Explorer をナビゲートする 左側のペインのアイコンを使用して、次の操作を行います。 メイン Cost Explorer ダッシュボードへの移動 デフォルト Cost Explorer レポートのリストの表示 保存されたレポートのリストの表示 予約に関する情報の表示 予約の推奨事項の表示 Cost Explorer のコスト [ Cost Explorer ] ページの上部には、[ Month-to-date costs (今月の初めから今日までのコスト) ] と [ Forecasted month end costs (月末の予測コスト) ] があります。 [今月の初めから今日までのコスト] では、今月これまでに発生した見積り料金が表示され、先月の同じ時点と比較されます。[ Foreccasted month end costs (月末の予測コスト) ] では、月末に支払わなければならない、Cost Explorer による見積り額を表示し、前月の実際のコストと比較します。 [今月の初めから今日までのコスト] と [月末の予測コスト] には返金は含まれません。 Cost Explorerのコストは、米ドルでのみ表示されます。 Cost Explorer の傾向 [ this month trends (今月の傾向) ] セクションでは、Cost Explorer は最上位のコストの傾向を示します。たとえば、特定のサービスに関連するコストが増大、または特定のタイプの RI のコストが増大したことがわかります。すべてのコストの傾向を確認するには、傾向セクションの右上隅にある [すべての傾向を表示] を選択します。 傾向をより詳細に理解するには、これを選択します。その傾向の計算元のコストを表示する Cost Explorer チャートに移動します。 日別の非ブレンドコスト Cost Explorer ダッシュボードの中央に、Cost Explorer により現在の非ブレンドコストの日別グラフが表示されます。グラフを作成するために使用するフィルターとパラメータにアクセスするには、右上隅の [ Explore costs (コストの確認) ] を選択します。これにより、ユーザーは、Cost Explorer レポートページに移動します。デフォルト Cost Explorer レポートにアクセスし、グラフを作成するために使用されるパラメータを変更できます。Cost Explorer レポートには、CSV ファイルとしてデータをダウンロードし、レポートとして特定のパラメータを保存するなどの追加機能が用意されています。詳細については、「 Cost Explorer レポートを使用してコストを把握する 」を参照してください。日別の非ブレンドコストには返金は含まれません。 月別の非ブレンドコスト 月別の詳細度 非ブレンドコストを月別の詳細度で表示して、月額料金に適用された割引を確認できます。コストを予測する際は、デフォルトで割引が含まれます。非ブレンドコストを表示するには、[Cost Explorer] のページを開いて、ナビゲーションペインから [Cost Explorer] を選択します。割引はグラフの [RI ボリューム割引] として表示されます。割引額は請求情報とコスト管理コンソールに表示されるディスカウント額と揃えられています。 請求情報とコスト管理コンソールで詳細を表示するには で Billing and Cost Management コンソールを開きます https://console.aws.amazon.com/costmanagement/ ナビゲーションペインで [請求] を選択します。 割引を表示するには、[ クレジット、割引合計、税金請求書 ] の下で、[ 割引合計 ] の横にある矢印を選択します。 月別の合計料金 [RI ボリューム割引] を除外することで月別合計料金を表示できます。 月別ビューから RI ボリューム割引を除外するには で Billing and Cost Management コンソールを開きます https://console.aws.amazon.com/costmanagement/ 左のペインで、 [Cost Explorer] を選択します。 [コストと使用状況] を選択します。 [フィルター] ペインで、 [料金タイプ] を選択します。 [RI ボリューム割引] を選択します。 ドロップダウンを開くには、 [以下の内容のみ含める] を選択し、 [以下の内容のみ除外する] を選択します。 [フィルターの適用] を選択します。 非ブレンドの純コスト 該当する割引がすべて計算された後の純コストを表示できます。ベストプラクティスとしては、まだ返金やクレジットなどの手動調整を実行する必要があります。これらは割引後の金額であるため、 [RI ボリューム割引] は表示されなくなります。 最近の Cost Explorer レポート Cost Explorer ダッシュボードの下部には、最近アクセスしたレポート、アクセス日時、レポートに戻るリンクのリストがあります。これにより、レポートの切り替え、または最も便利なレポートを記憶できます。 Cost Explorer レポートの詳細については、「 Cost Explorer レポートを使用してコストを把握する 」を参照してください。 償却コスト これにより、Amazon EC2 リザーブド インスタンスや Savings Plans などの AWS コミットメントのコストを選択期間の使用全体に分散して表示できます。AWS は、ブレンドされていない前払い料金と定期予約料金を組み合わせて償却コストを見積もり、前払い料金または定期料金が適用される期間の実効レートを計算します。日別表示で、Cost Explorer は前払い料金の未使用分を毎月初日または購入日に表示します。 償却純コスト これにより、割引後の Amazon EC2 リザーブド インスタンスや Savings Plans などの AWS コミットメントのコストを、実際のコストが時間の経過とともにどのように適用されるかを示す追加のロジックで確認できます。通常、Savings Plans とリザーブドインスタンスには前払いまたは定期的な月額料金が関連付けられているため、正味償却コストデータセットは、前払い料金または定期料金が適用される期間に割引後の料金がどのように償却されるかを示すことにより、実際のコストを明らかにします。 ブラウザで JavaScript が無効になっているか、使用できません。 AWS ドキュメントを使用するには、JavaScript を有効にする必要があります。手順については、使用するブラウザのヘルプページを参照してください。 ドキュメントの表記規則 Cost Explorer を開始する Cost Explorer グラフを使用する このページは役に立ちましたか? - はい ページが役に立ったことをお知らせいただき、ありがとうございます。 お時間がある場合は、何が良かったかお知らせください。今後の参考にさせていただきます。 このページは役に立ちましたか? - いいえ このページは修正が必要なことをお知らせいただき、ありがとうございます。ご期待に沿うことができず申し訳ありません。 お時間がある場合は、ドキュメントを改善する方法についてお知らせください。
2026-01-13T09:29:32
https://docs.aws.amazon.com/zh_tw/cost-management/latest/userguide/ce-exploring-data.html
使用 Cost Explorer 探索您的資料 - AWS 成本管理 使用 Cost Explorer 探索您的資料 - AWS 成本管理 文件 AWS Billing and Cost Management 使用者指南 導覽 Cost Explorer 您的 Cost Explorer 成本 您的 Cost Explorer 趨勢 您的每日非混合成本 您的每月非混合成本 淨非混合成本 您最近的 Cost Explorer 報告 攤銷成本 您的攤銷後淨成本 本文為英文版的機器翻譯版本,如內容有任何歧義或不一致之處,概以英文版為準。 使用 Cost Explorer 探索您的資料 在 Cost Explorer 儀表板上,Cost Explorer 會顯示您在月初至今的估計成本、當月份的預測成本、每日成本的圖表、五大成本趨勢,以及您最近查看的報表清單。 所有成本反映您到前一天的使用量。例如,如果今天是 12 月 2 日,則資料包含您到 12 月 1 日的使用量。 注意 在目前的帳單期間內,資料取決於您帳單應用程式中的上游資料,有些資料可能會在 24 小時之後更新。 您的 Cost Explorer 成本 您的 Cost Explorer 趨勢 您的每日非混合成本 您的每月非混合成本 淨非混合成本 您最近的 Cost Explorer 報告 攤銷成本 您的攤銷後淨成本 導覽 Cost Explorer 您可以使用左窗格中的圖示執行下列動作: 前往 Cost Explorer 主儀表板 請參閱預設 Cost Explorer 報告清單 查看您儲存的報告清單 查看與您的保留相關的資訊 查看您的保留建議 您的 Cost Explorer 成本 在 Cost Explorer 頁面頂端是 Month-to-date costs (月初至今的成本) 和 Forecasted month end costs (預測的月底成本)。 Month-to-date costs (月初至今的成本) 會顯示到本月目前為止的估計成本,並將其與上個月同時期的成本進行比較。 Forecasted month end costs (預測的月底成本) 會顯示 Cost Explorer 估計您到月底的成本,並比較預估成本與上個月的實際成本。 Month-to-date costs (月初至今的成本) 和 Forecasted month end costs (預測的月底成本) 皆不包含退款。 Cost Explorer 的成本僅以美元顯示。 您的 Cost Explorer 趨勢 在 this month trends (本月趨勢) 部分,Cost Explorer 說明您的最佳成本趨勢。例如,與特定服務相關的成本增加,或特定類型 RI 的成本增加。選擇趨勢部分右上角的 View all trends (檢視所有趨勢) ,來查看所有成本趨勢。 若要深入了解某個趨勢,請選擇該趨勢。系統會帶您查看 Cost Explorer 圖表,其中會顯示計算趨勢所用的成本。 您的每日非混合成本 在 Cost Explorer 儀表板中心,Cost Explorer 會顯示目前非混合每日成本的圖表。您可以在右上角選擇 Explore costs (探索成本) ,以存取用來建立圖形的篩選和參數。這會帶您前往 Cost Explorer 報告頁面,讓您存取預設 Cost Explorer 報告,和修改用來建立圖表的參數。Cost Explorer 報告提供額外的功能,例如將資料下載為 CSV 檔案,並將特定參數儲存為報告。如需詳細資訊,請參閱 使用 Cost Explorer 報告了解您的成本 。您的每日非混合成本不包含退款。 您的每月非混合成本 每月精細程度 您可以使用每月精細程度檢視非混合成本,並查看每月帳單適用的折扣。預測成本時,預設會包含折扣。若要檢視未混合的成本,請開啟 Cost Explorer 頁面,然後從導覽窗格中選擇 Cost Explorer 。圖表中折扣會顯示為 RI Volume Discount (RI 大量折扣) 。此折扣金額會與賬單和成本管理主控台中顯示的折扣金額相符。 在您的 Billing and Cost Management 主控台中查看詳細資訊 開啟「帳單和成本管理」主控台,網址為 https://console.aws.amazon.com/costmanagement/ 。 在導覽窗格中,選擇 Bills (帳單) 。 若要顯示折扣,請前往 Credits, Total Discounts and Tax Invoices (抵用金、折扣總額和稅金發票) 下方的 Total Discounts (折扣總額),然後選取旁邊的箭頭。 每月總費用 您可以透過排除 RI Volume Discount (RI 大量折扣) 來檢視每月總費用。 在每月檢視中排除 RI 大量折扣 開啟「帳單和成本管理」主控台,網址為 https://console.aws.amazon.com/costmanagement/ 。 在左窗格中,選擇 Cost Explorer 。 選擇 Cost & Usage (成本和用量) 。 在 Filters (篩選條件) 窗格,選擇 Charge Type (費用類型) 。 選取 RI Volume Discount (RI 大量折扣) 。 若要開啟下拉式選單,請選取 Include only (僅包含) 並選擇 Exclude only (僅排除) 。 選取 Apply filters (套用篩選條件) 。 淨非混合成本 這可讓您查看在計算所有適用折扣後的淨成本。您仍應排除退款和點數之類的任何手動調整來作為最佳實務。 RI Volume Discounts (RI 大量折扣) 不再可見,因為這些是折扣後的金額。 您最近的 Cost Explorer 報告 Cost Explorer 儀表板底部是您最近查看存取的報告清單,和返回報告的連結。這可讓您在報告之間切換,或記下您認為最有用的報告。 如需 Cost Explorer 報告的詳細資訊,請參閱 使用 Cost Explorer 報告了解您的成本 。 攤銷成本 這可讓您查看 AWS 承諾的成本,例如 Amazon EC2 預留執行個體或 Savings Plans,分散在選擇期間的用量。 AWS 會結合未混合的預付和經常性保留費用來預估攤銷後的成本,並計算預付或經常性費用適用的期間內的有效費率。在每日檢視中,Cost Explorer 會在每月第一天或購買日期顯示未使用的承諾費用部分。 您的攤銷後淨成本 這可讓您在折扣之後,查看 Amazon EC2 預留執行個體或 Savings Plans 等 AWS 承諾的成本,並顯示實際成本如何隨時間套用的額外邏輯。由於 Savings Plans 和預留執行個體通常有相關的預付或經常性月費,因此淨攤銷成本資料集會顯示實際成本,方法是顯示預付或經常性費用在一段時間內攤銷後的費用。 您的瀏覽器已停用或無法使用 Javascript。 您必須啟用 Javascript,才能使用 AWS 文件。請參閱您的瀏覽器說明頁以取得說明。 文件慣用形式 Cost Explorer 入門 使用 Cost Explorer 圖表 此頁面是否有幫助? - 是 感謝您,讓我們知道我們做得很好! 若您有空,歡迎您告知我們值得讚許的地方,這樣才能保持良好服務。 此頁面是否有幫助? - 否 感謝讓我們知道此頁面仍須改善。很抱歉,讓您失望。 若您有空,歡迎您提供改善文件的方式。
2026-01-13T09:29:32
https://www.atlassian.com/software/jira/templates/hr
Human Resources Templates | Jira Template Library | Atlassian Close View this page in your language ? All languages Choose your language 中文 Deutsch English Español Français Italiano 한국어 Nederlands 日本語 Português Pусский Polski Get it free Features All Features Rovo in Jira Back Solutions Teams Use cases Company size Teams Marketing Engineering Design Operations IT Use cases Getting started Planning Campaign Management Agile Project Management Program Management Company size Enterprise Back Product guide Templates Templates All Templates Software Development Marketing Design Sales Operations Service Management HR Legal IT Operations Finance Jira Service Management templates Back Pricing More + Less - Get it free Back Get it free Jira Templates Open and close the navigation menu Categories Software development Marketing Design Sales Operations Service management HR Legal IT Operations Finance Project Management Templates Categories Software development Marketing Design Sales Operations Service management HR Legal IT Operations Finance Project Management Templates Human resources templates Streamline your HR processes with Jira. With pre-built, customizable templates for HR teams, it’s easy to get started. Project management Manage activities for completing a business project. New employee onboarding Manage the onboarding process from offer acceptance to day one on the job. Recruitment Track candidates from application to offer. HR service management Manage onboarding and offboarding and respond to HR requests. Performance review Standardize the performance review process. HR resources Jira for HR teams Boost your organization's productivity, coordination, and engagement. Learn more about how Jira helps streamline your work. Learn more Put your projects on autopilot Focus on what matters and automate the rest. Create your team's custom rules or get started quickly with pre-made automations. Explore automations Plug in to your favorite tools Leverage 500+ integrations to work seamlessly, and 3000+ other extensions to craft your team’s perfect process. Explore app marketplace Company Careers Events Blogs Investor Relations Atlassian Foundation Press kit Contact us products Rovo Jira Jira Align Jira Service Management Confluence Loom Trello Bitbucket See all products Resources Technical support Purchasing & licensing Atlassian Community Knowledge base Marketplace My account Create support ticket Learn Partners Training & certification Documentation Developer resources Enterprise services See all resources Copyright © 2025 Atlassian Privacy Policy Terms Impressum Choose language Deutsch English Español Français Italiano 한국어 Nederlands 日本語 Polski Português русский 中文
2026-01-13T09:29:32
https://docs.aws.amazon.com/cost-management/latest/userguide/ce-exploring-data.html#ce-graph
Exploring your data using Cost Explorer - AWS Cost Management Exploring your data using Cost Explorer - AWS Cost Management Documentation AWS Billing and Cost Management User Guide Navigating Cost Explorer Your Cost Explorer costs Your Cost Explorer trends Your daily unblended costs Your monthly unblended costs Your net unblended costs Your recent Cost Explorer reports Your amortized costs Your net amortized costs Exploring your data using Cost Explorer On the Cost Explorer dashboard, Cost Explorer shows your estimated costs for the month to date, your forecasted costs for the month, a graph of your daily costs, your five top cost trends, and a list of reports that you recently viewed. All costs reflect your usage up to the previous day. For example, if today is December 2, the data includes your usage through December 1. Note In the current billing period, the data depends on your upstream data from your billing applications, and some data might be updated later than 24 hours. Your Cost Explorer costs Your Cost Explorer trends Your daily unblended costs Your monthly unblended costs Your net unblended costs Your recent Cost Explorer reports Your amortized costs Your net amortized costs Navigating Cost Explorer You can use the icons in the left pane to do the following: Go to the main Cost Explorer dashboard See a list of the default Cost Explorer reports See a list of your saved reports See information about your reservations See your reservation recommendations Your Cost Explorer costs At the top of the Cost Explorer page are the Month-to-date costs and Forecasted month end costs . The Month-to-date costs shows how much you're estimated to have incurred in charges so far this month and compares it to this time last month. The Forecasted month end costs shows how much Cost Explorer estimates that you will owe at the end of the month and compares your estimated costs to your actual costs of the previous month. The Month-to-date costs and the Forecasted month end costs don't include refunds. The costs for Cost Explorer are only shown in US dollars. Your Cost Explorer trends In the this month trends section, Cost Explorer shows your top cost trends. For example, your costs related to a specific service have gone up, or your costs from a specific type of RI have gone up. To see all of your costs trends, choose View all trends in the upper-right corner of the trend section. To understand a trend in more depth, choose it. You're taken to a Cost Explorer chart that shows the costs that went into calculating that trend. Your daily unblended costs In the center of the Cost Explorer dashboard, Cost Explorer shows a graph of your current unblended daily costs. You can access the filters and parameters used to create the graph by choosing Explore costs in the upper-right corner. That takes you to the Cost Explorer report page, enabling you to access the default Cost Explorer reports and modify the parameters used to create the chart. The Cost Explorer reports offer additional functionality such as downloading your data as a CSV file and saving your specific parameters as a report. For more information, see Understanding your costs using Cost Explorer reports . Your daily unblended costs don't include refunds. Your monthly unblended costs Monthly granularity You can view your unblended costs at the monthly granularity and see the discounts applied to your monthly bill. When forecasting costs, discounts are included by default. To view your unblended costs, open the Cost Explorer page and choose Cost Explorer from the navigation pane. Discounts appear as the RI Volume Discount in the chart. The discount amount aligns with the discount amount shown in your Billing and Cost Management console. To see the details in your Billing and Cost Management console Open the Billing and Cost Management console at https://console.aws.amazon.com/costmanagement/ . In the navigation pane, choose Bills . To display the discount, select the arrow next to Total Discounts , under Credits, Total Discounts and Tax Invoices . Monthly gross charges You can view your gross monthly charges by excluding the RI Volume Discount . To exclude RI volume discounts in your monthly view Open the Billing and Cost Management console at https://console.aws.amazon.com/costmanagement/ . In the left pane, choose Cost Explorer . Choose Cost & Usage . On the Filters pane, choose Charge Type . Select RI Volume Discount . To open a dropdown, select Include only and choose Exclude only . Select Apply filters . Your net unblended costs This enables you to see your net costs after all applicable discounts are calculated. You should still exclude any manual adjustment such as refunds and credits as a best practice. RI Volume Discounts are no longer visible because these are post-discount amounts. Your recent Cost Explorer reports At the bottom of the Cost Explorer dashboard is a list of reports that you have accessed recently, when you accessed them, and a link back to the report. This enables you to switch between reports or remember the reports that you find most useful. For more information about Cost Explorer reports, see Understanding your costs using Cost Explorer reports . Your amortized costs This enables you to see the cost of your AWS commitments, such as Amazon EC2 Reserved Instances or Savings Plans, spread across the usage of the selection period. AWS estimates your amortized costs by combining the unblended upfront and recurring reservation fees, and calculates the effective rate over the period of time that the upfront or recurring fee applies. In the daily view, Cost Explorer shows the unused portion of your commitment fees at the first of the month or the date of purchase. Your net amortized costs This enables you to see the cost of your AWS commitments, such as Amazon EC2 Reserved Instances or Savings Plans, after discounts with the additional logic that shows how the actual cost applies over time. Since Savings Plans and Reserved Instances usually have upfront or recurring monthly fees associated with them, the net amortized cost dataset reveals the true cost by showing how post-discount fees amortize over the period of time that the upfront or recurring fee applies. Javascript is disabled or is unavailable in your browser. To use the Amazon Web Services Documentation, Javascript must be enabled. Please refer to your browser's Help pages for instructions. Document Conventions Getting started with Cost Explorer Using the Cost Explorer chart Did this page help you? - Yes Thanks for letting us know we're doing a good job! If you've got a moment, please tell us what we did right so we can do more of it. Did this page help you? - No Thanks for letting us know this page needs work. We're sorry we let you down. If you've got a moment, please tell us how we can make the documentation better.
2026-01-13T09:29:32
https://www.ecns.cn/hd/2025-12-31/detail-iheymvap1609017.shtml
Beijing-Tangshan intercity railway starts full-line operation --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo Beijing-Tangshan intercity railway starts full-line operation ( 1 /3) 2025-12-31 16:17:47 Ecns.cn Editor :Gong Weiwei A high-speed train departing from Tongzhou of Beijing stops at the Tangshan Railway Station in Tangshan, north China's Hebei Province, Dec. 30, 2025. (Photo: China News Service/Jia Tianyong) The Beijing-Tangshan intercity railway linking Tongzhou District of Beijing, Baodi District of Tianjin, and Tangshan of Hebei, all in north China, started full-line operation Tuesday. Passengers pose for photos on the platform at Tongzhou of Beijing before boarding Dec. 30, 2025. (Photo: China News Service/Jia Tianyong) Passengers take a high-speed train departing from Tongzhou of Beijing Dec. 30, 2025. (Photo: China News Service/Jia Tianyong) Previous The Beijing-Tangshan intercity railway linking Tongzhou District of Beijing, Baodi District of Tianjin, and Tangshan of Hebei, all in north China, started full-line operation Tuesday.--> Next (1) (2) (3) LINE More Photo First 'Grassland curling' attracts 350 competitors China launches two new satellites for space target detection test People perform 'circle dance' to pray for a bountiful new year in Qingha First batch of China's emergency humanitarian aid arrives in Cambodia Central London illuminated to welcome 2026 Chinese Foreign Minister meets Cambodian Deputy PM in Yunnan ${visuals_2} ${visuals_3} More Video China's 2025 New Frontiers in three minutes Insights | UN expert: China's AI factories showcase manufacturing strength Tech at Its Best! Yiwu's small commodities win over global merchants with real strength Insights | Russian scholar: Japan's rising militarism has deep roots for long time China Q&A | How will China advance people-centered sci-tech development during the 15th Five-Year Plan period? SCO Deputy Secretary-General:Tianjin Summit sets direction for next decade ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2025 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
http://groovy-lang.org/syntax.html#_arrays
The Apache Groovy programming language - Syntax Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community You are using an outdated browser. Please upgrade your browser to improve your experience. Apache Groovy™ Learn Documentation Download Support Contribute Ecosystem Blog posts Socialize Table of contents 1. Comments 1.1. Single-line comment 1.2. Multiline comment 1.3. Groovydoc comment 1.4. Shebang line 2. Keywords 3. Identifiers 3.1. Normal identifiers 3.2. Quoted identifiers 4. Strings 4.1. Single-quoted string 4.2. String concatenation 4.3. Triple-single-quoted string 4.3.1. Escaping special characters 4.3.2. Unicode escape sequence 4.4. Double-quoted string 4.4.1. String interpolation 4.4.2. Special case of interpolating closure expressions 4.4.3. Interoperability with Java 4.4.4. GString and String hashCodes 4.5. Triple-double-quoted string 4.6. Slashy string 4.6.1. Special cases 4.7. Dollar slashy string 4.8. String summary table 4.9. Characters 5. Numbers 5.1. Integral literals 5.1.1. Alternative non-base 10 representations Binary literal Octal literal Hexadecimal literal 5.2. Decimal literals 5.3. Underscore in literals 5.4. Number type suffixes 5.5. Math operations 5.5.1. The case of the division operator 5.5.2. The case of the power operator 6. Booleans 7. Lists 8. Arrays 8.1. Java-style array initialization 9. Maps Syntax This chapter covers the syntax of the Groovy programming language. The grammar of the language derives from the Java grammar, but enhances it with specific constructs for Groovy, and allows certain simplifications. 1. Comments 1.1. Single-line comment Single-line comments start with // and can be found at any position in the line. The characters following // , until the end of the line, are considered part of the comment. // a standalone single line comment println "hello" // a comment till the end of the line 1.2. Multiline comment A multiline comment starts with /* and can be found at any position in the line. The characters following /* will be considered part of the comment, including new line characters, up to the first */ closing the comment. Multiline comments can thus be put at the end of a statement, or even inside a statement. /* a standalone multiline comment spanning two lines */ println "hello" /* a multiline comment starting at the end of a statement */ println 1 /* one */ + 2 /* two */ 1.3. Groovydoc comment Similarly to multiline comments, Groovydoc comments are multiline, but start with /** and end with */ . Lines following the first Groovydoc comment line can optionally start with a star * . Those comments are associated with: type definitions (classes, interfaces, enums, annotations), fields and properties definitions methods definitions Although the compiler will not complain about Groovydoc comments not being associated with the above language elements, you should prepend those constructs with the comment right before it. /** * A Class description */ class Person { /** the name of the person */ String name /** * Creates a greeting method for a certain person. * * @param otherPerson the person to greet * @return a greeting message */ String greet(String otherPerson) { "Hello ${otherPerson}" } } Groovydoc follows the same conventions as Java’s own Javadoc. So you’ll be able to use the same tags as with Javadoc. In addition, Groovy supports Runtime Groovydoc since 3.0.0, i.e. Groovydoc can be retained at runtime. Runtime Groovydoc is disabled by default. It can be enabled by adding JVM option -Dgroovy.attach.runtime.groovydoc=true The Runtime Groovydoc starts with /**@ and ends with */ , for example: /**@ * Some class groovydoc for Foo */ class Foo { /**@ * Some method groovydoc for bar */ void bar() { } } assert Foo.class.groovydoc.content.contains('Some class groovydoc for Foo') (1) assert Foo.class.getMethod('bar', new Class[0]).groovydoc.content.contains('Some method groovydoc for bar') (2) 1 Get the runtime groovydoc for class Foo 2 Get the runtime groovydoc for method bar 1.4. Shebang line Beside the single-line comment, there is a special line comment, often called the shebang line understood by UNIX systems which allows scripts to be run directly from the command-line, provided you have installed the Groovy distribution and the groovy command is available on the PATH . #!/usr/bin/env groovy println "Hello from the shebang line" The # character must be the first character of the file. Any indentation would yield a compilation error. 2. Keywords Groovy has the following reserved keywords: Table 1. Reserved Keywords abstract assert break case catch class const continue def default do else enum extends final finally for goto if implements import instanceof interface native new null non-sealed package public protected private return static strictfp super switch synchronized this threadsafe throw throws transient try while Of these, const , goto , strictfp , and threadsafe are not currently in use. The reserved keywords can’t in general be used for variable, field and method names. A trick allows methods to be defined having the same name as a keyword by surrounding the name in quotes as shown in the following example: // reserved keywords can be used for method names if quoted def "abstract"() { true } // when calling such methods, the name must be qualified using "this." this.abstract() Using such names might be confusing and is often best to avoid. The trick is primarily intended to enable certain Java integration scenarios and certain DSL scenarios where having "verbs" and "nouns" with the same name as keywords may be desirable. In addition, Groovy has the following contextual keywords: Table 2. Contextual Keywords as in permits record sealed trait var yields These words are only keywords in certain contexts and can be more freely used in some places, in particular for variables, fields and method names. This extra lenience allows using method or variable names that were not keywords in earlier versions of Groovy or are not keywords in Java. Examples are shown here: // contextual keywords can be used for field and variable names def as = true assert as // contextual keywords can be used for method names def in() { true } // when calling such methods, the name only needs to be qualified using "this." in scenarios which would be ambiguous this.in() Groovy programmers familiar with these contextual keywords may still wish to avoid using those names unless there is a good reason to use such a name. The restrictions on reserved keywords also apply for the primitive types, the boolean literals and the null literal (all of which are discussed later): Table 3. Other reserved words null true false boolean char byte short int long float double While not recommended, the same trick as for reserved keywords can be used: def "null"() { true } // not recommended; potentially confusing assert this.null() // must be qualified Using such words as method names is potentially confusing and is often best to avoid, however, it might be useful for certain kinds of DSLs . 3. Identifiers 3.1. Normal identifiers Identifiers start with a letter, a dollar or an underscore. They cannot start with a number. A letter can be in the following ranges: 'a' to 'z' (lowercase ascii letter) 'A' to 'Z' (uppercase ascii letter) '\u00C0' to '\u00D6' '\u00D8' to '\u00F6' '\u00F8' to '\u00FF' '\u0100' to '\uFFFE' Then following characters can contain letters and numbers. Here are a few examples of valid identifiers (here, variable names): def name def item3 def with_underscore def $dollarStart But the following ones are invalid identifiers: def 3tier def a+b def a#b All keywords are also valid identifiers when following a dot: foo.as foo.assert foo.break foo.case foo.catch 3.2. Quoted identifiers Quoted identifiers appear after the dot of a dotted expression. For instance, the name part of the person.name expression can be quoted with person."name" or person.'name' . This is particularly interesting when certain identifiers contain illegal characters that are forbidden by the Java Language Specification, but which are allowed by Groovy when quoted. For example, characters like a dash, a space, an exclamation mark, etc. def map = [:] map."an identifier with a space and double quotes" = "ALLOWED" map.'with-dash-signs-and-single-quotes' = "ALLOWED" assert map."an identifier with a space and double quotes" == "ALLOWED" assert map.'with-dash-signs-and-single-quotes' == "ALLOWED" As we shall see in the following section on strings , Groovy provides different string literals. All kind of strings are actually allowed after the dot: map.'single quote' map."double quote" map.'''triple single quote''' map."""triple double quote""" map./slashy string/ map.$/dollar slashy string/$ There’s a difference between plain character strings and Groovy’s GStrings (interpolated strings), as in that the latter case, the interpolated values are inserted in the final string for evaluating the whole identifier: def firstname = "Homer" map."Simpson-${firstname}" = "Homer Simpson" assert map.'Simpson-Homer' == "Homer Simpson" 4. Strings Text literals are represented in the form of chain of characters called strings. Groovy lets you instantiate java.lang.String objects, as well as GStrings ( groovy.lang.GString ) which are also called interpolated strings in other programming languages. 4.1. Single-quoted string Single-quoted strings are a series of characters surrounded by single quotes: 'a single-quoted string' Single-quoted strings are plain java.lang.String and don’t support interpolation. 4.2. String concatenation All the Groovy strings can be concatenated with the + operator: assert 'ab' == 'a' + 'b' 4.3. Triple-single-quoted string Triple-single-quoted strings are a series of characters surrounded by triplets of single quotes: '''a triple-single-quoted string''' Triple-single-quoted strings are plain java.lang.String and don’t support interpolation. Triple-single-quoted strings may span multiple lines. The content of the string can cross line boundaries without the need to split the string in several pieces and without concatenation or newline escape characters: def aMultilineString = '''line one line two line three''' If your code is indented, for example in the body of the method of a class, your string will contain the whitespace of the indentation. The Groovy Development Kit contains methods for stripping out the indentation with the String#stripIndent() method, and with the String#stripMargin() method that takes a delimiter character to identify the text to remove from the beginning of a string. When creating a string as follows: def startingAndEndingWithANewline = ''' line one line two line three ''' You will notice that the resulting string contains a newline character as first character. It is possible to strip that character by escaping the newline with a backslash: def strippedFirstNewline = '''\ line one line two line three ''' assert !strippedFirstNewline.startsWith('\n') 4.3.1. Escaping special characters You can escape single quotes with the backslash character to avoid terminating the string literal: 'an escaped single quote: \' needs a backslash' And you can escape the escape character itself with a double backslash: 'an escaped escape character: \\ needs a double backslash' Some special characters also use the backslash as escape character: Escape sequence Character \b backspace \f formfeed \n newline \r carriage return \s single space \t tabulation \\ backslash \' single quote within a single-quoted string (and optional for triple-single-quoted and double-quoted strings) \" double quote within a double-quoted string (and optional for triple-double-quoted and single-quoted strings) We’ll see some more escaping details when it comes to other types of strings discussed later. 4.3.2. Unicode escape sequence For characters that are not present on your keyboard, you can use unicode escape sequences: a backslash, followed by 'u', then 4 hexadecimal digits. For example, the Euro currency symbol can be represented with: 'The Euro currency symbol: \u20AC' 4.4. Double-quoted string Double-quoted strings are a series of characters surrounded by double quotes: "a double-quoted string" Double-quoted strings are plain java.lang.String if there’s no interpolated expression, but are groovy.lang.GString instances if interpolation is present. To escape a double quote, you can use the backslash character: "A double quote: \"". 4.4.1. String interpolation Any Groovy expression can be interpolated in all string literals, apart from single and triple-single-quoted strings. Interpolation is the act of replacing a placeholder in the string with its value upon evaluation of the string. The placeholder expressions are surrounded by ${} . The curly braces may be omitted for unambiguous dotted expressions, i.e. we can use just a $ prefix in those cases. If the GString is ever passed to a method taking a String, the expression value inside the placeholder is evaluated to its string representation (by calling toString() on that expression) and the resulting String is passed to the method. Here, we have a string with a placeholder referencing a local variable: def name = 'Guillaume' // a plain string def greeting = "Hello ${name}" assert greeting.toString() == 'Hello Guillaume' Any Groovy expression is valid, as we can see in this example with an arithmetic expression: def sum = "The sum of 2 and 3 equals ${2 + 3}" assert sum.toString() == 'The sum of 2 and 3 equals 5' Not only are expressions allowed in between the ${} placeholder, but so are statements. However, a statement’s value is just null . So if several statements are inserted in that placeholder, the last one should somehow return a meaningful value to be inserted. For instance, "The sum of 1 and 2 is equal to ${def a = 1; def b = 2; a + b}" is supported and works as expected but a good practice is usually to stick to simple expressions inside GString placeholders. In addition to ${} placeholders, we can also use a lone $ sign prefixing a dotted expression: def person = [name: 'Guillaume', age: 36] assert "$person.name is $person.age years old" == 'Guillaume is 36 years old' But only dotted expressions of the form a.b , a.b.c , etc, are valid. Expressions containing parentheses like method calls, curly braces for closures, dots which aren’t part of a property expression or arithmetic operators would be invalid. Given the following variable definition of a number: def number = 3.14 The following statement will throw a groovy.lang.MissingPropertyException because Groovy believes you’re trying to access the toString property of that number, which doesn’t exist: shouldFail(MissingPropertyException) { println "$number.toString()" } You can think of "$number.toString()" as being interpreted by the parser as "${number.toString}()" . Similarly, if the expression is ambiguous, you need to keep the curly braces: String thing = 'treasure' assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by $thing.x" // <= Not allowed: ambiguous!! assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by ${thing}.x" // <= Curly braces required If you need to escape the $ or ${} placeholders in a GString so they appear as is without interpolation, you just need to use a \ backslash character to escape the dollar sign: assert '$5' == "\$5" assert '${name}' == "\${name}" 4.4.2. Special case of interpolating closure expressions So far, we’ve seen we could interpolate arbitrary expressions inside the ${} placeholder, but there is a special case and notation for closure expressions. When the placeholder contains an arrow, ${→} , the expression is actually a closure expression — you can think of it as a closure with a dollar prepended in front of it: def sParameterLessClosure = "1 + 2 == ${-> 3}" (1) assert sParameterLessClosure == '1 + 2 == 3' def sOneParamClosure = "1 + 2 == ${ w -> w << 3}" (2) assert sOneParamClosure == '1 + 2 == 3' 1 The closure is a parameterless closure which doesn’t take arguments. 2 Here, the closure takes a single java.io.StringWriter argument, to which you can append content with the << leftShift operator. In either case, both placeholders are embedded closures. In appearance, it looks like a more verbose way of defining expressions to be interpolated, but closures have an interesting advantage over mere expressions: lazy evaluation. Let’s consider the following sample: def number = 1 (1) def eagerGString = "value == ${number}" def lazyGString = "value == ${ -> number }" assert eagerGString == "value == 1" (2) assert lazyGString == "value == 1" (3) number = 2 (4) assert eagerGString == "value == 1" (5) assert lazyGString == "value == 2" (6) 1 We define a number variable containing 1 that we then interpolate within two GStrings, as an expression in eagerGString and as a closure in lazyGString . 2 We expect the resulting string to contain the same string value of 1 for eagerGString . 3 Similarly for lazyGString 4 Then we change the value of the variable to a new number 5 With a plain interpolated expression, the value was actually bound at the time of creation of the GString. 6 But with a closure expression, the closure is called upon each coercion of the GString into String, resulting in an updated string containing the new number value. An embedded closure expression taking more than one parameter will generate an exception at runtime. Only closures with zero or one parameter are allowed. 4.4.3. Interoperability with Java When a method (whether implemented in Java or Groovy) expects a java.lang.String , but we pass a groovy.lang.GString instance, the toString() method of the GString is automatically and transparently called. String takeString(String message) { (4) assert message instanceof String (5) return message } def message = "The message is ${'hello'}" (1) assert message instanceof GString (2) def result = takeString(message) (3) assert result instanceof String assert result == 'The message is hello' 1 We create a GString variable 2 We double-check it’s an instance of the GString 3 We then pass that GString to a method taking a String as parameter 4 The signature of the takeString() method explicitly says its sole parameter is a String 5 We also verify that the parameter is indeed a String and not a GString. 4.4.4. GString and String hashCodes Although interpolated strings can be used in lieu of plain Java strings, they differ with strings in a particular way: their hashCodes are different. Plain Java strings are immutable, whereas the resulting String representation of a GString can vary, depending on its interpolated values. Even for the same resulting string, GStrings and Strings don’t have the same hashCode. assert "one: ${1}".hashCode() != "one: 1".hashCode() GString and Strings having different hashCode values, using GString as Map keys should be avoided, especially if we try to retrieve an associated value with a String instead of a GString. def key = "a" def m = ["${key}": "letter ${key}"] (1) assert m["a"] == null (2) 1 The map is created with an initial pair whose key is a GString 2 When we try to fetch the value with a String key, we will not find it, as Strings and GString have different hashCode values 4.5. Triple-double-quoted string Triple-double-quoted strings behave like double-quoted strings, with the addition that they are multiline, like the triple-single-quoted strings. def name = 'Groovy' def template = """ Dear Mr ${name}, You're the winner of the lottery! Yours sincerly, Dave """ assert template.toString().contains('Groovy') Neither double quotes nor single quotes need be escaped in triple-double-quoted strings. 4.6. Slashy string Beyond the usual quoted strings, Groovy offers slashy strings, which use / as the opening and closing delimiter. Slashy strings are particularly useful for defining regular expressions and patterns, as there is no need to escape backslashes. Example of a slashy string: def fooPattern = /.*foo.*/ assert fooPattern == '.*foo.*' Only forward slashes need to be escaped with a backslash: def escapeSlash = /The character \/ is a forward slash/ assert escapeSlash == 'The character / is a forward slash' Slashy strings are multiline: def multilineSlashy = /one two three/ assert multilineSlashy.contains('\n') Slashy strings can be thought of as just another way to define a GString but with different escaping rules. They hence support interpolation: def color = 'blue' def interpolatedSlashy = /a ${color} car/ assert interpolatedSlashy == 'a blue car' 4.6.1. Special cases An empty slashy string cannot be represented with a double forward slash, as it’s understood by the Groovy parser as a line comment. That’s why the following assert would actually not compile as it would look like a non-terminated statement: assert '' == // As slashy strings were mostly designed to make regexp easier so a few things that are errors in GStrings like $() or $5 will work with slashy strings. Remember that escaping backslashes is not required. An alternative way of thinking of this is that in fact escaping is not supported. The slashy string /\t/ won’t contain a tab but instead a backslash followed by the character 't'. Escaping is only allowed for the slash character, i.e. /\/folder/ will be a slashy string containing '/folder' . A consequence of slash escaping is that a slashy string can’t end with a backslash. Otherwise that will escape the slashy string terminator. You can instead use a special trick, /ends with slash ${'\\'}/ . But best just avoid using a slashy string in such a case. 4.7. Dollar slashy string Dollar slashy strings are multiline GStrings delimited with an opening $/ and a closing /$ . The escaping character is the dollar sign, and it can escape another dollar, or a forward slash. Escaping for the dollar and forward slash characters is only needed where conflicts arise with the special use of those characters. The characters $foo would normally indicate a GString placeholder, so those four characters can be entered into a dollar slashy string by escaping the dollar, i.e. $$foo . Similarly, you will need to escape a dollar slashy closing delimiter if you want it to appear in your string. Here are a few examples: def name = "Guillaume" def date = "April, 1st" def dollarSlashy = $/ Hello $name, today we're ${date}. $ dollar sign $$ escaped dollar sign \ backslash / forward slash $/ escaped forward slash $$$/ escaped opening dollar slashy $/$$ escaped closing dollar slashy /$ assert [ 'Guillaume', 'April, 1st', '$ dollar sign', '$ escaped dollar sign', '\\ backslash', '/ forward slash', '/ escaped forward slash', '$/ escaped opening dollar slashy', '/$ escaped closing dollar slashy' ].every { dollarSlashy.contains(it) } It was created to overcome some of the limitations of the slashy string escaping rules. Use it when its escaping rules suit your string contents (typically if it has some slashes you don’t want to escape). 4.8. String summary table String name String syntax Interpolated Multiline Escape character Single-quoted '…​' \ Triple-single-quoted '''…​''' \ Double-quoted "…​" \ Triple-double-quoted """…​""" \ Slashy /…​/ \ Dollar slashy $/…​/$ $ 4.9. Characters Unlike Java, Groovy doesn’t have an explicit character literal. However, you can be explicit about making a Groovy string an actual character, by three different means: char c1 = 'A' (1) assert c1 instanceof Character def c2 = 'B' as char (2) assert c2 instanceof Character def c3 = (char)'C' (3) assert c3 instanceof Character 1 by being explicit when declaring a variable holding the character by specifying the char type 2 by using type coercion with the as operator 3 by using a cast to char operation The first option 1 is interesting when the character is held in a variable, while the other two ( 2 and 3 ) are more interesting when a char value must be passed as argument of a method call. 5. Numbers Groovy supports different kinds of integral literals and decimal literals, backed by the usual Number types of Java. 5.1. Integral literals The integral literal types are the same as in Java: byte char short int long java.math.BigInteger You can create integral numbers of those types with the following declarations: // primitive types byte b = 1 char c = 2 short s = 3 int i = 4 long l = 5 // infinite precision BigInteger bi = 6 If you use optional typing by using the def keyword, the type of the integral number will vary: it’ll adapt to the capacity of the type that can hold that number. For positive numbers: def a = 1 assert a instanceof Integer // Integer.MAX_VALUE def b = 2147483647 assert b instanceof Integer // Integer.MAX_VALUE + 1 def c = 2147483648 assert c instanceof Long // Long.MAX_VALUE def d = 9223372036854775807 assert d instanceof Long // Long.MAX_VALUE + 1 def e = 9223372036854775808 assert e instanceof BigInteger As well as for negative numbers: def na = -1 assert na instanceof Integer // Integer.MIN_VALUE def nb = -2147483648 assert nb instanceof Integer // Integer.MIN_VALUE - 1 def nc = -2147483649 assert nc instanceof Long // Long.MIN_VALUE def nd = -9223372036854775808 assert nd instanceof Long // Long.MIN_VALUE - 1 def ne = -9223372036854775809 assert ne instanceof BigInteger 5.1.1. Alternative non-base 10 representations Numbers can also be represented in binary, octal, hexadecimal and decimal bases. Binary literal Binary numbers start with a 0b prefix: int xInt = 0b10101111 assert xInt == 175 short xShort = 0b11001001 assert xShort == 201 as short byte xByte = 0b11 assert xByte == 3 as byte long xLong = 0b101101101101 assert xLong == 2925l BigInteger xBigInteger = 0b111100100001 assert xBigInteger == 3873g int xNegativeInt = -0b10101111 assert xNegativeInt == -175 Octal literal Octal numbers are specified in the typical format of 0 followed by octal digits. int xInt = 077 assert xInt == 63 short xShort = 011 assert xShort == 9 as short byte xByte = 032 assert xByte == 26 as byte long xLong = 0246 assert xLong == 166l BigInteger xBigInteger = 01111 assert xBigInteger == 585g int xNegativeInt = -077 assert xNegativeInt == -63 Hexadecimal literal Hexadecimal numbers are specified in the typical format of 0x followed by hex digits. int xInt = 0x77 assert xInt == 119 short xShort = 0xaa assert xShort == 170 as short byte xByte = 0x3a assert xByte == 58 as byte long xLong = 0xffff assert xLong == 65535l BigInteger xBigInteger = 0xaaaa assert xBigInteger == 43690g Double xDouble = new Double('0x1.0p0') assert xDouble == 1.0d int xNegativeInt = -0x77 assert xNegativeInt == -119 5.2. Decimal literals The decimal literal types are the same as in Java: float double java.math.BigDecimal You can create decimal numbers of those types with the following declarations: // primitive types float f = 1.234 double d = 2.345 // infinite precision BigDecimal bd = 3.456 Decimals can use exponents, with the e or E exponent letter, followed by an optional sign, and an integral number representing the exponent: assert 1e3 == 1_000.0 assert 2E4 == 20_000.0 assert 3e+1 == 30.0 assert 4E-2 == 0.04 assert 5e-1 == 0.5 Conveniently for exact decimal number calculations, Groovy chooses java.math.BigDecimal as its decimal number type. In addition, both float and double are supported, but require an explicit type declaration, type coercion or suffix. Even if BigDecimal is the default for decimal numbers, such literals are accepted in methods or closures taking float or double as parameter types. Decimal numbers can’t be represented using a binary, octal or hexadecimal representation. 5.3. Underscore in literals When writing long literal numbers, it’s harder on the eye to figure out how some numbers are grouped together, for example with groups of thousands, of words, etc. By allowing you to place underscore in number literals, it’s easier to spot those groups: long creditCardNumber = 1234_5678_9012_3456L long socialSecurityNumbers = 999_99_9999L double monetaryAmount = 12_345_132.12 long hexBytes = 0xFF_EC_DE_5E long hexWords = 0xFFEC_DE5E long maxLong = 0x7fff_ffff_ffff_ffffL long alsoMaxLong = 9_223_372_036_854_775_807L long bytes = 0b11010010_01101001_10010100_10010010 5.4. Number type suffixes We can force a number (including binary, octals and hexadecimals) to have a specific type by giving a suffix (see table below), either uppercase or lowercase. Type Suffix BigInteger G or g Long L or l Integer I or i BigDecimal G or g Double D or d Float F or f Examples: assert 42I == Integer.valueOf('42') assert 42i == Integer.valueOf('42') // lowercase i more readable assert 123L == Long.valueOf("123") // uppercase L more readable assert 2147483648 == Long.valueOf('2147483648') // Long type used, value too large for an Integer assert 456G == new BigInteger('456') assert 456g == new BigInteger('456') assert 123.45 == new BigDecimal('123.45') // default BigDecimal type used assert .321 == new BigDecimal('.321') assert 1.200065D == Double.valueOf('1.200065') assert 1.234F == Float.valueOf('1.234') assert 1.23E23D == Double.valueOf('1.23E23') assert 0b1111L.class == Long // binary assert 0xFFi.class == Integer // hexadecimal assert 034G.class == BigInteger // octal 5.5. Math operations Although operators are covered in more detail elsewhere, it’s important to discuss the behavior of math operations and what their resulting types are. Division and power binary operations aside (covered below), binary operations between byte , char , short and int result in int binary operations involving long with byte , char , short and int result in long binary operations involving BigInteger and any other integral type result in BigInteger binary operations involving BigDecimal with byte , char , short , int and BigInteger result in BigDecimal binary operations between float , double and BigDecimal result in double binary operations between two BigDecimal result in BigDecimal The following table summarizes those rules: byte char short int long BigInteger float double BigDecimal byte int int int int long BigInteger double double BigDecimal char int int int long BigInteger double double BigDecimal short int int long BigInteger double double BigDecimal int int long BigInteger double double BigDecimal long long BigInteger double double BigDecimal BigInteger BigInteger double double BigDecimal float double double double double double double BigDecimal BigDecimal Thanks to Groovy’s operator overloading, the usual arithmetic operators work as well with BigInteger and BigDecimal , unlike in Java where you have to use explicit methods for operating on those numbers. 5.5.1. The case of the division operator The division operators / (and /= for division and assignment) produce a double result if either operand is a float or double , and a BigDecimal result otherwise (when both operands are any combination of an integral type short , char , byte , int , long , BigInteger or BigDecimal ). BigDecimal division is performed with the divide() method if the division is exact (i.e. yielding a result that can be represented within the bounds of the same precision and scale), or using a MathContext with a precision of the maximum of the two operands' precision plus an extra precision of 10, and a scale of the maximum of 10 and the maximum of the operands' scale. For integer division like in Java, you should use the intdiv() method, as Groovy doesn’t provide a dedicated integer division operator symbol. 5.5.2. The case of the power operator The power operation is represented by the ** operator, with two parameters: the base and the exponent. The result of the power operation depends on its operands, and the result of the operation (in particular if the result can be represented as an integral value). The following rules are used by Groovy’s power operation to determine the resulting type: If the exponent is a decimal value if the result can be represented as an Integer , then return an Integer else if the result can be represented as a Long , then return a Long otherwise return a Double If the exponent is an integral value if the exponent is strictly negative, then return an Integer , Long or Double if the result value fits in that type if the exponent is positive or zero if the base is a BigDecimal , then return a BigDecimal result value if the base is a BigInteger , then return a BigInteger result value if the base is an Integer , then return an Integer if the result value fits in it, otherwise a BigInteger if the base is a Long , then return a Long if the result value fits in it, otherwise a BigInteger We can illustrate those rules with a few examples: // base and exponent are ints and the result can be represented by an Integer assert 2 ** 3 instanceof Integer // 8 assert 10 ** 9 instanceof Integer // 1_000_000_000 // the base is a long, so fit the result in a Long // (although it could have fit in an Integer) assert 5L ** 2 instanceof Long // 25 // the result can't be represented as an Integer or Long, so return a BigInteger assert 100 ** 10 instanceof BigInteger // 10e20 assert 1234 ** 123 instanceof BigInteger // 170515806212727042875... // the base is a BigDecimal and the exponent a negative int // but the result can be represented as an Integer assert 0.5 ** -2 instanceof Integer // 4 // the base is an int, and the exponent a negative float // but again, the result can be represented as an Integer assert 1 ** -0.3f instanceof Integer // 1 // the base is an int, and the exponent a negative int // but the result will be calculated as a Double // (both base and exponent are actually converted to doubles) assert 10 ** -1 instanceof Double // 0.1 // the base is a BigDecimal, and the exponent is an int, so return a BigDecimal assert 1.2 ** 10 instanceof BigDecimal // 6.1917364224 // the base is a float or double, and the exponent is an int // but the result can only be represented as a Double value assert 3.4f ** 5 instanceof Double // 454.35430372146965 assert 5.6d ** 2 instanceof Double // 31.359999999999996 // the exponent is a decimal value // and the result can only be represented as a Double value assert 7.8 ** 1.9 instanceof Double // 49.542708423868476 assert 2 ** 0.1f instanceof Double // 1.0717734636432956 6. Booleans Boolean is a special data type that is used to represent truth values: true and false . Use this data type for simple flags that track true/false conditions . Boolean values can be stored in variables, assigned into fields, just like any other data type: def myBooleanVariable = true boolean untypedBooleanVar = false booleanField = true true and false are the only two primitive boolean values. But more complex boolean expressions can be represented using logical operators . In addition, Groovy has special rules (often referred to as Groovy Truth ) for coercing non-boolean objects to a boolean value. 7. Lists Groovy uses a comma-separated list of values, surrounded by square brackets, to denote lists. Groovy lists are plain JDK java.util.List , as Groovy doesn’t define its own collection classes. The concrete list implementation used when defining list literals are java.util.ArrayList by default, unless you decide to specify otherwise, as we shall see later on. def numbers = [1, 2, 3] (1) assert numbers instanceof List (2) assert numbers.size() == 3 (3) 1 We define a list numbers delimited by commas and surrounded by square brackets, and we assign that list into a variable 2 The list is an instance of Java’s java.util.List interface 3 The size of the list can be queried with the size() method, and shows our list contains 3 elements In the above example, we used a homogeneous list, but you can also create lists containing values of heterogeneous types: def heterogeneous = [1, "a", true] (1) 1 Our list here contains a number, a string and a boolean value We mentioned that by default, list literals are actually instances of java.util.ArrayList , but it is possible to use a different backing type for our lists, thanks to using type coercion with the as operator, or with explicit type declaration for your variables: def arrayList = [1, 2, 3] assert arrayList instanceof java.util.ArrayList def linkedList = [2, 3, 4] as LinkedList (1) assert linkedList instanceof java.util.LinkedList LinkedList otherLinked = [3, 4, 5] (2) assert otherLinked instanceof java.util.LinkedList 1 We use coercion with the as operator to explicitly request a java.util.LinkedList implementation 2 We can say that the variable holding the list literal is of type java.util.LinkedList You can access elements of the list with the [] subscript operator (both for reading and setting values) with positive indices or negative indices to access elements from the end of the list, as well as with ranges, and use the << leftShift operator to append elements to a list: def letters = ['a', 'b', 'c', 'd'] assert letters[0] == 'a' (1) assert letters[1] == 'b' assert letters[-1] == 'd' (2) assert letters[-2] == 'c' letters[2] = 'C' (3) assert letters[2] == 'C' letters << 'e' (4) assert letters[ 4] == 'e' assert letters[-1] == 'e' assert letters[1, 3] == ['b', 'd'] (5) assert letters[2..4] == ['C', 'd', 'e'] (6) 1 Access the first element of the list (zero-based counting) 2 Access the last element of the list with a negative index: -1 is the first element from the end of the list 3 Use an assignment to set a new value for the third element of the list 4 Use the << leftShift operator to append an element at the end of the list 5 Access two elements at once, returning a new list containing those two elements 6 Use a range to access a range of values from the list, from a start to an end element position As lists can be heterogeneous in nature, lists can also contain other lists to create multidimensional lists: def multi = [[0, 1], [2, 3]] (1) assert multi[1][0] == 2 (2) 1 Define a list of numbers 2 Access the second element of the top-most list, and the first element of the inner list 8. Arrays Groovy reuses the list notation for arrays, but to make such literals arrays, you need to explicitly define the type of the array through coercion or type declaration. String[] arrStr = ['Ananas', 'Banana', 'Kiwi'] (1) assert arrStr instanceof String[] (2) assert !(arrStr instanceof List) def numArr = [1, 2, 3] as int[] (3) assert numArr instanceof int[] (4) assert numArr.size() == 3 1 Define an array of strings using explicit variable type declaration 2 Assert that we created an array of strings 3 Create an array of ints with the as operator 4 Assert that we created an array of primitive ints You can also create multi-dimensional arrays: def matrix3 = new Integer[3][3] (1) assert matrix3.size() == 3 Integer[][] matrix2 (2) matrix2 = [[1, 2], [3, 4]] assert matrix2 instanceof Integer[][] 1 You can define the bounds of a new array 2 Or declare an array without specifying its bounds Access to elements of an array follows the same notation as for lists: String[] names = ['Cédric', 'Guillaume', 'Jochen', 'Paul'] assert names[0] == 'Cédric' (1) names[2] = 'Blackdrag' (2) assert names[2] == 'Blackdrag' 1 Retrieve the first element of the array 2 Set the value of the third element of the array to a new value 8.1. Java-style array initialization Groovy has always supported literal list/array definitions using square brackets and has avoided Java-style curly braces so as not to conflict with closure definitions. In the case where the curly braces come immediately after an array type declaration however, there is no ambiguity with closure definitions, so Groovy 3 and above support that variant of the Java array initialization expression. Examples: def primes = new int[] {2, 3, 5, 7, 11} assert primes.size() == 5 && primes.sum() == 28 assert primes.class.name == '[I' def pets = new String[] {'cat', 'dog'} assert pets.size() == 2 && pets.sum() == 'catdog' assert pets.class.name == '[Ljava.lang.String;' // traditional Groovy alternative still supported String[] groovyBooks = [ 'Groovy in Action', 'Making Java Groovy' ] assert groovyBooks.every{ it.contains('Groovy') } 9. Maps Sometimes called dictionaries or associative arrays in other languages, Groovy features maps. Maps associate keys to values, separating keys and values with colons, and each key/value pairs with commas, and the whole keys and values surrounded by square brackets. def colors = [red: '#FF0000', green: '#00FF00', blue: '#0000FF'] (1) assert colors['red'] == '#FF0000' (2) assert colors.green == '#00FF00' (3) colors['pink'] = '#FF00FF' (4) colors.yellow = '#FFFF00' (5) assert colors.pink == '#FF00FF' assert colors['yellow'] == '#FFFF00' assert colors instanceof java.util.LinkedHashMap 1 We define a map of string color names, associated with their hexadecimal-coded html colors 2 We use the subscript notation to check the content associated with the red key 3 We can also use the property notation to assert the color green’s hexadecimal representation 4 Similarly, we can use the subscript notation to add a new key/value pair 5 Or the property notation, to add the yellow color When using names for the keys, we actually define string keys in the map. Groovy creates maps that are actually instances of java.util.LinkedHashMap . If you try to access a key which is not present in the map: assert colors.unknown == null def emptyMap = [:] assert emptyMap.anyKey == null You will retrieve a null result. In the examples above, we used string keys, but you can also use values of other types as keys: def numbers = [1: 'one', 2: 'two'] assert numbers[1] == 'one' Here, we used numbers as keys, as numbers can unambiguously be recognized as numbers, so Groovy will not create a string key like in our previous examples. But consider the case you want to pass a variable in lieu of the key, to have the value of that variable become the key: def key = 'name' def person = [key: 'Guillaume'] (1) assert !person.containsKey('name') (2) assert person.containsKey('key') (3) 1 The key associated with the 'Guillaume' name will actually be the "key" string, not the value associated with the key variable 2 The map doesn’t contain the 'name' key 3 Instead, the map contains a 'key' key You can also pass quoted strings as well as keys: ["name": "Guillaume"]. This is mandatory if your key string isn’t a valid identifier, for example if you wanted to create a string key containing a dash like in: ["street-name": "Main street"]. When you need to pass variable values as keys in your map definitions, you must surround the variable or expression with parentheses: person = [(key): 'Guillaume'] (1) assert person.containsKey('name') (2) assert !person.containsKey('key') (3) 1 This time, we surround the key variable with parentheses, to instruct the parser we are passing a variable rather than defining a string key 2 The map does contain the name key 3 But the map doesn’t contain the key key as before Groovy Learn Documentation Download Support Contribute Ecosystem Blog posts About Source code Security Books Thanks Sponsorship FAQ Search Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community The Groovy programming language is supported by the Apache Software Foundation and the Groovy community. Apache, Apache Groovy, Groovy, and the ASF logo are either registered trademarks or trademarks of The Apache Software Foundation. © 2003-2025 the Apache Groovy project — Groovy is Open Source: license , privacy policy .
2026-01-13T09:29:32
https://www.ecns.cn/hd/2026-01-09/detail-iheyrzrv3840069.shtml
Exploring world’s largest island Greenland --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo Exploring world’s largest island Greenland ( 1 /4) 2026-01-09 09:02:12 Ecns Editor :Gong Weiwei Photo released on Jan. 8, 2026 shows the landscape of Greenland, the world's largest island, with most of its territory located within the Arctic Circle. (Photo provided to China News Service) With a population of fewer than 60,000, Greenland is an autonomous territory of Denmark. The island is rich in natural resources and occupies a strategically important location. Photo released on Jan. 8, 2026 shows the landscape of Greenland, the world's largest island, with most of its territory located within the Arctic Circle. (Photo provided to China News Service) Photo released on Jan. 8, 2026 shows the landscape of Greenland, the world's largest island, with most of its territory located within the Arctic Circle. (Photo provided to China News Service) Photo released on Jan. 8, 2026 shows the landscape of Greenland, the world's largest island, with most of its territory located within the Arctic Circle. (Photo provided to China News Service) Previous With a population of fewer than 60,000, Greenland is an autonomous territory of Denmark. The island is rich in natural resources and occupies a strategically important location.--> Next (1) (2) (3) (4) LINE More Photo Venezuelan people call on U.S. to release Nicolás Maduro and his wife Heavey snow hits Paris 'Southern Snow Town' draws tourists to Guizhou Province Global mayors attend dialogue in NE China on developing ice, snow economy Indonesia welcomes its first locally born giant panda cub Chinese FM on Venezuela situation: China always opposes imposing one country's will on another ${visuals_2} ${visuals_3} More Video What's it like doing business in China? Check what foreign friends say More than a business hub: check how global merchants thrive in Yiwu Insights | Sanae Takaichi's erroneous remarks a grave 'diplomatic failure': Japanese scholar Insights丨From energy cooperation to industrial co-building: New momentum in Europe-China ties Insights丨China’s economy in UN official’s eyes: Resilience, exports, and high-tech transition Insights丨Portuguese economist sees stability and opportunity in China’s long-term planning ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://www.ecns.cn/hd/2026-01-07/detail-iheyrzrv3836994.shtml
Global mayors attend dialogue in NE China on developing ice, snow economy --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo Global mayors attend dialogue in NE China on developing ice, snow economy ( 1 /3) 2026-01-07 10:25:14 Ecns.cn Editor :Gong Weiwei The opening ceremony of the "Global Mayors Dialogue in Harbin" held in Harbin, northeast China's Heilongjiang Province, Jan. 6, 2026. Mayors, deputy mayors and mayoral representatives from cities in nations including Canada, Finland, Germany, Greece, the Republic of Korea, and Thailand attends the event, engaging in in-depth exchanges on practical approaches to developing the ice and snow economy. (Photo provided to China News Service) The opening ceremony of the "Global Mayors Dialogue in Harbin" held in Harbin, northeast China's Heilongjiang Province, Jan. 6, 2026. (Photo provided to China News Service) Andrew Knack, Mayor of Edmonton in Canada receives an interview at the "Global Mayors Dialogue in Harbin" held in Harbin, Jan. 6, 2026. (Photo provided to China News Service) Previous Next (1) (2) (3) LINE More Photo Global mayors attend dialogue in NE China for exchanges to developing ice, snow economy Indonesia welcomes its first locally born giant panda cub Chinese FM on Venezuela situation: China always opposes imposing one country's will on another Maduro pleads not guilty in N.Y. court UN Security Council holds emergency meeting on Venezuela Harbin opens its 42nd Ice and Snow Festival ${visuals_2} ${visuals_3} More Video Insights | Sanae Takaichi's erroneous remarks a grave 'diplomatic failure': Japanese scholar Insights丨From energy cooperation to industrial co-building: New momentum in Europe-China ties Insights丨China’s economy in UN official’s eyes: Resilience, exports, and high-tech transition Insights丨Portuguese economist sees stability and opportunity in China’s long-term planning (W.E. Talk) Experts on 2026: China's 15th Five-Year Plan significant for the World (W.E. Talk) Experts look to 2026: Seizing opportunities amid crises, forging ahead after breakthroughs ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
http://groovy-lang.org/syntax.html#_quoted_identifiers
The Apache Groovy programming language - Syntax Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community You are using an outdated browser. Please upgrade your browser to improve your experience. Apache Groovy™ Learn Documentation Download Support Contribute Ecosystem Blog posts Socialize Table of contents 1. Comments 1.1. Single-line comment 1.2. Multiline comment 1.3. Groovydoc comment 1.4. Shebang line 2. Keywords 3. Identifiers 3.1. Normal identifiers 3.2. Quoted identifiers 4. Strings 4.1. Single-quoted string 4.2. String concatenation 4.3. Triple-single-quoted string 4.3.1. Escaping special characters 4.3.2. Unicode escape sequence 4.4. Double-quoted string 4.4.1. String interpolation 4.4.2. Special case of interpolating closure expressions 4.4.3. Interoperability with Java 4.4.4. GString and String hashCodes 4.5. Triple-double-quoted string 4.6. Slashy string 4.6.1. Special cases 4.7. Dollar slashy string 4.8. String summary table 4.9. Characters 5. Numbers 5.1. Integral literals 5.1.1. Alternative non-base 10 representations Binary literal Octal literal Hexadecimal literal 5.2. Decimal literals 5.3. Underscore in literals 5.4. Number type suffixes 5.5. Math operations 5.5.1. The case of the division operator 5.5.2. The case of the power operator 6. Booleans 7. Lists 8. Arrays 8.1. Java-style array initialization 9. Maps Syntax This chapter covers the syntax of the Groovy programming language. The grammar of the language derives from the Java grammar, but enhances it with specific constructs for Groovy, and allows certain simplifications. 1. Comments 1.1. Single-line comment Single-line comments start with // and can be found at any position in the line. The characters following // , until the end of the line, are considered part of the comment. // a standalone single line comment println "hello" // a comment till the end of the line 1.2. Multiline comment A multiline comment starts with /* and can be found at any position in the line. The characters following /* will be considered part of the comment, including new line characters, up to the first */ closing the comment. Multiline comments can thus be put at the end of a statement, or even inside a statement. /* a standalone multiline comment spanning two lines */ println "hello" /* a multiline comment starting at the end of a statement */ println 1 /* one */ + 2 /* two */ 1.3. Groovydoc comment Similarly to multiline comments, Groovydoc comments are multiline, but start with /** and end with */ . Lines following the first Groovydoc comment line can optionally start with a star * . Those comments are associated with: type definitions (classes, interfaces, enums, annotations), fields and properties definitions methods definitions Although the compiler will not complain about Groovydoc comments not being associated with the above language elements, you should prepend those constructs with the comment right before it. /** * A Class description */ class Person { /** the name of the person */ String name /** * Creates a greeting method for a certain person. * * @param otherPerson the person to greet * @return a greeting message */ String greet(String otherPerson) { "Hello ${otherPerson}" } } Groovydoc follows the same conventions as Java’s own Javadoc. So you’ll be able to use the same tags as with Javadoc. In addition, Groovy supports Runtime Groovydoc since 3.0.0, i.e. Groovydoc can be retained at runtime. Runtime Groovydoc is disabled by default. It can be enabled by adding JVM option -Dgroovy.attach.runtime.groovydoc=true The Runtime Groovydoc starts with /**@ and ends with */ , for example: /**@ * Some class groovydoc for Foo */ class Foo { /**@ * Some method groovydoc for bar */ void bar() { } } assert Foo.class.groovydoc.content.contains('Some class groovydoc for Foo') (1) assert Foo.class.getMethod('bar', new Class[0]).groovydoc.content.contains('Some method groovydoc for bar') (2) 1 Get the runtime groovydoc for class Foo 2 Get the runtime groovydoc for method bar 1.4. Shebang line Beside the single-line comment, there is a special line comment, often called the shebang line understood by UNIX systems which allows scripts to be run directly from the command-line, provided you have installed the Groovy distribution and the groovy command is available on the PATH . #!/usr/bin/env groovy println "Hello from the shebang line" The # character must be the first character of the file. Any indentation would yield a compilation error. 2. Keywords Groovy has the following reserved keywords: Table 1. Reserved Keywords abstract assert break case catch class const continue def default do else enum extends final finally for goto if implements import instanceof interface native new null non-sealed package public protected private return static strictfp super switch synchronized this threadsafe throw throws transient try while Of these, const , goto , strictfp , and threadsafe are not currently in use. The reserved keywords can’t in general be used for variable, field and method names. A trick allows methods to be defined having the same name as a keyword by surrounding the name in quotes as shown in the following example: // reserved keywords can be used for method names if quoted def "abstract"() { true } // when calling such methods, the name must be qualified using "this." this.abstract() Using such names might be confusing and is often best to avoid. The trick is primarily intended to enable certain Java integration scenarios and certain DSL scenarios where having "verbs" and "nouns" with the same name as keywords may be desirable. In addition, Groovy has the following contextual keywords: Table 2. Contextual Keywords as in permits record sealed trait var yields These words are only keywords in certain contexts and can be more freely used in some places, in particular for variables, fields and method names. This extra lenience allows using method or variable names that were not keywords in earlier versions of Groovy or are not keywords in Java. Examples are shown here: // contextual keywords can be used for field and variable names def as = true assert as // contextual keywords can be used for method names def in() { true } // when calling such methods, the name only needs to be qualified using "this." in scenarios which would be ambiguous this.in() Groovy programmers familiar with these contextual keywords may still wish to avoid using those names unless there is a good reason to use such a name. The restrictions on reserved keywords also apply for the primitive types, the boolean literals and the null literal (all of which are discussed later): Table 3. Other reserved words null true false boolean char byte short int long float double While not recommended, the same trick as for reserved keywords can be used: def "null"() { true } // not recommended; potentially confusing assert this.null() // must be qualified Using such words as method names is potentially confusing and is often best to avoid, however, it might be useful for certain kinds of DSLs . 3. Identifiers 3.1. Normal identifiers Identifiers start with a letter, a dollar or an underscore. They cannot start with a number. A letter can be in the following ranges: 'a' to 'z' (lowercase ascii letter) 'A' to 'Z' (uppercase ascii letter) '\u00C0' to '\u00D6' '\u00D8' to '\u00F6' '\u00F8' to '\u00FF' '\u0100' to '\uFFFE' Then following characters can contain letters and numbers. Here are a few examples of valid identifiers (here, variable names): def name def item3 def with_underscore def $dollarStart But the following ones are invalid identifiers: def 3tier def a+b def a#b All keywords are also valid identifiers when following a dot: foo.as foo.assert foo.break foo.case foo.catch 3.2. Quoted identifiers Quoted identifiers appear after the dot of a dotted expression. For instance, the name part of the person.name expression can be quoted with person."name" or person.'name' . This is particularly interesting when certain identifiers contain illegal characters that are forbidden by the Java Language Specification, but which are allowed by Groovy when quoted. For example, characters like a dash, a space, an exclamation mark, etc. def map = [:] map."an identifier with a space and double quotes" = "ALLOWED" map.'with-dash-signs-and-single-quotes' = "ALLOWED" assert map."an identifier with a space and double quotes" == "ALLOWED" assert map.'with-dash-signs-and-single-quotes' == "ALLOWED" As we shall see in the following section on strings , Groovy provides different string literals. All kind of strings are actually allowed after the dot: map.'single quote' map."double quote" map.'''triple single quote''' map."""triple double quote""" map./slashy string/ map.$/dollar slashy string/$ There’s a difference between plain character strings and Groovy’s GStrings (interpolated strings), as in that the latter case, the interpolated values are inserted in the final string for evaluating the whole identifier: def firstname = "Homer" map."Simpson-${firstname}" = "Homer Simpson" assert map.'Simpson-Homer' == "Homer Simpson" 4. Strings Text literals are represented in the form of chain of characters called strings. Groovy lets you instantiate java.lang.String objects, as well as GStrings ( groovy.lang.GString ) which are also called interpolated strings in other programming languages. 4.1. Single-quoted string Single-quoted strings are a series of characters surrounded by single quotes: 'a single-quoted string' Single-quoted strings are plain java.lang.String and don’t support interpolation. 4.2. String concatenation All the Groovy strings can be concatenated with the + operator: assert 'ab' == 'a' + 'b' 4.3. Triple-single-quoted string Triple-single-quoted strings are a series of characters surrounded by triplets of single quotes: '''a triple-single-quoted string''' Triple-single-quoted strings are plain java.lang.String and don’t support interpolation. Triple-single-quoted strings may span multiple lines. The content of the string can cross line boundaries without the need to split the string in several pieces and without concatenation or newline escape characters: def aMultilineString = '''line one line two line three''' If your code is indented, for example in the body of the method of a class, your string will contain the whitespace of the indentation. The Groovy Development Kit contains methods for stripping out the indentation with the String#stripIndent() method, and with the String#stripMargin() method that takes a delimiter character to identify the text to remove from the beginning of a string. When creating a string as follows: def startingAndEndingWithANewline = ''' line one line two line three ''' You will notice that the resulting string contains a newline character as first character. It is possible to strip that character by escaping the newline with a backslash: def strippedFirstNewline = '''\ line one line two line three ''' assert !strippedFirstNewline.startsWith('\n') 4.3.1. Escaping special characters You can escape single quotes with the backslash character to avoid terminating the string literal: 'an escaped single quote: \' needs a backslash' And you can escape the escape character itself with a double backslash: 'an escaped escape character: \\ needs a double backslash' Some special characters also use the backslash as escape character: Escape sequence Character \b backspace \f formfeed \n newline \r carriage return \s single space \t tabulation \\ backslash \' single quote within a single-quoted string (and optional for triple-single-quoted and double-quoted strings) \" double quote within a double-quoted string (and optional for triple-double-quoted and single-quoted strings) We’ll see some more escaping details when it comes to other types of strings discussed later. 4.3.2. Unicode escape sequence For characters that are not present on your keyboard, you can use unicode escape sequences: a backslash, followed by 'u', then 4 hexadecimal digits. For example, the Euro currency symbol can be represented with: 'The Euro currency symbol: \u20AC' 4.4. Double-quoted string Double-quoted strings are a series of characters surrounded by double quotes: "a double-quoted string" Double-quoted strings are plain java.lang.String if there’s no interpolated expression, but are groovy.lang.GString instances if interpolation is present. To escape a double quote, you can use the backslash character: "A double quote: \"". 4.4.1. String interpolation Any Groovy expression can be interpolated in all string literals, apart from single and triple-single-quoted strings. Interpolation is the act of replacing a placeholder in the string with its value upon evaluation of the string. The placeholder expressions are surrounded by ${} . The curly braces may be omitted for unambiguous dotted expressions, i.e. we can use just a $ prefix in those cases. If the GString is ever passed to a method taking a String, the expression value inside the placeholder is evaluated to its string representation (by calling toString() on that expression) and the resulting String is passed to the method. Here, we have a string with a placeholder referencing a local variable: def name = 'Guillaume' // a plain string def greeting = "Hello ${name}" assert greeting.toString() == 'Hello Guillaume' Any Groovy expression is valid, as we can see in this example with an arithmetic expression: def sum = "The sum of 2 and 3 equals ${2 + 3}" assert sum.toString() == 'The sum of 2 and 3 equals 5' Not only are expressions allowed in between the ${} placeholder, but so are statements. However, a statement’s value is just null . So if several statements are inserted in that placeholder, the last one should somehow return a meaningful value to be inserted. For instance, "The sum of 1 and 2 is equal to ${def a = 1; def b = 2; a + b}" is supported and works as expected but a good practice is usually to stick to simple expressions inside GString placeholders. In addition to ${} placeholders, we can also use a lone $ sign prefixing a dotted expression: def person = [name: 'Guillaume', age: 36] assert "$person.name is $person.age years old" == 'Guillaume is 36 years old' But only dotted expressions of the form a.b , a.b.c , etc, are valid. Expressions containing parentheses like method calls, curly braces for closures, dots which aren’t part of a property expression or arithmetic operators would be invalid. Given the following variable definition of a number: def number = 3.14 The following statement will throw a groovy.lang.MissingPropertyException because Groovy believes you’re trying to access the toString property of that number, which doesn’t exist: shouldFail(MissingPropertyException) { println "$number.toString()" } You can think of "$number.toString()" as being interpreted by the parser as "${number.toString}()" . Similarly, if the expression is ambiguous, you need to keep the curly braces: String thing = 'treasure' assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by $thing.x" // <= Not allowed: ambiguous!! assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by ${thing}.x" // <= Curly braces required If you need to escape the $ or ${} placeholders in a GString so they appear as is without interpolation, you just need to use a \ backslash character to escape the dollar sign: assert '$5' == "\$5" assert '${name}' == "\${name}" 4.4.2. Special case of interpolating closure expressions So far, we’ve seen we could interpolate arbitrary expressions inside the ${} placeholder, but there is a special case and notation for closure expressions. When the placeholder contains an arrow, ${→} , the expression is actually a closure expression — you can think of it as a closure with a dollar prepended in front of it: def sParameterLessClosure = "1 + 2 == ${-> 3}" (1) assert sParameterLessClosure == '1 + 2 == 3' def sOneParamClosure = "1 + 2 == ${ w -> w << 3}" (2) assert sOneParamClosure == '1 + 2 == 3' 1 The closure is a parameterless closure which doesn’t take arguments. 2 Here, the closure takes a single java.io.StringWriter argument, to which you can append content with the << leftShift operator. In either case, both placeholders are embedded closures. In appearance, it looks like a more verbose way of defining expressions to be interpolated, but closures have an interesting advantage over mere expressions: lazy evaluation. Let’s consider the following sample: def number = 1 (1) def eagerGString = "value == ${number}" def lazyGString = "value == ${ -> number }" assert eagerGString == "value == 1" (2) assert lazyGString == "value == 1" (3) number = 2 (4) assert eagerGString == "value == 1" (5) assert lazyGString == "value == 2" (6) 1 We define a number variable containing 1 that we then interpolate within two GStrings, as an expression in eagerGString and as a closure in lazyGString . 2 We expect the resulting string to contain the same string value of 1 for eagerGString . 3 Similarly for lazyGString 4 Then we change the value of the variable to a new number 5 With a plain interpolated expression, the value was actually bound at the time of creation of the GString. 6 But with a closure expression, the closure is called upon each coercion of the GString into String, resulting in an updated string containing the new number value. An embedded closure expression taking more than one parameter will generate an exception at runtime. Only closures with zero or one parameter are allowed. 4.4.3. Interoperability with Java When a method (whether implemented in Java or Groovy) expects a java.lang.String , but we pass a groovy.lang.GString instance, the toString() method of the GString is automatically and transparently called. String takeString(String message) { (4) assert message instanceof String (5) return message } def message = "The message is ${'hello'}" (1) assert message instanceof GString (2) def result = takeString(message) (3) assert result instanceof String assert result == 'The message is hello' 1 We create a GString variable 2 We double-check it’s an instance of the GString 3 We then pass that GString to a method taking a String as parameter 4 The signature of the takeString() method explicitly says its sole parameter is a String 5 We also verify that the parameter is indeed a String and not a GString. 4.4.4. GString and String hashCodes Although interpolated strings can be used in lieu of plain Java strings, they differ with strings in a particular way: their hashCodes are different. Plain Java strings are immutable, whereas the resulting String representation of a GString can vary, depending on its interpolated values. Even for the same resulting string, GStrings and Strings don’t have the same hashCode. assert "one: ${1}".hashCode() != "one: 1".hashCode() GString and Strings having different hashCode values, using GString as Map keys should be avoided, especially if we try to retrieve an associated value with a String instead of a GString. def key = "a" def m = ["${key}": "letter ${key}"] (1) assert m["a"] == null (2) 1 The map is created with an initial pair whose key is a GString 2 When we try to fetch the value with a String key, we will not find it, as Strings and GString have different hashCode values 4.5. Triple-double-quoted string Triple-double-quoted strings behave like double-quoted strings, with the addition that they are multiline, like the triple-single-quoted strings. def name = 'Groovy' def template = """ Dear Mr ${name}, You're the winner of the lottery! Yours sincerly, Dave """ assert template.toString().contains('Groovy') Neither double quotes nor single quotes need be escaped in triple-double-quoted strings. 4.6. Slashy string Beyond the usual quoted strings, Groovy offers slashy strings, which use / as the opening and closing delimiter. Slashy strings are particularly useful for defining regular expressions and patterns, as there is no need to escape backslashes. Example of a slashy string: def fooPattern = /.*foo.*/ assert fooPattern == '.*foo.*' Only forward slashes need to be escaped with a backslash: def escapeSlash = /The character \/ is a forward slash/ assert escapeSlash == 'The character / is a forward slash' Slashy strings are multiline: def multilineSlashy = /one two three/ assert multilineSlashy.contains('\n') Slashy strings can be thought of as just another way to define a GString but with different escaping rules. They hence support interpolation: def color = 'blue' def interpolatedSlashy = /a ${color} car/ assert interpolatedSlashy == 'a blue car' 4.6.1. Special cases An empty slashy string cannot be represented with a double forward slash, as it’s understood by the Groovy parser as a line comment. That’s why the following assert would actually not compile as it would look like a non-terminated statement: assert '' == // As slashy strings were mostly designed to make regexp easier so a few things that are errors in GStrings like $() or $5 will work with slashy strings. Remember that escaping backslashes is not required. An alternative way of thinking of this is that in fact escaping is not supported. The slashy string /\t/ won’t contain a tab but instead a backslash followed by the character 't'. Escaping is only allowed for the slash character, i.e. /\/folder/ will be a slashy string containing '/folder' . A consequence of slash escaping is that a slashy string can’t end with a backslash. Otherwise that will escape the slashy string terminator. You can instead use a special trick, /ends with slash ${'\\'}/ . But best just avoid using a slashy string in such a case. 4.7. Dollar slashy string Dollar slashy strings are multiline GStrings delimited with an opening $/ and a closing /$ . The escaping character is the dollar sign, and it can escape another dollar, or a forward slash. Escaping for the dollar and forward slash characters is only needed where conflicts arise with the special use of those characters. The characters $foo would normally indicate a GString placeholder, so those four characters can be entered into a dollar slashy string by escaping the dollar, i.e. $$foo . Similarly, you will need to escape a dollar slashy closing delimiter if you want it to appear in your string. Here are a few examples: def name = "Guillaume" def date = "April, 1st" def dollarSlashy = $/ Hello $name, today we're ${date}. $ dollar sign $$ escaped dollar sign \ backslash / forward slash $/ escaped forward slash $$$/ escaped opening dollar slashy $/$$ escaped closing dollar slashy /$ assert [ 'Guillaume', 'April, 1st', '$ dollar sign', '$ escaped dollar sign', '\\ backslash', '/ forward slash', '/ escaped forward slash', '$/ escaped opening dollar slashy', '/$ escaped closing dollar slashy' ].every { dollarSlashy.contains(it) } It was created to overcome some of the limitations of the slashy string escaping rules. Use it when its escaping rules suit your string contents (typically if it has some slashes you don’t want to escape). 4.8. String summary table String name String syntax Interpolated Multiline Escape character Single-quoted '…​' \ Triple-single-quoted '''…​''' \ Double-quoted "…​" \ Triple-double-quoted """…​""" \ Slashy /…​/ \ Dollar slashy $/…​/$ $ 4.9. Characters Unlike Java, Groovy doesn’t have an explicit character literal. However, you can be explicit about making a Groovy string an actual character, by three different means: char c1 = 'A' (1) assert c1 instanceof Character def c2 = 'B' as char (2) assert c2 instanceof Character def c3 = (char)'C' (3) assert c3 instanceof Character 1 by being explicit when declaring a variable holding the character by specifying the char type 2 by using type coercion with the as operator 3 by using a cast to char operation The first option 1 is interesting when the character is held in a variable, while the other two ( 2 and 3 ) are more interesting when a char value must be passed as argument of a method call. 5. Numbers Groovy supports different kinds of integral literals and decimal literals, backed by the usual Number types of Java. 5.1. Integral literals The integral literal types are the same as in Java: byte char short int long java.math.BigInteger You can create integral numbers of those types with the following declarations: // primitive types byte b = 1 char c = 2 short s = 3 int i = 4 long l = 5 // infinite precision BigInteger bi = 6 If you use optional typing by using the def keyword, the type of the integral number will vary: it’ll adapt to the capacity of the type that can hold that number. For positive numbers: def a = 1 assert a instanceof Integer // Integer.MAX_VALUE def b = 2147483647 assert b instanceof Integer // Integer.MAX_VALUE + 1 def c = 2147483648 assert c instanceof Long // Long.MAX_VALUE def d = 9223372036854775807 assert d instanceof Long // Long.MAX_VALUE + 1 def e = 9223372036854775808 assert e instanceof BigInteger As well as for negative numbers: def na = -1 assert na instanceof Integer // Integer.MIN_VALUE def nb = -2147483648 assert nb instanceof Integer // Integer.MIN_VALUE - 1 def nc = -2147483649 assert nc instanceof Long // Long.MIN_VALUE def nd = -9223372036854775808 assert nd instanceof Long // Long.MIN_VALUE - 1 def ne = -9223372036854775809 assert ne instanceof BigInteger 5.1.1. Alternative non-base 10 representations Numbers can also be represented in binary, octal, hexadecimal and decimal bases. Binary literal Binary numbers start with a 0b prefix: int xInt = 0b10101111 assert xInt == 175 short xShort = 0b11001001 assert xShort == 201 as short byte xByte = 0b11 assert xByte == 3 as byte long xLong = 0b101101101101 assert xLong == 2925l BigInteger xBigInteger = 0b111100100001 assert xBigInteger == 3873g int xNegativeInt = -0b10101111 assert xNegativeInt == -175 Octal literal Octal numbers are specified in the typical format of 0 followed by octal digits. int xInt = 077 assert xInt == 63 short xShort = 011 assert xShort == 9 as short byte xByte = 032 assert xByte == 26 as byte long xLong = 0246 assert xLong == 166l BigInteger xBigInteger = 01111 assert xBigInteger == 585g int xNegativeInt = -077 assert xNegativeInt == -63 Hexadecimal literal Hexadecimal numbers are specified in the typical format of 0x followed by hex digits. int xInt = 0x77 assert xInt == 119 short xShort = 0xaa assert xShort == 170 as short byte xByte = 0x3a assert xByte == 58 as byte long xLong = 0xffff assert xLong == 65535l BigInteger xBigInteger = 0xaaaa assert xBigInteger == 43690g Double xDouble = new Double('0x1.0p0') assert xDouble == 1.0d int xNegativeInt = -0x77 assert xNegativeInt == -119 5.2. Decimal literals The decimal literal types are the same as in Java: float double java.math.BigDecimal You can create decimal numbers of those types with the following declarations: // primitive types float f = 1.234 double d = 2.345 // infinite precision BigDecimal bd = 3.456 Decimals can use exponents, with the e or E exponent letter, followed by an optional sign, and an integral number representing the exponent: assert 1e3 == 1_000.0 assert 2E4 == 20_000.0 assert 3e+1 == 30.0 assert 4E-2 == 0.04 assert 5e-1 == 0.5 Conveniently for exact decimal number calculations, Groovy chooses java.math.BigDecimal as its decimal number type. In addition, both float and double are supported, but require an explicit type declaration, type coercion or suffix. Even if BigDecimal is the default for decimal numbers, such literals are accepted in methods or closures taking float or double as parameter types. Decimal numbers can’t be represented using a binary, octal or hexadecimal representation. 5.3. Underscore in literals When writing long literal numbers, it’s harder on the eye to figure out how some numbers are grouped together, for example with groups of thousands, of words, etc. By allowing you to place underscore in number literals, it’s easier to spot those groups: long creditCardNumber = 1234_5678_9012_3456L long socialSecurityNumbers = 999_99_9999L double monetaryAmount = 12_345_132.12 long hexBytes = 0xFF_EC_DE_5E long hexWords = 0xFFEC_DE5E long maxLong = 0x7fff_ffff_ffff_ffffL long alsoMaxLong = 9_223_372_036_854_775_807L long bytes = 0b11010010_01101001_10010100_10010010 5.4. Number type suffixes We can force a number (including binary, octals and hexadecimals) to have a specific type by giving a suffix (see table below), either uppercase or lowercase. Type Suffix BigInteger G or g Long L or l Integer I or i BigDecimal G or g Double D or d Float F or f Examples: assert 42I == Integer.valueOf('42') assert 42i == Integer.valueOf('42') // lowercase i more readable assert 123L == Long.valueOf("123") // uppercase L more readable assert 2147483648 == Long.valueOf('2147483648') // Long type used, value too large for an Integer assert 456G == new BigInteger('456') assert 456g == new BigInteger('456') assert 123.45 == new BigDecimal('123.45') // default BigDecimal type used assert .321 == new BigDecimal('.321') assert 1.200065D == Double.valueOf('1.200065') assert 1.234F == Float.valueOf('1.234') assert 1.23E23D == Double.valueOf('1.23E23') assert 0b1111L.class == Long // binary assert 0xFFi.class == Integer // hexadecimal assert 034G.class == BigInteger // octal 5.5. Math operations Although operators are covered in more detail elsewhere, it’s important to discuss the behavior of math operations and what their resulting types are. Division and power binary operations aside (covered below), binary operations between byte , char , short and int result in int binary operations involving long with byte , char , short and int result in long binary operations involving BigInteger and any other integral type result in BigInteger binary operations involving BigDecimal with byte , char , short , int and BigInteger result in BigDecimal binary operations between float , double and BigDecimal result in double binary operations between two BigDecimal result in BigDecimal The following table summarizes those rules: byte char short int long BigInteger float double BigDecimal byte int int int int long BigInteger double double BigDecimal char int int int long BigInteger double double BigDecimal short int int long BigInteger double double BigDecimal int int long BigInteger double double BigDecimal long long BigInteger double double BigDecimal BigInteger BigInteger double double BigDecimal float double double double double double double BigDecimal BigDecimal Thanks to Groovy’s operator overloading, the usual arithmetic operators work as well with BigInteger and BigDecimal , unlike in Java where you have to use explicit methods for operating on those numbers. 5.5.1. The case of the division operator The division operators / (and /= for division and assignment) produce a double result if either operand is a float or double , and a BigDecimal result otherwise (when both operands are any combination of an integral type short , char , byte , int , long , BigInteger or BigDecimal ). BigDecimal division is performed with the divide() method if the division is exact (i.e. yielding a result that can be represented within the bounds of the same precision and scale), or using a MathContext with a precision of the maximum of the two operands' precision plus an extra precision of 10, and a scale of the maximum of 10 and the maximum of the operands' scale. For integer division like in Java, you should use the intdiv() method, as Groovy doesn’t provide a dedicated integer division operator symbol. 5.5.2. The case of the power operator The power operation is represented by the ** operator, with two parameters: the base and the exponent. The result of the power operation depends on its operands, and the result of the operation (in particular if the result can be represented as an integral value). The following rules are used by Groovy’s power operation to determine the resulting type: If the exponent is a decimal value if the result can be represented as an Integer , then return an Integer else if the result can be represented as a Long , then return a Long otherwise return a Double If the exponent is an integral value if the exponent is strictly negative, then return an Integer , Long or Double if the result value fits in that type if the exponent is positive or zero if the base is a BigDecimal , then return a BigDecimal result value if the base is a BigInteger , then return a BigInteger result value if the base is an Integer , then return an Integer if the result value fits in it, otherwise a BigInteger if the base is a Long , then return a Long if the result value fits in it, otherwise a BigInteger We can illustrate those rules with a few examples: // base and exponent are ints and the result can be represented by an Integer assert 2 ** 3 instanceof Integer // 8 assert 10 ** 9 instanceof Integer // 1_000_000_000 // the base is a long, so fit the result in a Long // (although it could have fit in an Integer) assert 5L ** 2 instanceof Long // 25 // the result can't be represented as an Integer or Long, so return a BigInteger assert 100 ** 10 instanceof BigInteger // 10e20 assert 1234 ** 123 instanceof BigInteger // 170515806212727042875... // the base is a BigDecimal and the exponent a negative int // but the result can be represented as an Integer assert 0.5 ** -2 instanceof Integer // 4 // the base is an int, and the exponent a negative float // but again, the result can be represented as an Integer assert 1 ** -0.3f instanceof Integer // 1 // the base is an int, and the exponent a negative int // but the result will be calculated as a Double // (both base and exponent are actually converted to doubles) assert 10 ** -1 instanceof Double // 0.1 // the base is a BigDecimal, and the exponent is an int, so return a BigDecimal assert 1.2 ** 10 instanceof BigDecimal // 6.1917364224 // the base is a float or double, and the exponent is an int // but the result can only be represented as a Double value assert 3.4f ** 5 instanceof Double // 454.35430372146965 assert 5.6d ** 2 instanceof Double // 31.359999999999996 // the exponent is a decimal value // and the result can only be represented as a Double value assert 7.8 ** 1.9 instanceof Double // 49.542708423868476 assert 2 ** 0.1f instanceof Double // 1.0717734636432956 6. Booleans Boolean is a special data type that is used to represent truth values: true and false . Use this data type for simple flags that track true/false conditions . Boolean values can be stored in variables, assigned into fields, just like any other data type: def myBooleanVariable = true boolean untypedBooleanVar = false booleanField = true true and false are the only two primitive boolean values. But more complex boolean expressions can be represented using logical operators . In addition, Groovy has special rules (often referred to as Groovy Truth ) for coercing non-boolean objects to a boolean value. 7. Lists Groovy uses a comma-separated list of values, surrounded by square brackets, to denote lists. Groovy lists are plain JDK java.util.List , as Groovy doesn’t define its own collection classes. The concrete list implementation used when defining list literals are java.util.ArrayList by default, unless you decide to specify otherwise, as we shall see later on. def numbers = [1, 2, 3] (1) assert numbers instanceof List (2) assert numbers.size() == 3 (3) 1 We define a list numbers delimited by commas and surrounded by square brackets, and we assign that list into a variable 2 The list is an instance of Java’s java.util.List interface 3 The size of the list can be queried with the size() method, and shows our list contains 3 elements In the above example, we used a homogeneous list, but you can also create lists containing values of heterogeneous types: def heterogeneous = [1, "a", true] (1) 1 Our list here contains a number, a string and a boolean value We mentioned that by default, list literals are actually instances of java.util.ArrayList , but it is possible to use a different backing type for our lists, thanks to using type coercion with the as operator, or with explicit type declaration for your variables: def arrayList = [1, 2, 3] assert arrayList instanceof java.util.ArrayList def linkedList = [2, 3, 4] as LinkedList (1) assert linkedList instanceof java.util.LinkedList LinkedList otherLinked = [3, 4, 5] (2) assert otherLinked instanceof java.util.LinkedList 1 We use coercion with the as operator to explicitly request a java.util.LinkedList implementation 2 We can say that the variable holding the list literal is of type java.util.LinkedList You can access elements of the list with the [] subscript operator (both for reading and setting values) with positive indices or negative indices to access elements from the end of the list, as well as with ranges, and use the << leftShift operator to append elements to a list: def letters = ['a', 'b', 'c', 'd'] assert letters[0] == 'a' (1) assert letters[1] == 'b' assert letters[-1] == 'd' (2) assert letters[-2] == 'c' letters[2] = 'C' (3) assert letters[2] == 'C' letters << 'e' (4) assert letters[ 4] == 'e' assert letters[-1] == 'e' assert letters[1, 3] == ['b', 'd'] (5) assert letters[2..4] == ['C', 'd', 'e'] (6) 1 Access the first element of the list (zero-based counting) 2 Access the last element of the list with a negative index: -1 is the first element from the end of the list 3 Use an assignment to set a new value for the third element of the list 4 Use the << leftShift operator to append an element at the end of the list 5 Access two elements at once, returning a new list containing those two elements 6 Use a range to access a range of values from the list, from a start to an end element position As lists can be heterogeneous in nature, lists can also contain other lists to create multidimensional lists: def multi = [[0, 1], [2, 3]] (1) assert multi[1][0] == 2 (2) 1 Define a list of numbers 2 Access the second element of the top-most list, and the first element of the inner list 8. Arrays Groovy reuses the list notation for arrays, but to make such literals arrays, you need to explicitly define the type of the array through coercion or type declaration. String[] arrStr = ['Ananas', 'Banana', 'Kiwi'] (1) assert arrStr instanceof String[] (2) assert !(arrStr instanceof List) def numArr = [1, 2, 3] as int[] (3) assert numArr instanceof int[] (4) assert numArr.size() == 3 1 Define an array of strings using explicit variable type declaration 2 Assert that we created an array of strings 3 Create an array of ints with the as operator 4 Assert that we created an array of primitive ints You can also create multi-dimensional arrays: def matrix3 = new Integer[3][3] (1) assert matrix3.size() == 3 Integer[][] matrix2 (2) matrix2 = [[1, 2], [3, 4]] assert matrix2 instanceof Integer[][] 1 You can define the bounds of a new array 2 Or declare an array without specifying its bounds Access to elements of an array follows the same notation as for lists: String[] names = ['Cédric', 'Guillaume', 'Jochen', 'Paul'] assert names[0] == 'Cédric' (1) names[2] = 'Blackdrag' (2) assert names[2] == 'Blackdrag' 1 Retrieve the first element of the array 2 Set the value of the third element of the array to a new value 8.1. Java-style array initialization Groovy has always supported literal list/array definitions using square brackets and has avoided Java-style curly braces so as not to conflict with closure definitions. In the case where the curly braces come immediately after an array type declaration however, there is no ambiguity with closure definitions, so Groovy 3 and above support that variant of the Java array initialization expression. Examples: def primes = new int[] {2, 3, 5, 7, 11} assert primes.size() == 5 && primes.sum() == 28 assert primes.class.name == '[I' def pets = new String[] {'cat', 'dog'} assert pets.size() == 2 && pets.sum() == 'catdog' assert pets.class.name == '[Ljava.lang.String;' // traditional Groovy alternative still supported String[] groovyBooks = [ 'Groovy in Action', 'Making Java Groovy' ] assert groovyBooks.every{ it.contains('Groovy') } 9. Maps Sometimes called dictionaries or associative arrays in other languages, Groovy features maps. Maps associate keys to values, separating keys and values with colons, and each key/value pairs with commas, and the whole keys and values surrounded by square brackets. def colors = [red: '#FF0000', green: '#00FF00', blue: '#0000FF'] (1) assert colors['red'] == '#FF0000' (2) assert colors.green == '#00FF00' (3) colors['pink'] = '#FF00FF' (4) colors.yellow = '#FFFF00' (5) assert colors.pink == '#FF00FF' assert colors['yellow'] == '#FFFF00' assert colors instanceof java.util.LinkedHashMap 1 We define a map of string color names, associated with their hexadecimal-coded html colors 2 We use the subscript notation to check the content associated with the red key 3 We can also use the property notation to assert the color green’s hexadecimal representation 4 Similarly, we can use the subscript notation to add a new key/value pair 5 Or the property notation, to add the yellow color When using names for the keys, we actually define string keys in the map. Groovy creates maps that are actually instances of java.util.LinkedHashMap . If you try to access a key which is not present in the map: assert colors.unknown == null def emptyMap = [:] assert emptyMap.anyKey == null You will retrieve a null result. In the examples above, we used string keys, but you can also use values of other types as keys: def numbers = [1: 'one', 2: 'two'] assert numbers[1] == 'one' Here, we used numbers as keys, as numbers can unambiguously be recognized as numbers, so Groovy will not create a string key like in our previous examples. But consider the case you want to pass a variable in lieu of the key, to have the value of that variable become the key: def key = 'name' def person = [key: 'Guillaume'] (1) assert !person.containsKey('name') (2) assert person.containsKey('key') (3) 1 The key associated with the 'Guillaume' name will actually be the "key" string, not the value associated with the key variable 2 The map doesn’t contain the 'name' key 3 Instead, the map contains a 'key' key You can also pass quoted strings as well as keys: ["name": "Guillaume"]. This is mandatory if your key string isn’t a valid identifier, for example if you wanted to create a string key containing a dash like in: ["street-name": "Main street"]. When you need to pass variable values as keys in your map definitions, you must surround the variable or expression with parentheses: person = [(key): 'Guillaume'] (1) assert person.containsKey('name') (2) assert !person.containsKey('key') (3) 1 This time, we surround the key variable with parentheses, to instruct the parser we are passing a variable rather than defining a string key 2 The map does contain the name key 3 But the map doesn’t contain the key key as before Groovy Learn Documentation Download Support Contribute Ecosystem Blog posts About Source code Security Books Thanks Sponsorship FAQ Search Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community The Groovy programming language is supported by the Apache Software Foundation and the Groovy community. Apache, Apache Groovy, Groovy, and the ASF logo are either registered trademarks or trademarks of The Apache Software Foundation. © 2003-2025 the Apache Groovy project — Groovy is Open Source: license , privacy policy .
2026-01-13T09:29:32
https://www.ecns.cn/hd/2026-01-06/detail-iheyrzrv3835119.shtml
Maduro pleads not guilty in N.Y. court --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo Maduro pleads not guilty in N.Y. court ( 1 /3) 2026-01-06 11:27:54 Ecns.cn Editor :Zhao Li An armored escort vehicle leaves the U.S. District Court for the Southern District of New York, Jan. 5, local time. (Photo: China News Service/Liao Pan) Venezuelan President Nicolas Maduro, who has been forcibly seized by U.S. , pleaded not guilty on Monday in his first New York court appearance. An armored escort vehicle leaves the U.S. District Court for the Southern District of New York, Jan. 5, local time. (Photo: China News Service/Liao Pan) Venezuelan President Nicolas Maduro, who has been forcibly seized by U.S. , pleaded not guilty on Monday in his first New York court appearance. An armored escort vehicle leaves the U.S. District Court for the Southern District of New York, Jan. 5, local time. (Photo: China News Service/Liao Pan) Venezuelan President Nicolas Maduro, who has been forcibly seized by U.S. , pleaded not guilty on Monday in his first New York court appearance. Previous Venezuelan President Nicolas Maduro, who has been forcibly seized by U.S. , pleaded not guilty on Monday in his first New York court appearance.--> Venezuelan President Nicolas Maduro, who has been forcibly seized by U.S. , pleaded not guilty on Monday in his first New York court appearance.--> Venezuelan President Nicolas Maduro, who has been forcibly seized by U.S. , pleaded not guilty on Monday in his first New York court appearance.--> Next (1) (2) (3) LINE More Photo Maduro pleads not guilty in N.Y. court UN Security Council holds emergency meeting on Venezuela Harbin opens its 42nd Ice and Snow Festival China's Yangtze River remains world's busiest inland waterway by cargo throughput Protest held in New York against U.S. military strikes on Venezuela Venezuelan President Nicolás Maduro transported to Brooklyn detention center ${visuals_2} ${visuals_3} More Video Insights丨Portuguese economist sees stability and opportunity in China’s long-term planning (W.E. Talk) Experts on 2026: China's 15th Five-Year Plan significant for the World (W.E. Talk) Experts look to 2026: Seizing opportunities amid crises, forging ahead after breakthroughs The Awkward Chronicles of Uncle Sam: Claimed Glory, Met Chaos The Dunhuang Flying Dancers in the 1,360°C kiln fire The Awkward Chronicles of Uncle Sam: Tariff Bullying and Backfire ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://docs.aws.amazon.com/it_it/cost-management/latest/userguide/ce-enable.html
Abilitazione di Cost Explorer - AWS Gestione dei costi Abilitazione di Cost Explorer - AWS Gestione dei costi Documentazione AWS Billing and Cost Management Guida per l’utente Le traduzioni sono generate tramite traduzione automatica. In caso di conflitto tra il contenuto di una traduzione e la versione originale in Inglese, quest'ultima prevarrà. Abilitazione di Cost Explorer Puoi abilitare Cost Explorer per il tuo account aprendo Cost Explorer per la prima volta nella console AWS Cost Management. Non è possibile abilitare Cost Explorer utilizzando l'API. Dopo aver abilitato Cost Explorer, AWS prepara i dati sui costi per il mese corrente e i 13 mesi precedenti, quindi calcola la previsione per i 12 mesi successivi. I dati per il mese corrente sono visualizzabili dopo circa 24 ore, Per gli altri dati occorre qualche giorno in più. Cost Explorer aggiorna i dati sui costi almeno una volta ogni 24 ore. Come parte del processo di attivazione di Cost Explorer, configura AWS automaticamente Cost Anomaly Detection per il tuo account. Cost Anomaly Detection è una funzionalità di gestione AWS dei costi. Questa funzionalità utilizza modelli di apprendimento automatico per rilevare e avvisare in caso di modelli di spesa anomali utilizzati. Servizi AWS Per iniziare a usare Cost Anomaly Detection, AWS configura un Servizi AWS monitor e un abbonamento giornaliero per gli avvisi di riepilogo. Riceverai un avviso in caso di spesa anomala che supera i 100 USD e il 40% della spesa prevista per la maggior parte dei tuoi account. Servizi AWS Per ulteriori informazioni, consulta Limitazioni e Rilevamento di spese insolite con Cost Anomaly Detection . AWS Nota Puoi disattivare il rilevamento delle anomalie dei costi in qualsiasi momento. Per ulteriori informazioni, consulta Disattivazione del rilevamento delle anomalie nei costi . Puoi avviare Cost Explorer se il tuo account è un account membro di un'organizzazione in cui l'account di gestione ha abilitato Cost Explorer. Tieni presente che l'account di gestione della tua organizzazione può anche negare l'accesso al tuo account. Per ulteriori informazioni, consulta Fatturazione consolidata per AWS Organizations . Nota Lo stato di un account all'interno di un'organizzazione determina quali dati su costi e utilizzo sono visibili: Un account indipendente entra a far parte di un'organizzazione. Dopodiché, l'account non potrà più accedere ai dati sui costi e sull'utilizzo di quando era un account autonomo. Un account membro lascia un'organizzazione per diventare un account autonomo. Dopodiché, l'account non potrà più accedere ai dati sui costi e sull'utilizzo di quando l'account era membro dell'organizzazione. L'account può accedere solo ai dati generati come account autonomo. Un account membro lascia l'organizzazione A per entrare a far parte dell'organizzazione B. Successivamente, l'account non può più accedere ai dati sui costi e sull'utilizzo di quando l'account era membro dell'organizzazione A. L'account può accedere solo ai dati generati come membro dell'organizzazione B. Un account si ricongiunge a un'organizzazione a cui l'account apparteneva in precedenza. Dopodiché, l'account riottiene l'accesso ai dati storici sui costi e sull'utilizzo. La registrazione per ricevere i report sui AWS costi e sull'utilizzo o il rapporto di fatturazione dettagliato non abilita automaticamente Cost Explorer. A tale scopo, segui questa procedura. Come registrarsi per Cost Explorer Apri la console di Fatturazione e Gestione dei costi all'indirizzo https://console.aws.amazon.com/costmanagement/ . Nel pannello di navigazione, scegliere Cost Explorer . Nella pagina Benvenuto in Cost Explorer , scegliere Avvia Cost Explorer . Per ulteriori informazioni sul controllo dell'accesso a Cost Explorer, consultare Controllo dell'accesso a Cost Explorer . JavaScript è disabilitato o non è disponibile nel tuo browser. Per usare la documentazione AWS, JavaScript deve essere abilitato. Consulta le pagine della guida del browser per le istruzioni. Convenzioni dei documenti Analisi dei costi e dell'utilizzo con AWS Cost Explorer Controllo dell'accesso a Cost Explorer Questa pagina ti è stata utile? - Sì Grazie per averci comunicato che stiamo facendo un buon lavoro! Se hai un momento, ti invitiamo a dirci che cosa abbiamo fatto che ti è piaciuto così possiamo offrirti altri contenuti simili. Questa pagina ti è stata utile? - No Grazie per averci comunicato che questa pagina ha bisogno di essere modificata. Siamo spiacenti di non aver soddisfatto le tue esigenze. Se hai un momento, ti invitiamo a dirci come possiamo migliorare la documentazione.
2026-01-13T09:29:32
https://www.ecns.cn/hd/2026-01-05/detail-iheymvap1614288.shtml
Protest held in New York against U.S. military strikes on Venezuela --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo Protest held in New York against U.S. military strikes on Venezuela ( 1 /3) 2026-01-05 14:34:02 Ecns.cn Editor :Gong Weiwei Demonstrators gather outside the Metropolitan Detention Center in New York on Jan. 4, 2026, where Venezuelan President Nicolás Maduro is being held, to protest U.S. military action against Venezuela. (Photo: China News Service/Liao Pan) Demonstrators gather outside the Metropolitan Detention Center in New York on Jan. 4, 2026, where Venezuelan President Nicolás Maduro is being held, to protest U.S. military action against Venezuela. (Photo: China News Service/Liao Pan) Demonstrators gather outside the Metropolitan Detention Center in New York on Jan. 4, 2026, where Venezuelan President Nicolás Maduro is being held, to protest U.S. military action against Venezuela. (Photo: China News Service/Liao Pan) Previous Next (1) (2) (3) LINE More Photo Venezuelan President Nicolás Maduro transported to Brooklyn detention center In Numbers: China sees 595 million inter-regional trips during New Year holiday In Numbers: China's railway mileage tops 165,000 km International ice sculpture competition heats up in Harbin Mourners pay tribute to Crans-Montana bar fire victims Venezuelan leader Maduro brought to New York ${visuals_2} ${visuals_3} More Video (W.E. Talk) Experts on 2026: China's 15th Five-Year Plan significant for the World (W.E. Talk) Experts look to 2026: Seizing opportunities amid crises, forging ahead after breakthroughs The Awkward Chronicles of Uncle Sam: Claimed Glory, Met Chaos The Dunhuang Flying Dancers in the 1,360°C kiln fire The Awkward Chronicles of Uncle Sam: Tariff Bullying and Backfire (W.E. Talk) Experts' review on 2025: China serves as a stabilizing force in a world of turmoil and chaos ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://www.chinadaily.com.cn/a/202601/06/WS695c8373a310d6866eb323e3.html
China releases Year of the Horse stamps amid collector enthusiasm - Chinadaily.com.cn Search HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL WATCHTHIS SPORTS OPINION REGIONAL FORUM NEWSPAPER MOBILE Home Culture Events and Festivals Home / Culture / Events and Festivals China releases Year of the Horse stamps amid collector enthusiasm Xinhua | Updated: 2026-01-06 11:37 Share Share - WeChat --> CLOSE China Post officially released a set of special stamps on Monday in celebration of the upcoming the Year of the Horse.In Chinese culture, the horse is a potent symbol of vitality, strength, and success.[Photo/Xinhua] China Post officially released a set of special stamps on Monday in celebration of the upcoming the Year of the Horse, sparking a frenzy among collectors. Despite the winter chill, long queues began forming at post offices across Beijing as early as Sunday afternoon. By 8 am on Monday, when sales officially began, eager collectors -- ranging from seasoned stamp fans to younger enthusiasts bundled up in thick coats -- were already lined up along the sidewalks. The Year of the Horse will begin on Feb 17, 2026, according to the Chinese lunar calendar. This year's celebrations carry added cultural weight following the successful inscription of the Spring Festival, social practices of the Chinese people in celebration of the traditional new year, on the UNESCO Representative List of the Intangible Cultural Heritage of Humanity in 2024, a milestone that has heightened public interest in traditional customs. The collection features two stamps with a total face value of 2.40 yuan (about 34 US cents). The first depicts a red horse treading on clouds, symbolizing steady economic and social development and reflecting the nation's aspirations toward the future objectives of the 15th Five-Year Plan (2026-2030). The second has three horses running together among good-luck patterns, representing the unity and joint efforts of all Chinese people as they work toward building a modern socialist country and advance national rejuvenation on all fronts. In Chinese culture, the horse is a potent symbol of vitality, strength, and success. Often associated with the idiom "Ma Dao Cheng Gong" -- meaning "instant success upon the arrival of the horse" -- the animal represents an unyielding spirit and rapid progress. Horses have long been treasured for their role in transportation and prosperity, and they're still a favorite zodiac sign today, viewed as a harbinger of energy and progress in the new year.   --> 1 2 3 4 5 6 Next    >>| --> 1/6 Next Photo Tracking Chinese cultural frontline in 2025 Data drives digital border security WWII commemorations a powerful rejoinder to rising right China, Ireland eye greater pragmatic cooperation Peng Liyuan chats over tea with wife of ROK president Venezuelan journalist calls US invasion 'colonialism' --> Related Stories Stamp honors Taiwan's restoration day The sands of time hold the future Cinema breathes life into Shanxi's timeless heritage A symphony of past and future Series of stamps launched to commemorate V-Day --> Top BACK TO THE TOP English 中文 HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment FOLLOW US Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. -->
2026-01-13T09:29:32
https://www.chinadaily.com.cn/a/202512/12/WS693c0c9ba310d6866eb2e640.html
Beijing mobilizes for winter's first major snowfall - Chinadaily.com.cn Search HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL WATCHTHIS SPORTS OPINION REGIONAL FORUM NEWSPAPER MOBILE Home China Society Home / China / Society Beijing mobilizes for winter's first major snowfall By Yang Cheng and Wang Songsong | chinadaily.com.cn | Updated: 2025-12-12 20:37 Share Share - WeChat --> CLOSE At an expressway checkpoint in Mentougou district, police officers and auxiliary police work in the wind and snow to ensure the safe and smooth passage of travelers. [Photo by Wang Hanyi/provided to chinadaily.com.cn] China's capital is making a swift response to this winter's first snowfall, as forecasts indicate that the snow will continue into the early hours of Saturday, Beijing News reported on Friday. The Beijing Meteorological Service predicts moderate snow across most areas, while Fangshan, Mentougou, Changping, Yanqing, Huairou, and Miyun districts may face heavier snowfall, with some areas potentially experiencing blizzard conditions.   --> 1 2 3 4 5 6 7 8 9 10 11 12 13 Next    >>| --> 1/13 Next Photo China's key economic tasks for 2026 LIVE: Special coverage of National Memorial Day for Nanjing Massacre victims Beijing welcomes its first snowfall this winter Yanshiping, Xizang's highest railway station, begins service Salt of the earth Moment of truth --> --> Top BACK TO THE TOP English 中文 HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment FOLLOW US Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. -->
2026-01-13T09:29:32
http://groovy-lang.org/syntax.html#_unicode_escape_sequence
The Apache Groovy programming language - Syntax Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community You are using an outdated browser. Please upgrade your browser to improve your experience. Apache Groovy™ Learn Documentation Download Support Contribute Ecosystem Blog posts Socialize Table of contents 1. Comments 1.1. Single-line comment 1.2. Multiline comment 1.3. Groovydoc comment 1.4. Shebang line 2. Keywords 3. Identifiers 3.1. Normal identifiers 3.2. Quoted identifiers 4. Strings 4.1. Single-quoted string 4.2. String concatenation 4.3. Triple-single-quoted string 4.3.1. Escaping special characters 4.3.2. Unicode escape sequence 4.4. Double-quoted string 4.4.1. String interpolation 4.4.2. Special case of interpolating closure expressions 4.4.3. Interoperability with Java 4.4.4. GString and String hashCodes 4.5. Triple-double-quoted string 4.6. Slashy string 4.6.1. Special cases 4.7. Dollar slashy string 4.8. String summary table 4.9. Characters 5. Numbers 5.1. Integral literals 5.1.1. Alternative non-base 10 representations Binary literal Octal literal Hexadecimal literal 5.2. Decimal literals 5.3. Underscore in literals 5.4. Number type suffixes 5.5. Math operations 5.5.1. The case of the division operator 5.5.2. The case of the power operator 6. Booleans 7. Lists 8. Arrays 8.1. Java-style array initialization 9. Maps Syntax This chapter covers the syntax of the Groovy programming language. The grammar of the language derives from the Java grammar, but enhances it with specific constructs for Groovy, and allows certain simplifications. 1. Comments 1.1. Single-line comment Single-line comments start with // and can be found at any position in the line. The characters following // , until the end of the line, are considered part of the comment. // a standalone single line comment println "hello" // a comment till the end of the line 1.2. Multiline comment A multiline comment starts with /* and can be found at any position in the line. The characters following /* will be considered part of the comment, including new line characters, up to the first */ closing the comment. Multiline comments can thus be put at the end of a statement, or even inside a statement. /* a standalone multiline comment spanning two lines */ println "hello" /* a multiline comment starting at the end of a statement */ println 1 /* one */ + 2 /* two */ 1.3. Groovydoc comment Similarly to multiline comments, Groovydoc comments are multiline, but start with /** and end with */ . Lines following the first Groovydoc comment line can optionally start with a star * . Those comments are associated with: type definitions (classes, interfaces, enums, annotations), fields and properties definitions methods definitions Although the compiler will not complain about Groovydoc comments not being associated with the above language elements, you should prepend those constructs with the comment right before it. /** * A Class description */ class Person { /** the name of the person */ String name /** * Creates a greeting method for a certain person. * * @param otherPerson the person to greet * @return a greeting message */ String greet(String otherPerson) { "Hello ${otherPerson}" } } Groovydoc follows the same conventions as Java’s own Javadoc. So you’ll be able to use the same tags as with Javadoc. In addition, Groovy supports Runtime Groovydoc since 3.0.0, i.e. Groovydoc can be retained at runtime. Runtime Groovydoc is disabled by default. It can be enabled by adding JVM option -Dgroovy.attach.runtime.groovydoc=true The Runtime Groovydoc starts with /**@ and ends with */ , for example: /**@ * Some class groovydoc for Foo */ class Foo { /**@ * Some method groovydoc for bar */ void bar() { } } assert Foo.class.groovydoc.content.contains('Some class groovydoc for Foo') (1) assert Foo.class.getMethod('bar', new Class[0]).groovydoc.content.contains('Some method groovydoc for bar') (2) 1 Get the runtime groovydoc for class Foo 2 Get the runtime groovydoc for method bar 1.4. Shebang line Beside the single-line comment, there is a special line comment, often called the shebang line understood by UNIX systems which allows scripts to be run directly from the command-line, provided you have installed the Groovy distribution and the groovy command is available on the PATH . #!/usr/bin/env groovy println "Hello from the shebang line" The # character must be the first character of the file. Any indentation would yield a compilation error. 2. Keywords Groovy has the following reserved keywords: Table 1. Reserved Keywords abstract assert break case catch class const continue def default do else enum extends final finally for goto if implements import instanceof interface native new null non-sealed package public protected private return static strictfp super switch synchronized this threadsafe throw throws transient try while Of these, const , goto , strictfp , and threadsafe are not currently in use. The reserved keywords can’t in general be used for variable, field and method names. A trick allows methods to be defined having the same name as a keyword by surrounding the name in quotes as shown in the following example: // reserved keywords can be used for method names if quoted def "abstract"() { true } // when calling such methods, the name must be qualified using "this." this.abstract() Using such names might be confusing and is often best to avoid. The trick is primarily intended to enable certain Java integration scenarios and certain DSL scenarios where having "verbs" and "nouns" with the same name as keywords may be desirable. In addition, Groovy has the following contextual keywords: Table 2. Contextual Keywords as in permits record sealed trait var yields These words are only keywords in certain contexts and can be more freely used in some places, in particular for variables, fields and method names. This extra lenience allows using method or variable names that were not keywords in earlier versions of Groovy or are not keywords in Java. Examples are shown here: // contextual keywords can be used for field and variable names def as = true assert as // contextual keywords can be used for method names def in() { true } // when calling such methods, the name only needs to be qualified using "this." in scenarios which would be ambiguous this.in() Groovy programmers familiar with these contextual keywords may still wish to avoid using those names unless there is a good reason to use such a name. The restrictions on reserved keywords also apply for the primitive types, the boolean literals and the null literal (all of which are discussed later): Table 3. Other reserved words null true false boolean char byte short int long float double While not recommended, the same trick as for reserved keywords can be used: def "null"() { true } // not recommended; potentially confusing assert this.null() // must be qualified Using such words as method names is potentially confusing and is often best to avoid, however, it might be useful for certain kinds of DSLs . 3. Identifiers 3.1. Normal identifiers Identifiers start with a letter, a dollar or an underscore. They cannot start with a number. A letter can be in the following ranges: 'a' to 'z' (lowercase ascii letter) 'A' to 'Z' (uppercase ascii letter) '\u00C0' to '\u00D6' '\u00D8' to '\u00F6' '\u00F8' to '\u00FF' '\u0100' to '\uFFFE' Then following characters can contain letters and numbers. Here are a few examples of valid identifiers (here, variable names): def name def item3 def with_underscore def $dollarStart But the following ones are invalid identifiers: def 3tier def a+b def a#b All keywords are also valid identifiers when following a dot: foo.as foo.assert foo.break foo.case foo.catch 3.2. Quoted identifiers Quoted identifiers appear after the dot of a dotted expression. For instance, the name part of the person.name expression can be quoted with person."name" or person.'name' . This is particularly interesting when certain identifiers contain illegal characters that are forbidden by the Java Language Specification, but which are allowed by Groovy when quoted. For example, characters like a dash, a space, an exclamation mark, etc. def map = [:] map."an identifier with a space and double quotes" = "ALLOWED" map.'with-dash-signs-and-single-quotes' = "ALLOWED" assert map."an identifier with a space and double quotes" == "ALLOWED" assert map.'with-dash-signs-and-single-quotes' == "ALLOWED" As we shall see in the following section on strings , Groovy provides different string literals. All kind of strings are actually allowed after the dot: map.'single quote' map."double quote" map.'''triple single quote''' map."""triple double quote""" map./slashy string/ map.$/dollar slashy string/$ There’s a difference between plain character strings and Groovy’s GStrings (interpolated strings), as in that the latter case, the interpolated values are inserted in the final string for evaluating the whole identifier: def firstname = "Homer" map."Simpson-${firstname}" = "Homer Simpson" assert map.'Simpson-Homer' == "Homer Simpson" 4. Strings Text literals are represented in the form of chain of characters called strings. Groovy lets you instantiate java.lang.String objects, as well as GStrings ( groovy.lang.GString ) which are also called interpolated strings in other programming languages. 4.1. Single-quoted string Single-quoted strings are a series of characters surrounded by single quotes: 'a single-quoted string' Single-quoted strings are plain java.lang.String and don’t support interpolation. 4.2. String concatenation All the Groovy strings can be concatenated with the + operator: assert 'ab' == 'a' + 'b' 4.3. Triple-single-quoted string Triple-single-quoted strings are a series of characters surrounded by triplets of single quotes: '''a triple-single-quoted string''' Triple-single-quoted strings are plain java.lang.String and don’t support interpolation. Triple-single-quoted strings may span multiple lines. The content of the string can cross line boundaries without the need to split the string in several pieces and without concatenation or newline escape characters: def aMultilineString = '''line one line two line three''' If your code is indented, for example in the body of the method of a class, your string will contain the whitespace of the indentation. The Groovy Development Kit contains methods for stripping out the indentation with the String#stripIndent() method, and with the String#stripMargin() method that takes a delimiter character to identify the text to remove from the beginning of a string. When creating a string as follows: def startingAndEndingWithANewline = ''' line one line two line three ''' You will notice that the resulting string contains a newline character as first character. It is possible to strip that character by escaping the newline with a backslash: def strippedFirstNewline = '''\ line one line two line three ''' assert !strippedFirstNewline.startsWith('\n') 4.3.1. Escaping special characters You can escape single quotes with the backslash character to avoid terminating the string literal: 'an escaped single quote: \' needs a backslash' And you can escape the escape character itself with a double backslash: 'an escaped escape character: \\ needs a double backslash' Some special characters also use the backslash as escape character: Escape sequence Character \b backspace \f formfeed \n newline \r carriage return \s single space \t tabulation \\ backslash \' single quote within a single-quoted string (and optional for triple-single-quoted and double-quoted strings) \" double quote within a double-quoted string (and optional for triple-double-quoted and single-quoted strings) We’ll see some more escaping details when it comes to other types of strings discussed later. 4.3.2. Unicode escape sequence For characters that are not present on your keyboard, you can use unicode escape sequences: a backslash, followed by 'u', then 4 hexadecimal digits. For example, the Euro currency symbol can be represented with: 'The Euro currency symbol: \u20AC' 4.4. Double-quoted string Double-quoted strings are a series of characters surrounded by double quotes: "a double-quoted string" Double-quoted strings are plain java.lang.String if there’s no interpolated expression, but are groovy.lang.GString instances if interpolation is present. To escape a double quote, you can use the backslash character: "A double quote: \"". 4.4.1. String interpolation Any Groovy expression can be interpolated in all string literals, apart from single and triple-single-quoted strings. Interpolation is the act of replacing a placeholder in the string with its value upon evaluation of the string. The placeholder expressions are surrounded by ${} . The curly braces may be omitted for unambiguous dotted expressions, i.e. we can use just a $ prefix in those cases. If the GString is ever passed to a method taking a String, the expression value inside the placeholder is evaluated to its string representation (by calling toString() on that expression) and the resulting String is passed to the method. Here, we have a string with a placeholder referencing a local variable: def name = 'Guillaume' // a plain string def greeting = "Hello ${name}" assert greeting.toString() == 'Hello Guillaume' Any Groovy expression is valid, as we can see in this example with an arithmetic expression: def sum = "The sum of 2 and 3 equals ${2 + 3}" assert sum.toString() == 'The sum of 2 and 3 equals 5' Not only are expressions allowed in between the ${} placeholder, but so are statements. However, a statement’s value is just null . So if several statements are inserted in that placeholder, the last one should somehow return a meaningful value to be inserted. For instance, "The sum of 1 and 2 is equal to ${def a = 1; def b = 2; a + b}" is supported and works as expected but a good practice is usually to stick to simple expressions inside GString placeholders. In addition to ${} placeholders, we can also use a lone $ sign prefixing a dotted expression: def person = [name: 'Guillaume', age: 36] assert "$person.name is $person.age years old" == 'Guillaume is 36 years old' But only dotted expressions of the form a.b , a.b.c , etc, are valid. Expressions containing parentheses like method calls, curly braces for closures, dots which aren’t part of a property expression or arithmetic operators would be invalid. Given the following variable definition of a number: def number = 3.14 The following statement will throw a groovy.lang.MissingPropertyException because Groovy believes you’re trying to access the toString property of that number, which doesn’t exist: shouldFail(MissingPropertyException) { println "$number.toString()" } You can think of "$number.toString()" as being interpreted by the parser as "${number.toString}()" . Similarly, if the expression is ambiguous, you need to keep the curly braces: String thing = 'treasure' assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by $thing.x" // <= Not allowed: ambiguous!! assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by ${thing}.x" // <= Curly braces required If you need to escape the $ or ${} placeholders in a GString so they appear as is without interpolation, you just need to use a \ backslash character to escape the dollar sign: assert '$5' == "\$5" assert '${name}' == "\${name}" 4.4.2. Special case of interpolating closure expressions So far, we’ve seen we could interpolate arbitrary expressions inside the ${} placeholder, but there is a special case and notation for closure expressions. When the placeholder contains an arrow, ${→} , the expression is actually a closure expression — you can think of it as a closure with a dollar prepended in front of it: def sParameterLessClosure = "1 + 2 == ${-> 3}" (1) assert sParameterLessClosure == '1 + 2 == 3' def sOneParamClosure = "1 + 2 == ${ w -> w << 3}" (2) assert sOneParamClosure == '1 + 2 == 3' 1 The closure is a parameterless closure which doesn’t take arguments. 2 Here, the closure takes a single java.io.StringWriter argument, to which you can append content with the << leftShift operator. In either case, both placeholders are embedded closures. In appearance, it looks like a more verbose way of defining expressions to be interpolated, but closures have an interesting advantage over mere expressions: lazy evaluation. Let’s consider the following sample: def number = 1 (1) def eagerGString = "value == ${number}" def lazyGString = "value == ${ -> number }" assert eagerGString == "value == 1" (2) assert lazyGString == "value == 1" (3) number = 2 (4) assert eagerGString == "value == 1" (5) assert lazyGString == "value == 2" (6) 1 We define a number variable containing 1 that we then interpolate within two GStrings, as an expression in eagerGString and as a closure in lazyGString . 2 We expect the resulting string to contain the same string value of 1 for eagerGString . 3 Similarly for lazyGString 4 Then we change the value of the variable to a new number 5 With a plain interpolated expression, the value was actually bound at the time of creation of the GString. 6 But with a closure expression, the closure is called upon each coercion of the GString into String, resulting in an updated string containing the new number value. An embedded closure expression taking more than one parameter will generate an exception at runtime. Only closures with zero or one parameter are allowed. 4.4.3. Interoperability with Java When a method (whether implemented in Java or Groovy) expects a java.lang.String , but we pass a groovy.lang.GString instance, the toString() method of the GString is automatically and transparently called. String takeString(String message) { (4) assert message instanceof String (5) return message } def message = "The message is ${'hello'}" (1) assert message instanceof GString (2) def result = takeString(message) (3) assert result instanceof String assert result == 'The message is hello' 1 We create a GString variable 2 We double-check it’s an instance of the GString 3 We then pass that GString to a method taking a String as parameter 4 The signature of the takeString() method explicitly says its sole parameter is a String 5 We also verify that the parameter is indeed a String and not a GString. 4.4.4. GString and String hashCodes Although interpolated strings can be used in lieu of plain Java strings, they differ with strings in a particular way: their hashCodes are different. Plain Java strings are immutable, whereas the resulting String representation of a GString can vary, depending on its interpolated values. Even for the same resulting string, GStrings and Strings don’t have the same hashCode. assert "one: ${1}".hashCode() != "one: 1".hashCode() GString and Strings having different hashCode values, using GString as Map keys should be avoided, especially if we try to retrieve an associated value with a String instead of a GString. def key = "a" def m = ["${key}": "letter ${key}"] (1) assert m["a"] == null (2) 1 The map is created with an initial pair whose key is a GString 2 When we try to fetch the value with a String key, we will not find it, as Strings and GString have different hashCode values 4.5. Triple-double-quoted string Triple-double-quoted strings behave like double-quoted strings, with the addition that they are multiline, like the triple-single-quoted strings. def name = 'Groovy' def template = """ Dear Mr ${name}, You're the winner of the lottery! Yours sincerly, Dave """ assert template.toString().contains('Groovy') Neither double quotes nor single quotes need be escaped in triple-double-quoted strings. 4.6. Slashy string Beyond the usual quoted strings, Groovy offers slashy strings, which use / as the opening and closing delimiter. Slashy strings are particularly useful for defining regular expressions and patterns, as there is no need to escape backslashes. Example of a slashy string: def fooPattern = /.*foo.*/ assert fooPattern == '.*foo.*' Only forward slashes need to be escaped with a backslash: def escapeSlash = /The character \/ is a forward slash/ assert escapeSlash == 'The character / is a forward slash' Slashy strings are multiline: def multilineSlashy = /one two three/ assert multilineSlashy.contains('\n') Slashy strings can be thought of as just another way to define a GString but with different escaping rules. They hence support interpolation: def color = 'blue' def interpolatedSlashy = /a ${color} car/ assert interpolatedSlashy == 'a blue car' 4.6.1. Special cases An empty slashy string cannot be represented with a double forward slash, as it’s understood by the Groovy parser as a line comment. That’s why the following assert would actually not compile as it would look like a non-terminated statement: assert '' == // As slashy strings were mostly designed to make regexp easier so a few things that are errors in GStrings like $() or $5 will work with slashy strings. Remember that escaping backslashes is not required. An alternative way of thinking of this is that in fact escaping is not supported. The slashy string /\t/ won’t contain a tab but instead a backslash followed by the character 't'. Escaping is only allowed for the slash character, i.e. /\/folder/ will be a slashy string containing '/folder' . A consequence of slash escaping is that a slashy string can’t end with a backslash. Otherwise that will escape the slashy string terminator. You can instead use a special trick, /ends with slash ${'\\'}/ . But best just avoid using a slashy string in such a case. 4.7. Dollar slashy string Dollar slashy strings are multiline GStrings delimited with an opening $/ and a closing /$ . The escaping character is the dollar sign, and it can escape another dollar, or a forward slash. Escaping for the dollar and forward slash characters is only needed where conflicts arise with the special use of those characters. The characters $foo would normally indicate a GString placeholder, so those four characters can be entered into a dollar slashy string by escaping the dollar, i.e. $$foo . Similarly, you will need to escape a dollar slashy closing delimiter if you want it to appear in your string. Here are a few examples: def name = "Guillaume" def date = "April, 1st" def dollarSlashy = $/ Hello $name, today we're ${date}. $ dollar sign $$ escaped dollar sign \ backslash / forward slash $/ escaped forward slash $$$/ escaped opening dollar slashy $/$$ escaped closing dollar slashy /$ assert [ 'Guillaume', 'April, 1st', '$ dollar sign', '$ escaped dollar sign', '\\ backslash', '/ forward slash', '/ escaped forward slash', '$/ escaped opening dollar slashy', '/$ escaped closing dollar slashy' ].every { dollarSlashy.contains(it) } It was created to overcome some of the limitations of the slashy string escaping rules. Use it when its escaping rules suit your string contents (typically if it has some slashes you don’t want to escape). 4.8. String summary table String name String syntax Interpolated Multiline Escape character Single-quoted '…​' \ Triple-single-quoted '''…​''' \ Double-quoted "…​" \ Triple-double-quoted """…​""" \ Slashy /…​/ \ Dollar slashy $/…​/$ $ 4.9. Characters Unlike Java, Groovy doesn’t have an explicit character literal. However, you can be explicit about making a Groovy string an actual character, by three different means: char c1 = 'A' (1) assert c1 instanceof Character def c2 = 'B' as char (2) assert c2 instanceof Character def c3 = (char)'C' (3) assert c3 instanceof Character 1 by being explicit when declaring a variable holding the character by specifying the char type 2 by using type coercion with the as operator 3 by using a cast to char operation The first option 1 is interesting when the character is held in a variable, while the other two ( 2 and 3 ) are more interesting when a char value must be passed as argument of a method call. 5. Numbers Groovy supports different kinds of integral literals and decimal literals, backed by the usual Number types of Java. 5.1. Integral literals The integral literal types are the same as in Java: byte char short int long java.math.BigInteger You can create integral numbers of those types with the following declarations: // primitive types byte b = 1 char c = 2 short s = 3 int i = 4 long l = 5 // infinite precision BigInteger bi = 6 If you use optional typing by using the def keyword, the type of the integral number will vary: it’ll adapt to the capacity of the type that can hold that number. For positive numbers: def a = 1 assert a instanceof Integer // Integer.MAX_VALUE def b = 2147483647 assert b instanceof Integer // Integer.MAX_VALUE + 1 def c = 2147483648 assert c instanceof Long // Long.MAX_VALUE def d = 9223372036854775807 assert d instanceof Long // Long.MAX_VALUE + 1 def e = 9223372036854775808 assert e instanceof BigInteger As well as for negative numbers: def na = -1 assert na instanceof Integer // Integer.MIN_VALUE def nb = -2147483648 assert nb instanceof Integer // Integer.MIN_VALUE - 1 def nc = -2147483649 assert nc instanceof Long // Long.MIN_VALUE def nd = -9223372036854775808 assert nd instanceof Long // Long.MIN_VALUE - 1 def ne = -9223372036854775809 assert ne instanceof BigInteger 5.1.1. Alternative non-base 10 representations Numbers can also be represented in binary, octal, hexadecimal and decimal bases. Binary literal Binary numbers start with a 0b prefix: int xInt = 0b10101111 assert xInt == 175 short xShort = 0b11001001 assert xShort == 201 as short byte xByte = 0b11 assert xByte == 3 as byte long xLong = 0b101101101101 assert xLong == 2925l BigInteger xBigInteger = 0b111100100001 assert xBigInteger == 3873g int xNegativeInt = -0b10101111 assert xNegativeInt == -175 Octal literal Octal numbers are specified in the typical format of 0 followed by octal digits. int xInt = 077 assert xInt == 63 short xShort = 011 assert xShort == 9 as short byte xByte = 032 assert xByte == 26 as byte long xLong = 0246 assert xLong == 166l BigInteger xBigInteger = 01111 assert xBigInteger == 585g int xNegativeInt = -077 assert xNegativeInt == -63 Hexadecimal literal Hexadecimal numbers are specified in the typical format of 0x followed by hex digits. int xInt = 0x77 assert xInt == 119 short xShort = 0xaa assert xShort == 170 as short byte xByte = 0x3a assert xByte == 58 as byte long xLong = 0xffff assert xLong == 65535l BigInteger xBigInteger = 0xaaaa assert xBigInteger == 43690g Double xDouble = new Double('0x1.0p0') assert xDouble == 1.0d int xNegativeInt = -0x77 assert xNegativeInt == -119 5.2. Decimal literals The decimal literal types are the same as in Java: float double java.math.BigDecimal You can create decimal numbers of those types with the following declarations: // primitive types float f = 1.234 double d = 2.345 // infinite precision BigDecimal bd = 3.456 Decimals can use exponents, with the e or E exponent letter, followed by an optional sign, and an integral number representing the exponent: assert 1e3 == 1_000.0 assert 2E4 == 20_000.0 assert 3e+1 == 30.0 assert 4E-2 == 0.04 assert 5e-1 == 0.5 Conveniently for exact decimal number calculations, Groovy chooses java.math.BigDecimal as its decimal number type. In addition, both float and double are supported, but require an explicit type declaration, type coercion or suffix. Even if BigDecimal is the default for decimal numbers, such literals are accepted in methods or closures taking float or double as parameter types. Decimal numbers can’t be represented using a binary, octal or hexadecimal representation. 5.3. Underscore in literals When writing long literal numbers, it’s harder on the eye to figure out how some numbers are grouped together, for example with groups of thousands, of words, etc. By allowing you to place underscore in number literals, it’s easier to spot those groups: long creditCardNumber = 1234_5678_9012_3456L long socialSecurityNumbers = 999_99_9999L double monetaryAmount = 12_345_132.12 long hexBytes = 0xFF_EC_DE_5E long hexWords = 0xFFEC_DE5E long maxLong = 0x7fff_ffff_ffff_ffffL long alsoMaxLong = 9_223_372_036_854_775_807L long bytes = 0b11010010_01101001_10010100_10010010 5.4. Number type suffixes We can force a number (including binary, octals and hexadecimals) to have a specific type by giving a suffix (see table below), either uppercase or lowercase. Type Suffix BigInteger G or g Long L or l Integer I or i BigDecimal G or g Double D or d Float F or f Examples: assert 42I == Integer.valueOf('42') assert 42i == Integer.valueOf('42') // lowercase i more readable assert 123L == Long.valueOf("123") // uppercase L more readable assert 2147483648 == Long.valueOf('2147483648') // Long type used, value too large for an Integer assert 456G == new BigInteger('456') assert 456g == new BigInteger('456') assert 123.45 == new BigDecimal('123.45') // default BigDecimal type used assert .321 == new BigDecimal('.321') assert 1.200065D == Double.valueOf('1.200065') assert 1.234F == Float.valueOf('1.234') assert 1.23E23D == Double.valueOf('1.23E23') assert 0b1111L.class == Long // binary assert 0xFFi.class == Integer // hexadecimal assert 034G.class == BigInteger // octal 5.5. Math operations Although operators are covered in more detail elsewhere, it’s important to discuss the behavior of math operations and what their resulting types are. Division and power binary operations aside (covered below), binary operations between byte , char , short and int result in int binary operations involving long with byte , char , short and int result in long binary operations involving BigInteger and any other integral type result in BigInteger binary operations involving BigDecimal with byte , char , short , int and BigInteger result in BigDecimal binary operations between float , double and BigDecimal result in double binary operations between two BigDecimal result in BigDecimal The following table summarizes those rules: byte char short int long BigInteger float double BigDecimal byte int int int int long BigInteger double double BigDecimal char int int int long BigInteger double double BigDecimal short int int long BigInteger double double BigDecimal int int long BigInteger double double BigDecimal long long BigInteger double double BigDecimal BigInteger BigInteger double double BigDecimal float double double double double double double BigDecimal BigDecimal Thanks to Groovy’s operator overloading, the usual arithmetic operators work as well with BigInteger and BigDecimal , unlike in Java where you have to use explicit methods for operating on those numbers. 5.5.1. The case of the division operator The division operators / (and /= for division and assignment) produce a double result if either operand is a float or double , and a BigDecimal result otherwise (when both operands are any combination of an integral type short , char , byte , int , long , BigInteger or BigDecimal ). BigDecimal division is performed with the divide() method if the division is exact (i.e. yielding a result that can be represented within the bounds of the same precision and scale), or using a MathContext with a precision of the maximum of the two operands' precision plus an extra precision of 10, and a scale of the maximum of 10 and the maximum of the operands' scale. For integer division like in Java, you should use the intdiv() method, as Groovy doesn’t provide a dedicated integer division operator symbol. 5.5.2. The case of the power operator The power operation is represented by the ** operator, with two parameters: the base and the exponent. The result of the power operation depends on its operands, and the result of the operation (in particular if the result can be represented as an integral value). The following rules are used by Groovy’s power operation to determine the resulting type: If the exponent is a decimal value if the result can be represented as an Integer , then return an Integer else if the result can be represented as a Long , then return a Long otherwise return a Double If the exponent is an integral value if the exponent is strictly negative, then return an Integer , Long or Double if the result value fits in that type if the exponent is positive or zero if the base is a BigDecimal , then return a BigDecimal result value if the base is a BigInteger , then return a BigInteger result value if the base is an Integer , then return an Integer if the result value fits in it, otherwise a BigInteger if the base is a Long , then return a Long if the result value fits in it, otherwise a BigInteger We can illustrate those rules with a few examples: // base and exponent are ints and the result can be represented by an Integer assert 2 ** 3 instanceof Integer // 8 assert 10 ** 9 instanceof Integer // 1_000_000_000 // the base is a long, so fit the result in a Long // (although it could have fit in an Integer) assert 5L ** 2 instanceof Long // 25 // the result can't be represented as an Integer or Long, so return a BigInteger assert 100 ** 10 instanceof BigInteger // 10e20 assert 1234 ** 123 instanceof BigInteger // 170515806212727042875... // the base is a BigDecimal and the exponent a negative int // but the result can be represented as an Integer assert 0.5 ** -2 instanceof Integer // 4 // the base is an int, and the exponent a negative float // but again, the result can be represented as an Integer assert 1 ** -0.3f instanceof Integer // 1 // the base is an int, and the exponent a negative int // but the result will be calculated as a Double // (both base and exponent are actually converted to doubles) assert 10 ** -1 instanceof Double // 0.1 // the base is a BigDecimal, and the exponent is an int, so return a BigDecimal assert 1.2 ** 10 instanceof BigDecimal // 6.1917364224 // the base is a float or double, and the exponent is an int // but the result can only be represented as a Double value assert 3.4f ** 5 instanceof Double // 454.35430372146965 assert 5.6d ** 2 instanceof Double // 31.359999999999996 // the exponent is a decimal value // and the result can only be represented as a Double value assert 7.8 ** 1.9 instanceof Double // 49.542708423868476 assert 2 ** 0.1f instanceof Double // 1.0717734636432956 6. Booleans Boolean is a special data type that is used to represent truth values: true and false . Use this data type for simple flags that track true/false conditions . Boolean values can be stored in variables, assigned into fields, just like any other data type: def myBooleanVariable = true boolean untypedBooleanVar = false booleanField = true true and false are the only two primitive boolean values. But more complex boolean expressions can be represented using logical operators . In addition, Groovy has special rules (often referred to as Groovy Truth ) for coercing non-boolean objects to a boolean value. 7. Lists Groovy uses a comma-separated list of values, surrounded by square brackets, to denote lists. Groovy lists are plain JDK java.util.List , as Groovy doesn’t define its own collection classes. The concrete list implementation used when defining list literals are java.util.ArrayList by default, unless you decide to specify otherwise, as we shall see later on. def numbers = [1, 2, 3] (1) assert numbers instanceof List (2) assert numbers.size() == 3 (3) 1 We define a list numbers delimited by commas and surrounded by square brackets, and we assign that list into a variable 2 The list is an instance of Java’s java.util.List interface 3 The size of the list can be queried with the size() method, and shows our list contains 3 elements In the above example, we used a homogeneous list, but you can also create lists containing values of heterogeneous types: def heterogeneous = [1, "a", true] (1) 1 Our list here contains a number, a string and a boolean value We mentioned that by default, list literals are actually instances of java.util.ArrayList , but it is possible to use a different backing type for our lists, thanks to using type coercion with the as operator, or with explicit type declaration for your variables: def arrayList = [1, 2, 3] assert arrayList instanceof java.util.ArrayList def linkedList = [2, 3, 4] as LinkedList (1) assert linkedList instanceof java.util.LinkedList LinkedList otherLinked = [3, 4, 5] (2) assert otherLinked instanceof java.util.LinkedList 1 We use coercion with the as operator to explicitly request a java.util.LinkedList implementation 2 We can say that the variable holding the list literal is of type java.util.LinkedList You can access elements of the list with the [] subscript operator (both for reading and setting values) with positive indices or negative indices to access elements from the end of the list, as well as with ranges, and use the << leftShift operator to append elements to a list: def letters = ['a', 'b', 'c', 'd'] assert letters[0] == 'a' (1) assert letters[1] == 'b' assert letters[-1] == 'd' (2) assert letters[-2] == 'c' letters[2] = 'C' (3) assert letters[2] == 'C' letters << 'e' (4) assert letters[ 4] == 'e' assert letters[-1] == 'e' assert letters[1, 3] == ['b', 'd'] (5) assert letters[2..4] == ['C', 'd', 'e'] (6) 1 Access the first element of the list (zero-based counting) 2 Access the last element of the list with a negative index: -1 is the first element from the end of the list 3 Use an assignment to set a new value for the third element of the list 4 Use the << leftShift operator to append an element at the end of the list 5 Access two elements at once, returning a new list containing those two elements 6 Use a range to access a range of values from the list, from a start to an end element position As lists can be heterogeneous in nature, lists can also contain other lists to create multidimensional lists: def multi = [[0, 1], [2, 3]] (1) assert multi[1][0] == 2 (2) 1 Define a list of numbers 2 Access the second element of the top-most list, and the first element of the inner list 8. Arrays Groovy reuses the list notation for arrays, but to make such literals arrays, you need to explicitly define the type of the array through coercion or type declaration. String[] arrStr = ['Ananas', 'Banana', 'Kiwi'] (1) assert arrStr instanceof String[] (2) assert !(arrStr instanceof List) def numArr = [1, 2, 3] as int[] (3) assert numArr instanceof int[] (4) assert numArr.size() == 3 1 Define an array of strings using explicit variable type declaration 2 Assert that we created an array of strings 3 Create an array of ints with the as operator 4 Assert that we created an array of primitive ints You can also create multi-dimensional arrays: def matrix3 = new Integer[3][3] (1) assert matrix3.size() == 3 Integer[][] matrix2 (2) matrix2 = [[1, 2], [3, 4]] assert matrix2 instanceof Integer[][] 1 You can define the bounds of a new array 2 Or declare an array without specifying its bounds Access to elements of an array follows the same notation as for lists: String[] names = ['Cédric', 'Guillaume', 'Jochen', 'Paul'] assert names[0] == 'Cédric' (1) names[2] = 'Blackdrag' (2) assert names[2] == 'Blackdrag' 1 Retrieve the first element of the array 2 Set the value of the third element of the array to a new value 8.1. Java-style array initialization Groovy has always supported literal list/array definitions using square brackets and has avoided Java-style curly braces so as not to conflict with closure definitions. In the case where the curly braces come immediately after an array type declaration however, there is no ambiguity with closure definitions, so Groovy 3 and above support that variant of the Java array initialization expression. Examples: def primes = new int[] {2, 3, 5, 7, 11} assert primes.size() == 5 && primes.sum() == 28 assert primes.class.name == '[I' def pets = new String[] {'cat', 'dog'} assert pets.size() == 2 && pets.sum() == 'catdog' assert pets.class.name == '[Ljava.lang.String;' // traditional Groovy alternative still supported String[] groovyBooks = [ 'Groovy in Action', 'Making Java Groovy' ] assert groovyBooks.every{ it.contains('Groovy') } 9. Maps Sometimes called dictionaries or associative arrays in other languages, Groovy features maps. Maps associate keys to values, separating keys and values with colons, and each key/value pairs with commas, and the whole keys and values surrounded by square brackets. def colors = [red: '#FF0000', green: '#00FF00', blue: '#0000FF'] (1) assert colors['red'] == '#FF0000' (2) assert colors.green == '#00FF00' (3) colors['pink'] = '#FF00FF' (4) colors.yellow = '#FFFF00' (5) assert colors.pink == '#FF00FF' assert colors['yellow'] == '#FFFF00' assert colors instanceof java.util.LinkedHashMap 1 We define a map of string color names, associated with their hexadecimal-coded html colors 2 We use the subscript notation to check the content associated with the red key 3 We can also use the property notation to assert the color green’s hexadecimal representation 4 Similarly, we can use the subscript notation to add a new key/value pair 5 Or the property notation, to add the yellow color When using names for the keys, we actually define string keys in the map. Groovy creates maps that are actually instances of java.util.LinkedHashMap . If you try to access a key which is not present in the map: assert colors.unknown == null def emptyMap = [:] assert emptyMap.anyKey == null You will retrieve a null result. In the examples above, we used string keys, but you can also use values of other types as keys: def numbers = [1: 'one', 2: 'two'] assert numbers[1] == 'one' Here, we used numbers as keys, as numbers can unambiguously be recognized as numbers, so Groovy will not create a string key like in our previous examples. But consider the case you want to pass a variable in lieu of the key, to have the value of that variable become the key: def key = 'name' def person = [key: 'Guillaume'] (1) assert !person.containsKey('name') (2) assert person.containsKey('key') (3) 1 The key associated with the 'Guillaume' name will actually be the "key" string, not the value associated with the key variable 2 The map doesn’t contain the 'name' key 3 Instead, the map contains a 'key' key You can also pass quoted strings as well as keys: ["name": "Guillaume"]. This is mandatory if your key string isn’t a valid identifier, for example if you wanted to create a string key containing a dash like in: ["street-name": "Main street"]. When you need to pass variable values as keys in your map definitions, you must surround the variable or expression with parentheses: person = [(key): 'Guillaume'] (1) assert person.containsKey('name') (2) assert !person.containsKey('key') (3) 1 This time, we surround the key variable with parentheses, to instruct the parser we are passing a variable rather than defining a string key 2 The map does contain the name key 3 But the map doesn’t contain the key key as before Groovy Learn Documentation Download Support Contribute Ecosystem Blog posts About Source code Security Books Thanks Sponsorship FAQ Search Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community The Groovy programming language is supported by the Apache Software Foundation and the Groovy community. Apache, Apache Groovy, Groovy, and the ASF logo are either registered trademarks or trademarks of The Apache Software Foundation. © 2003-2025 the Apache Groovy project — Groovy is Open Source: license , privacy policy .
2026-01-13T09:29:32
https://www.ecns.cn/hd/2026-01-06/detail-iheyrzrv3834854.shtml
China's Yangtze River remains world's busiest inland waterway by cargo throughput --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo China's Yangtze River remains world's busiest inland waterway by cargo throughput ( 1 /2) 2026-01-06 10:07:37 Ecns.cn Editor :Gong Weiwei An aerial drone photo taken on July 14, 2025 shows the import and export container terminal at Longtan Port in Nanjing City along the Yangtze River. (Photo: China News Service/Yang Bo) The Yangtze River trunk line has remained the world's busiest inland waterway in terms of cargo throughput, an official said on Monday. The annual cargo throughput at ports along the river's trunk line has surged by 71 percent to 4.2 billion metric tons over the past decade, Wang Changlin, deputy head of the National Development and Reform Commission, said at a press conference. An aerial drone photo taken?on July 14, 2025 shows the import and export container terminal at Longtan Port in Nanjing City along the Yangtze River. (Photo: China News Service/Yang Bo) Previous The Yangtze River trunk line has remained the world's busiest inland waterway in terms of cargo throughput, an official said on Monday. The annual cargo throughput at ports along the river's trunk line has surged by 71 percent to 4.2 billion metric tons over the past decade, Wang Changlin, deputy head of the National Development and Reform Commission, said at a press conference.--> Next (1) (2) LINE More Photo Protest held in New York against U.S. military strikes on Venezuela Venezuelan President Nicolás Maduro transported to Brooklyn detention center In Numbers: China sees 595 million inter-regional trips during New Year holiday In Numbers: China's railway mileage tops 165,000 km International ice sculpture competition heats up in Harbin Mourners pay tribute to Crans-Montana bar fire victims ${visuals_2} ${visuals_3} More Video Insights丨Portuguese economist sees stability and opportunity in China’s long-term planning (W.E. Talk) Experts on 2026: China's 15th Five-Year Plan significant for the World (W.E. Talk) Experts look to 2026: Seizing opportunities amid crises, forging ahead after breakthroughs The Awkward Chronicles of Uncle Sam: Claimed Glory, Met Chaos The Dunhuang Flying Dancers in the 1,360°C kiln fire The Awkward Chronicles of Uncle Sam: Tariff Bullying and Backfire ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
http://groovy-lang.org/syntax.html#power_operator
The Apache Groovy programming language - Syntax Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community You are using an outdated browser. Please upgrade your browser to improve your experience. Apache Groovy™ Learn Documentation Download Support Contribute Ecosystem Blog posts Socialize Table of contents 1. Comments 1.1. Single-line comment 1.2. Multiline comment 1.3. Groovydoc comment 1.4. Shebang line 2. Keywords 3. Identifiers 3.1. Normal identifiers 3.2. Quoted identifiers 4. Strings 4.1. Single-quoted string 4.2. String concatenation 4.3. Triple-single-quoted string 4.3.1. Escaping special characters 4.3.2. Unicode escape sequence 4.4. Double-quoted string 4.4.1. String interpolation 4.4.2. Special case of interpolating closure expressions 4.4.3. Interoperability with Java 4.4.4. GString and String hashCodes 4.5. Triple-double-quoted string 4.6. Slashy string 4.6.1. Special cases 4.7. Dollar slashy string 4.8. String summary table 4.9. Characters 5. Numbers 5.1. Integral literals 5.1.1. Alternative non-base 10 representations Binary literal Octal literal Hexadecimal literal 5.2. Decimal literals 5.3. Underscore in literals 5.4. Number type suffixes 5.5. Math operations 5.5.1. The case of the division operator 5.5.2. The case of the power operator 6. Booleans 7. Lists 8. Arrays 8.1. Java-style array initialization 9. Maps Syntax This chapter covers the syntax of the Groovy programming language. The grammar of the language derives from the Java grammar, but enhances it with specific constructs for Groovy, and allows certain simplifications. 1. Comments 1.1. Single-line comment Single-line comments start with // and can be found at any position in the line. The characters following // , until the end of the line, are considered part of the comment. // a standalone single line comment println "hello" // a comment till the end of the line 1.2. Multiline comment A multiline comment starts with /* and can be found at any position in the line. The characters following /* will be considered part of the comment, including new line characters, up to the first */ closing the comment. Multiline comments can thus be put at the end of a statement, or even inside a statement. /* a standalone multiline comment spanning two lines */ println "hello" /* a multiline comment starting at the end of a statement */ println 1 /* one */ + 2 /* two */ 1.3. Groovydoc comment Similarly to multiline comments, Groovydoc comments are multiline, but start with /** and end with */ . Lines following the first Groovydoc comment line can optionally start with a star * . Those comments are associated with: type definitions (classes, interfaces, enums, annotations), fields and properties definitions methods definitions Although the compiler will not complain about Groovydoc comments not being associated with the above language elements, you should prepend those constructs with the comment right before it. /** * A Class description */ class Person { /** the name of the person */ String name /** * Creates a greeting method for a certain person. * * @param otherPerson the person to greet * @return a greeting message */ String greet(String otherPerson) { "Hello ${otherPerson}" } } Groovydoc follows the same conventions as Java’s own Javadoc. So you’ll be able to use the same tags as with Javadoc. In addition, Groovy supports Runtime Groovydoc since 3.0.0, i.e. Groovydoc can be retained at runtime. Runtime Groovydoc is disabled by default. It can be enabled by adding JVM option -Dgroovy.attach.runtime.groovydoc=true The Runtime Groovydoc starts with /**@ and ends with */ , for example: /**@ * Some class groovydoc for Foo */ class Foo { /**@ * Some method groovydoc for bar */ void bar() { } } assert Foo.class.groovydoc.content.contains('Some class groovydoc for Foo') (1) assert Foo.class.getMethod('bar', new Class[0]).groovydoc.content.contains('Some method groovydoc for bar') (2) 1 Get the runtime groovydoc for class Foo 2 Get the runtime groovydoc for method bar 1.4. Shebang line Beside the single-line comment, there is a special line comment, often called the shebang line understood by UNIX systems which allows scripts to be run directly from the command-line, provided you have installed the Groovy distribution and the groovy command is available on the PATH . #!/usr/bin/env groovy println "Hello from the shebang line" The # character must be the first character of the file. Any indentation would yield a compilation error. 2. Keywords Groovy has the following reserved keywords: Table 1. Reserved Keywords abstract assert break case catch class const continue def default do else enum extends final finally for goto if implements import instanceof interface native new null non-sealed package public protected private return static strictfp super switch synchronized this threadsafe throw throws transient try while Of these, const , goto , strictfp , and threadsafe are not currently in use. The reserved keywords can’t in general be used for variable, field and method names. A trick allows methods to be defined having the same name as a keyword by surrounding the name in quotes as shown in the following example: // reserved keywords can be used for method names if quoted def "abstract"() { true } // when calling such methods, the name must be qualified using "this." this.abstract() Using such names might be confusing and is often best to avoid. The trick is primarily intended to enable certain Java integration scenarios and certain DSL scenarios where having "verbs" and "nouns" with the same name as keywords may be desirable. In addition, Groovy has the following contextual keywords: Table 2. Contextual Keywords as in permits record sealed trait var yields These words are only keywords in certain contexts and can be more freely used in some places, in particular for variables, fields and method names. This extra lenience allows using method or variable names that were not keywords in earlier versions of Groovy or are not keywords in Java. Examples are shown here: // contextual keywords can be used for field and variable names def as = true assert as // contextual keywords can be used for method names def in() { true } // when calling such methods, the name only needs to be qualified using "this." in scenarios which would be ambiguous this.in() Groovy programmers familiar with these contextual keywords may still wish to avoid using those names unless there is a good reason to use such a name. The restrictions on reserved keywords also apply for the primitive types, the boolean literals and the null literal (all of which are discussed later): Table 3. Other reserved words null true false boolean char byte short int long float double While not recommended, the same trick as for reserved keywords can be used: def "null"() { true } // not recommended; potentially confusing assert this.null() // must be qualified Using such words as method names is potentially confusing and is often best to avoid, however, it might be useful for certain kinds of DSLs . 3. Identifiers 3.1. Normal identifiers Identifiers start with a letter, a dollar or an underscore. They cannot start with a number. A letter can be in the following ranges: 'a' to 'z' (lowercase ascii letter) 'A' to 'Z' (uppercase ascii letter) '\u00C0' to '\u00D6' '\u00D8' to '\u00F6' '\u00F8' to '\u00FF' '\u0100' to '\uFFFE' Then following characters can contain letters and numbers. Here are a few examples of valid identifiers (here, variable names): def name def item3 def with_underscore def $dollarStart But the following ones are invalid identifiers: def 3tier def a+b def a#b All keywords are also valid identifiers when following a dot: foo.as foo.assert foo.break foo.case foo.catch 3.2. Quoted identifiers Quoted identifiers appear after the dot of a dotted expression. For instance, the name part of the person.name expression can be quoted with person."name" or person.'name' . This is particularly interesting when certain identifiers contain illegal characters that are forbidden by the Java Language Specification, but which are allowed by Groovy when quoted. For example, characters like a dash, a space, an exclamation mark, etc. def map = [:] map."an identifier with a space and double quotes" = "ALLOWED" map.'with-dash-signs-and-single-quotes' = "ALLOWED" assert map."an identifier with a space and double quotes" == "ALLOWED" assert map.'with-dash-signs-and-single-quotes' == "ALLOWED" As we shall see in the following section on strings , Groovy provides different string literals. All kind of strings are actually allowed after the dot: map.'single quote' map."double quote" map.'''triple single quote''' map."""triple double quote""" map./slashy string/ map.$/dollar slashy string/$ There’s a difference between plain character strings and Groovy’s GStrings (interpolated strings), as in that the latter case, the interpolated values are inserted in the final string for evaluating the whole identifier: def firstname = "Homer" map."Simpson-${firstname}" = "Homer Simpson" assert map.'Simpson-Homer' == "Homer Simpson" 4. Strings Text literals are represented in the form of chain of characters called strings. Groovy lets you instantiate java.lang.String objects, as well as GStrings ( groovy.lang.GString ) which are also called interpolated strings in other programming languages. 4.1. Single-quoted string Single-quoted strings are a series of characters surrounded by single quotes: 'a single-quoted string' Single-quoted strings are plain java.lang.String and don’t support interpolation. 4.2. String concatenation All the Groovy strings can be concatenated with the + operator: assert 'ab' == 'a' + 'b' 4.3. Triple-single-quoted string Triple-single-quoted strings are a series of characters surrounded by triplets of single quotes: '''a triple-single-quoted string''' Triple-single-quoted strings are plain java.lang.String and don’t support interpolation. Triple-single-quoted strings may span multiple lines. The content of the string can cross line boundaries without the need to split the string in several pieces and without concatenation or newline escape characters: def aMultilineString = '''line one line two line three''' If your code is indented, for example in the body of the method of a class, your string will contain the whitespace of the indentation. The Groovy Development Kit contains methods for stripping out the indentation with the String#stripIndent() method, and with the String#stripMargin() method that takes a delimiter character to identify the text to remove from the beginning of a string. When creating a string as follows: def startingAndEndingWithANewline = ''' line one line two line three ''' You will notice that the resulting string contains a newline character as first character. It is possible to strip that character by escaping the newline with a backslash: def strippedFirstNewline = '''\ line one line two line three ''' assert !strippedFirstNewline.startsWith('\n') 4.3.1. Escaping special characters You can escape single quotes with the backslash character to avoid terminating the string literal: 'an escaped single quote: \' needs a backslash' And you can escape the escape character itself with a double backslash: 'an escaped escape character: \\ needs a double backslash' Some special characters also use the backslash as escape character: Escape sequence Character \b backspace \f formfeed \n newline \r carriage return \s single space \t tabulation \\ backslash \' single quote within a single-quoted string (and optional for triple-single-quoted and double-quoted strings) \" double quote within a double-quoted string (and optional for triple-double-quoted and single-quoted strings) We’ll see some more escaping details when it comes to other types of strings discussed later. 4.3.2. Unicode escape sequence For characters that are not present on your keyboard, you can use unicode escape sequences: a backslash, followed by 'u', then 4 hexadecimal digits. For example, the Euro currency symbol can be represented with: 'The Euro currency symbol: \u20AC' 4.4. Double-quoted string Double-quoted strings are a series of characters surrounded by double quotes: "a double-quoted string" Double-quoted strings are plain java.lang.String if there’s no interpolated expression, but are groovy.lang.GString instances if interpolation is present. To escape a double quote, you can use the backslash character: "A double quote: \"". 4.4.1. String interpolation Any Groovy expression can be interpolated in all string literals, apart from single and triple-single-quoted strings. Interpolation is the act of replacing a placeholder in the string with its value upon evaluation of the string. The placeholder expressions are surrounded by ${} . The curly braces may be omitted for unambiguous dotted expressions, i.e. we can use just a $ prefix in those cases. If the GString is ever passed to a method taking a String, the expression value inside the placeholder is evaluated to its string representation (by calling toString() on that expression) and the resulting String is passed to the method. Here, we have a string with a placeholder referencing a local variable: def name = 'Guillaume' // a plain string def greeting = "Hello ${name}" assert greeting.toString() == 'Hello Guillaume' Any Groovy expression is valid, as we can see in this example with an arithmetic expression: def sum = "The sum of 2 and 3 equals ${2 + 3}" assert sum.toString() == 'The sum of 2 and 3 equals 5' Not only are expressions allowed in between the ${} placeholder, but so are statements. However, a statement’s value is just null . So if several statements are inserted in that placeholder, the last one should somehow return a meaningful value to be inserted. For instance, "The sum of 1 and 2 is equal to ${def a = 1; def b = 2; a + b}" is supported and works as expected but a good practice is usually to stick to simple expressions inside GString placeholders. In addition to ${} placeholders, we can also use a lone $ sign prefixing a dotted expression: def person = [name: 'Guillaume', age: 36] assert "$person.name is $person.age years old" == 'Guillaume is 36 years old' But only dotted expressions of the form a.b , a.b.c , etc, are valid. Expressions containing parentheses like method calls, curly braces for closures, dots which aren’t part of a property expression or arithmetic operators would be invalid. Given the following variable definition of a number: def number = 3.14 The following statement will throw a groovy.lang.MissingPropertyException because Groovy believes you’re trying to access the toString property of that number, which doesn’t exist: shouldFail(MissingPropertyException) { println "$number.toString()" } You can think of "$number.toString()" as being interpreted by the parser as "${number.toString}()" . Similarly, if the expression is ambiguous, you need to keep the curly braces: String thing = 'treasure' assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by $thing.x" // <= Not allowed: ambiguous!! assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by ${thing}.x" // <= Curly braces required If you need to escape the $ or ${} placeholders in a GString so they appear as is without interpolation, you just need to use a \ backslash character to escape the dollar sign: assert '$5' == "\$5" assert '${name}' == "\${name}" 4.4.2. Special case of interpolating closure expressions So far, we’ve seen we could interpolate arbitrary expressions inside the ${} placeholder, but there is a special case and notation for closure expressions. When the placeholder contains an arrow, ${→} , the expression is actually a closure expression — you can think of it as a closure with a dollar prepended in front of it: def sParameterLessClosure = "1 + 2 == ${-> 3}" (1) assert sParameterLessClosure == '1 + 2 == 3' def sOneParamClosure = "1 + 2 == ${ w -> w << 3}" (2) assert sOneParamClosure == '1 + 2 == 3' 1 The closure is a parameterless closure which doesn’t take arguments. 2 Here, the closure takes a single java.io.StringWriter argument, to which you can append content with the << leftShift operator. In either case, both placeholders are embedded closures. In appearance, it looks like a more verbose way of defining expressions to be interpolated, but closures have an interesting advantage over mere expressions: lazy evaluation. Let’s consider the following sample: def number = 1 (1) def eagerGString = "value == ${number}" def lazyGString = "value == ${ -> number }" assert eagerGString == "value == 1" (2) assert lazyGString == "value == 1" (3) number = 2 (4) assert eagerGString == "value == 1" (5) assert lazyGString == "value == 2" (6) 1 We define a number variable containing 1 that we then interpolate within two GStrings, as an expression in eagerGString and as a closure in lazyGString . 2 We expect the resulting string to contain the same string value of 1 for eagerGString . 3 Similarly for lazyGString 4 Then we change the value of the variable to a new number 5 With a plain interpolated expression, the value was actually bound at the time of creation of the GString. 6 But with a closure expression, the closure is called upon each coercion of the GString into String, resulting in an updated string containing the new number value. An embedded closure expression taking more than one parameter will generate an exception at runtime. Only closures with zero or one parameter are allowed. 4.4.3. Interoperability with Java When a method (whether implemented in Java or Groovy) expects a java.lang.String , but we pass a groovy.lang.GString instance, the toString() method of the GString is automatically and transparently called. String takeString(String message) { (4) assert message instanceof String (5) return message } def message = "The message is ${'hello'}" (1) assert message instanceof GString (2) def result = takeString(message) (3) assert result instanceof String assert result == 'The message is hello' 1 We create a GString variable 2 We double-check it’s an instance of the GString 3 We then pass that GString to a method taking a String as parameter 4 The signature of the takeString() method explicitly says its sole parameter is a String 5 We also verify that the parameter is indeed a String and not a GString. 4.4.4. GString and String hashCodes Although interpolated strings can be used in lieu of plain Java strings, they differ with strings in a particular way: their hashCodes are different. Plain Java strings are immutable, whereas the resulting String representation of a GString can vary, depending on its interpolated values. Even for the same resulting string, GStrings and Strings don’t have the same hashCode. assert "one: ${1}".hashCode() != "one: 1".hashCode() GString and Strings having different hashCode values, using GString as Map keys should be avoided, especially if we try to retrieve an associated value with a String instead of a GString. def key = "a" def m = ["${key}": "letter ${key}"] (1) assert m["a"] == null (2) 1 The map is created with an initial pair whose key is a GString 2 When we try to fetch the value with a String key, we will not find it, as Strings and GString have different hashCode values 4.5. Triple-double-quoted string Triple-double-quoted strings behave like double-quoted strings, with the addition that they are multiline, like the triple-single-quoted strings. def name = 'Groovy' def template = """ Dear Mr ${name}, You're the winner of the lottery! Yours sincerly, Dave """ assert template.toString().contains('Groovy') Neither double quotes nor single quotes need be escaped in triple-double-quoted strings. 4.6. Slashy string Beyond the usual quoted strings, Groovy offers slashy strings, which use / as the opening and closing delimiter. Slashy strings are particularly useful for defining regular expressions and patterns, as there is no need to escape backslashes. Example of a slashy string: def fooPattern = /.*foo.*/ assert fooPattern == '.*foo.*' Only forward slashes need to be escaped with a backslash: def escapeSlash = /The character \/ is a forward slash/ assert escapeSlash == 'The character / is a forward slash' Slashy strings are multiline: def multilineSlashy = /one two three/ assert multilineSlashy.contains('\n') Slashy strings can be thought of as just another way to define a GString but with different escaping rules. They hence support interpolation: def color = 'blue' def interpolatedSlashy = /a ${color} car/ assert interpolatedSlashy == 'a blue car' 4.6.1. Special cases An empty slashy string cannot be represented with a double forward slash, as it’s understood by the Groovy parser as a line comment. That’s why the following assert would actually not compile as it would look like a non-terminated statement: assert '' == // As slashy strings were mostly designed to make regexp easier so a few things that are errors in GStrings like $() or $5 will work with slashy strings. Remember that escaping backslashes is not required. An alternative way of thinking of this is that in fact escaping is not supported. The slashy string /\t/ won’t contain a tab but instead a backslash followed by the character 't'. Escaping is only allowed for the slash character, i.e. /\/folder/ will be a slashy string containing '/folder' . A consequence of slash escaping is that a slashy string can’t end with a backslash. Otherwise that will escape the slashy string terminator. You can instead use a special trick, /ends with slash ${'\\'}/ . But best just avoid using a slashy string in such a case. 4.7. Dollar slashy string Dollar slashy strings are multiline GStrings delimited with an opening $/ and a closing /$ . The escaping character is the dollar sign, and it can escape another dollar, or a forward slash. Escaping for the dollar and forward slash characters is only needed where conflicts arise with the special use of those characters. The characters $foo would normally indicate a GString placeholder, so those four characters can be entered into a dollar slashy string by escaping the dollar, i.e. $$foo . Similarly, you will need to escape a dollar slashy closing delimiter if you want it to appear in your string. Here are a few examples: def name = "Guillaume" def date = "April, 1st" def dollarSlashy = $/ Hello $name, today we're ${date}. $ dollar sign $$ escaped dollar sign \ backslash / forward slash $/ escaped forward slash $$$/ escaped opening dollar slashy $/$$ escaped closing dollar slashy /$ assert [ 'Guillaume', 'April, 1st', '$ dollar sign', '$ escaped dollar sign', '\\ backslash', '/ forward slash', '/ escaped forward slash', '$/ escaped opening dollar slashy', '/$ escaped closing dollar slashy' ].every { dollarSlashy.contains(it) } It was created to overcome some of the limitations of the slashy string escaping rules. Use it when its escaping rules suit your string contents (typically if it has some slashes you don’t want to escape). 4.8. String summary table String name String syntax Interpolated Multiline Escape character Single-quoted '…​' \ Triple-single-quoted '''…​''' \ Double-quoted "…​" \ Triple-double-quoted """…​""" \ Slashy /…​/ \ Dollar slashy $/…​/$ $ 4.9. Characters Unlike Java, Groovy doesn’t have an explicit character literal. However, you can be explicit about making a Groovy string an actual character, by three different means: char c1 = 'A' (1) assert c1 instanceof Character def c2 = 'B' as char (2) assert c2 instanceof Character def c3 = (char)'C' (3) assert c3 instanceof Character 1 by being explicit when declaring a variable holding the character by specifying the char type 2 by using type coercion with the as operator 3 by using a cast to char operation The first option 1 is interesting when the character is held in a variable, while the other two ( 2 and 3 ) are more interesting when a char value must be passed as argument of a method call. 5. Numbers Groovy supports different kinds of integral literals and decimal literals, backed by the usual Number types of Java. 5.1. Integral literals The integral literal types are the same as in Java: byte char short int long java.math.BigInteger You can create integral numbers of those types with the following declarations: // primitive types byte b = 1 char c = 2 short s = 3 int i = 4 long l = 5 // infinite precision BigInteger bi = 6 If you use optional typing by using the def keyword, the type of the integral number will vary: it’ll adapt to the capacity of the type that can hold that number. For positive numbers: def a = 1 assert a instanceof Integer // Integer.MAX_VALUE def b = 2147483647 assert b instanceof Integer // Integer.MAX_VALUE + 1 def c = 2147483648 assert c instanceof Long // Long.MAX_VALUE def d = 9223372036854775807 assert d instanceof Long // Long.MAX_VALUE + 1 def e = 9223372036854775808 assert e instanceof BigInteger As well as for negative numbers: def na = -1 assert na instanceof Integer // Integer.MIN_VALUE def nb = -2147483648 assert nb instanceof Integer // Integer.MIN_VALUE - 1 def nc = -2147483649 assert nc instanceof Long // Long.MIN_VALUE def nd = -9223372036854775808 assert nd instanceof Long // Long.MIN_VALUE - 1 def ne = -9223372036854775809 assert ne instanceof BigInteger 5.1.1. Alternative non-base 10 representations Numbers can also be represented in binary, octal, hexadecimal and decimal bases. Binary literal Binary numbers start with a 0b prefix: int xInt = 0b10101111 assert xInt == 175 short xShort = 0b11001001 assert xShort == 201 as short byte xByte = 0b11 assert xByte == 3 as byte long xLong = 0b101101101101 assert xLong == 2925l BigInteger xBigInteger = 0b111100100001 assert xBigInteger == 3873g int xNegativeInt = -0b10101111 assert xNegativeInt == -175 Octal literal Octal numbers are specified in the typical format of 0 followed by octal digits. int xInt = 077 assert xInt == 63 short xShort = 011 assert xShort == 9 as short byte xByte = 032 assert xByte == 26 as byte long xLong = 0246 assert xLong == 166l BigInteger xBigInteger = 01111 assert xBigInteger == 585g int xNegativeInt = -077 assert xNegativeInt == -63 Hexadecimal literal Hexadecimal numbers are specified in the typical format of 0x followed by hex digits. int xInt = 0x77 assert xInt == 119 short xShort = 0xaa assert xShort == 170 as short byte xByte = 0x3a assert xByte == 58 as byte long xLong = 0xffff assert xLong == 65535l BigInteger xBigInteger = 0xaaaa assert xBigInteger == 43690g Double xDouble = new Double('0x1.0p0') assert xDouble == 1.0d int xNegativeInt = -0x77 assert xNegativeInt == -119 5.2. Decimal literals The decimal literal types are the same as in Java: float double java.math.BigDecimal You can create decimal numbers of those types with the following declarations: // primitive types float f = 1.234 double d = 2.345 // infinite precision BigDecimal bd = 3.456 Decimals can use exponents, with the e or E exponent letter, followed by an optional sign, and an integral number representing the exponent: assert 1e3 == 1_000.0 assert 2E4 == 20_000.0 assert 3e+1 == 30.0 assert 4E-2 == 0.04 assert 5e-1 == 0.5 Conveniently for exact decimal number calculations, Groovy chooses java.math.BigDecimal as its decimal number type. In addition, both float and double are supported, but require an explicit type declaration, type coercion or suffix. Even if BigDecimal is the default for decimal numbers, such literals are accepted in methods or closures taking float or double as parameter types. Decimal numbers can’t be represented using a binary, octal or hexadecimal representation. 5.3. Underscore in literals When writing long literal numbers, it’s harder on the eye to figure out how some numbers are grouped together, for example with groups of thousands, of words, etc. By allowing you to place underscore in number literals, it’s easier to spot those groups: long creditCardNumber = 1234_5678_9012_3456L long socialSecurityNumbers = 999_99_9999L double monetaryAmount = 12_345_132.12 long hexBytes = 0xFF_EC_DE_5E long hexWords = 0xFFEC_DE5E long maxLong = 0x7fff_ffff_ffff_ffffL long alsoMaxLong = 9_223_372_036_854_775_807L long bytes = 0b11010010_01101001_10010100_10010010 5.4. Number type suffixes We can force a number (including binary, octals and hexadecimals) to have a specific type by giving a suffix (see table below), either uppercase or lowercase. Type Suffix BigInteger G or g Long L or l Integer I or i BigDecimal G or g Double D or d Float F or f Examples: assert 42I == Integer.valueOf('42') assert 42i == Integer.valueOf('42') // lowercase i more readable assert 123L == Long.valueOf("123") // uppercase L more readable assert 2147483648 == Long.valueOf('2147483648') // Long type used, value too large for an Integer assert 456G == new BigInteger('456') assert 456g == new BigInteger('456') assert 123.45 == new BigDecimal('123.45') // default BigDecimal type used assert .321 == new BigDecimal('.321') assert 1.200065D == Double.valueOf('1.200065') assert 1.234F == Float.valueOf('1.234') assert 1.23E23D == Double.valueOf('1.23E23') assert 0b1111L.class == Long // binary assert 0xFFi.class == Integer // hexadecimal assert 034G.class == BigInteger // octal 5.5. Math operations Although operators are covered in more detail elsewhere, it’s important to discuss the behavior of math operations and what their resulting types are. Division and power binary operations aside (covered below), binary operations between byte , char , short and int result in int binary operations involving long with byte , char , short and int result in long binary operations involving BigInteger and any other integral type result in BigInteger binary operations involving BigDecimal with byte , char , short , int and BigInteger result in BigDecimal binary operations between float , double and BigDecimal result in double binary operations between two BigDecimal result in BigDecimal The following table summarizes those rules: byte char short int long BigInteger float double BigDecimal byte int int int int long BigInteger double double BigDecimal char int int int long BigInteger double double BigDecimal short int int long BigInteger double double BigDecimal int int long BigInteger double double BigDecimal long long BigInteger double double BigDecimal BigInteger BigInteger double double BigDecimal float double double double double double double BigDecimal BigDecimal Thanks to Groovy’s operator overloading, the usual arithmetic operators work as well with BigInteger and BigDecimal , unlike in Java where you have to use explicit methods for operating on those numbers. 5.5.1. The case of the division operator The division operators / (and /= for division and assignment) produce a double result if either operand is a float or double , and a BigDecimal result otherwise (when both operands are any combination of an integral type short , char , byte , int , long , BigInteger or BigDecimal ). BigDecimal division is performed with the divide() method if the division is exact (i.e. yielding a result that can be represented within the bounds of the same precision and scale), or using a MathContext with a precision of the maximum of the two operands' precision plus an extra precision of 10, and a scale of the maximum of 10 and the maximum of the operands' scale. For integer division like in Java, you should use the intdiv() method, as Groovy doesn’t provide a dedicated integer division operator symbol. 5.5.2. The case of the power operator The power operation is represented by the ** operator, with two parameters: the base and the exponent. The result of the power operation depends on its operands, and the result of the operation (in particular if the result can be represented as an integral value). The following rules are used by Groovy’s power operation to determine the resulting type: If the exponent is a decimal value if the result can be represented as an Integer , then return an Integer else if the result can be represented as a Long , then return a Long otherwise return a Double If the exponent is an integral value if the exponent is strictly negative, then return an Integer , Long or Double if the result value fits in that type if the exponent is positive or zero if the base is a BigDecimal , then return a BigDecimal result value if the base is a BigInteger , then return a BigInteger result value if the base is an Integer , then return an Integer if the result value fits in it, otherwise a BigInteger if the base is a Long , then return a Long if the result value fits in it, otherwise a BigInteger We can illustrate those rules with a few examples: // base and exponent are ints and the result can be represented by an Integer assert 2 ** 3 instanceof Integer // 8 assert 10 ** 9 instanceof Integer // 1_000_000_000 // the base is a long, so fit the result in a Long // (although it could have fit in an Integer) assert 5L ** 2 instanceof Long // 25 // the result can't be represented as an Integer or Long, so return a BigInteger assert 100 ** 10 instanceof BigInteger // 10e20 assert 1234 ** 123 instanceof BigInteger // 170515806212727042875... // the base is a BigDecimal and the exponent a negative int // but the result can be represented as an Integer assert 0.5 ** -2 instanceof Integer // 4 // the base is an int, and the exponent a negative float // but again, the result can be represented as an Integer assert 1 ** -0.3f instanceof Integer // 1 // the base is an int, and the exponent a negative int // but the result will be calculated as a Double // (both base and exponent are actually converted to doubles) assert 10 ** -1 instanceof Double // 0.1 // the base is a BigDecimal, and the exponent is an int, so return a BigDecimal assert 1.2 ** 10 instanceof BigDecimal // 6.1917364224 // the base is a float or double, and the exponent is an int // but the result can only be represented as a Double value assert 3.4f ** 5 instanceof Double // 454.35430372146965 assert 5.6d ** 2 instanceof Double // 31.359999999999996 // the exponent is a decimal value // and the result can only be represented as a Double value assert 7.8 ** 1.9 instanceof Double // 49.542708423868476 assert 2 ** 0.1f instanceof Double // 1.0717734636432956 6. Booleans Boolean is a special data type that is used to represent truth values: true and false . Use this data type for simple flags that track true/false conditions . Boolean values can be stored in variables, assigned into fields, just like any other data type: def myBooleanVariable = true boolean untypedBooleanVar = false booleanField = true true and false are the only two primitive boolean values. But more complex boolean expressions can be represented using logical operators . In addition, Groovy has special rules (often referred to as Groovy Truth ) for coercing non-boolean objects to a boolean value. 7. Lists Groovy uses a comma-separated list of values, surrounded by square brackets, to denote lists. Groovy lists are plain JDK java.util.List , as Groovy doesn’t define its own collection classes. The concrete list implementation used when defining list literals are java.util.ArrayList by default, unless you decide to specify otherwise, as we shall see later on. def numbers = [1, 2, 3] (1) assert numbers instanceof List (2) assert numbers.size() == 3 (3) 1 We define a list numbers delimited by commas and surrounded by square brackets, and we assign that list into a variable 2 The list is an instance of Java’s java.util.List interface 3 The size of the list can be queried with the size() method, and shows our list contains 3 elements In the above example, we used a homogeneous list, but you can also create lists containing values of heterogeneous types: def heterogeneous = [1, "a", true] (1) 1 Our list here contains a number, a string and a boolean value We mentioned that by default, list literals are actually instances of java.util.ArrayList , but it is possible to use a different backing type for our lists, thanks to using type coercion with the as operator, or with explicit type declaration for your variables: def arrayList = [1, 2, 3] assert arrayList instanceof java.util.ArrayList def linkedList = [2, 3, 4] as LinkedList (1) assert linkedList instanceof java.util.LinkedList LinkedList otherLinked = [3, 4, 5] (2) assert otherLinked instanceof java.util.LinkedList 1 We use coercion with the as operator to explicitly request a java.util.LinkedList implementation 2 We can say that the variable holding the list literal is of type java.util.LinkedList You can access elements of the list with the [] subscript operator (both for reading and setting values) with positive indices or negative indices to access elements from the end of the list, as well as with ranges, and use the << leftShift operator to append elements to a list: def letters = ['a', 'b', 'c', 'd'] assert letters[0] == 'a' (1) assert letters[1] == 'b' assert letters[-1] == 'd' (2) assert letters[-2] == 'c' letters[2] = 'C' (3) assert letters[2] == 'C' letters << 'e' (4) assert letters[ 4] == 'e' assert letters[-1] == 'e' assert letters[1, 3] == ['b', 'd'] (5) assert letters[2..4] == ['C', 'd', 'e'] (6) 1 Access the first element of the list (zero-based counting) 2 Access the last element of the list with a negative index: -1 is the first element from the end of the list 3 Use an assignment to set a new value for the third element of the list 4 Use the << leftShift operator to append an element at the end of the list 5 Access two elements at once, returning a new list containing those two elements 6 Use a range to access a range of values from the list, from a start to an end element position As lists can be heterogeneous in nature, lists can also contain other lists to create multidimensional lists: def multi = [[0, 1], [2, 3]] (1) assert multi[1][0] == 2 (2) 1 Define a list of numbers 2 Access the second element of the top-most list, and the first element of the inner list 8. Arrays Groovy reuses the list notation for arrays, but to make such literals arrays, you need to explicitly define the type of the array through coercion or type declaration. String[] arrStr = ['Ananas', 'Banana', 'Kiwi'] (1) assert arrStr instanceof String[] (2) assert !(arrStr instanceof List) def numArr = [1, 2, 3] as int[] (3) assert numArr instanceof int[] (4) assert numArr.size() == 3 1 Define an array of strings using explicit variable type declaration 2 Assert that we created an array of strings 3 Create an array of ints with the as operator 4 Assert that we created an array of primitive ints You can also create multi-dimensional arrays: def matrix3 = new Integer[3][3] (1) assert matrix3.size() == 3 Integer[][] matrix2 (2) matrix2 = [[1, 2], [3, 4]] assert matrix2 instanceof Integer[][] 1 You can define the bounds of a new array 2 Or declare an array without specifying its bounds Access to elements of an array follows the same notation as for lists: String[] names = ['Cédric', 'Guillaume', 'Jochen', 'Paul'] assert names[0] == 'Cédric' (1) names[2] = 'Blackdrag' (2) assert names[2] == 'Blackdrag' 1 Retrieve the first element of the array 2 Set the value of the third element of the array to a new value 8.1. Java-style array initialization Groovy has always supported literal list/array definitions using square brackets and has avoided Java-style curly braces so as not to conflict with closure definitions. In the case where the curly braces come immediately after an array type declaration however, there is no ambiguity with closure definitions, so Groovy 3 and above support that variant of the Java array initialization expression. Examples: def primes = new int[] {2, 3, 5, 7, 11} assert primes.size() == 5 && primes.sum() == 28 assert primes.class.name == '[I' def pets = new String[] {'cat', 'dog'} assert pets.size() == 2 && pets.sum() == 'catdog' assert pets.class.name == '[Ljava.lang.String;' // traditional Groovy alternative still supported String[] groovyBooks = [ 'Groovy in Action', 'Making Java Groovy' ] assert groovyBooks.every{ it.contains('Groovy') } 9. Maps Sometimes called dictionaries or associative arrays in other languages, Groovy features maps. Maps associate keys to values, separating keys and values with colons, and each key/value pairs with commas, and the whole keys and values surrounded by square brackets. def colors = [red: '#FF0000', green: '#00FF00', blue: '#0000FF'] (1) assert colors['red'] == '#FF0000' (2) assert colors.green == '#00FF00' (3) colors['pink'] = '#FF00FF' (4) colors.yellow = '#FFFF00' (5) assert colors.pink == '#FF00FF' assert colors['yellow'] == '#FFFF00' assert colors instanceof java.util.LinkedHashMap 1 We define a map of string color names, associated with their hexadecimal-coded html colors 2 We use the subscript notation to check the content associated with the red key 3 We can also use the property notation to assert the color green’s hexadecimal representation 4 Similarly, we can use the subscript notation to add a new key/value pair 5 Or the property notation, to add the yellow color When using names for the keys, we actually define string keys in the map. Groovy creates maps that are actually instances of java.util.LinkedHashMap . If you try to access a key which is not present in the map: assert colors.unknown == null def emptyMap = [:] assert emptyMap.anyKey == null You will retrieve a null result. In the examples above, we used string keys, but you can also use values of other types as keys: def numbers = [1: 'one', 2: 'two'] assert numbers[1] == 'one' Here, we used numbers as keys, as numbers can unambiguously be recognized as numbers, so Groovy will not create a string key like in our previous examples. But consider the case you want to pass a variable in lieu of the key, to have the value of that variable become the key: def key = 'name' def person = [key: 'Guillaume'] (1) assert !person.containsKey('name') (2) assert person.containsKey('key') (3) 1 The key associated with the 'Guillaume' name will actually be the "key" string, not the value associated with the key variable 2 The map doesn’t contain the 'name' key 3 Instead, the map contains a 'key' key You can also pass quoted strings as well as keys: ["name": "Guillaume"]. This is mandatory if your key string isn’t a valid identifier, for example if you wanted to create a string key containing a dash like in: ["street-name": "Main street"]. When you need to pass variable values as keys in your map definitions, you must surround the variable or expression with parentheses: person = [(key): 'Guillaume'] (1) assert person.containsKey('name') (2) assert !person.containsKey('key') (3) 1 This time, we surround the key variable with parentheses, to instruct the parser we are passing a variable rather than defining a string key 2 The map does contain the name key 3 But the map doesn’t contain the key key as before Groovy Learn Documentation Download Support Contribute Ecosystem Blog posts About Source code Security Books Thanks Sponsorship FAQ Search Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community The Groovy programming language is supported by the Apache Software Foundation and the Groovy community. Apache, Apache Groovy, Groovy, and the ASF logo are either registered trademarks or trademarks of The Apache Software Foundation. © 2003-2025 the Apache Groovy project — Groovy is Open Source: license , privacy policy .
2026-01-13T09:29:32
https://chromewebstore.google.com/detail/category/detail/volume-master/detail/jetwriter-ai-reply-emails/collection/detail/bettercampus-prev-betterc/cndibmoanboadcifjkjbdpjgfedanolh
Chrome Web Store Skip to main content Chrome Web Store My extensions & themes Developer Dashboard Give feedback Sign in Discover Extensions Themes Welcome to Chrome Web Store Welcome to the Chrome Web Store Supercharge your browser with extensions and themes for Chrome See collection Favorites of 2025 Discover the standout AI extensions that made our year See collection Every day is Earth Day Plant trees, shop sustainably, and more See collection Adobe Photoshop Easily remove backgrounds, adjust colors and more. Plus, get 6 months free access to Photoshop web. 3.7 600K Users See details The future of writing Elevate your writing and create engaging and high-quality content effortlessly See collection 1 / 5 Top categories Shopping Entertainment Tools Art & Design Accessibility Top charts Trending Kami for Google Chrome™ Education 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. BetterCampus (prev. BetterCanvas) Education 4.9 Average rating 4.9 out of 5 stars. Learn more about results and reviews. Read&Write for Google Chrome™ Accessibility 3.4 Average rating 3.4 out of 5 stars. Learn more about results and reviews. See more Popular Volume Master Accessibility 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Free VPN for Chrome - VPN Proxy VeePN Workflow & Planning 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. AdBlock — block ads across the web Workflow & Planning 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. See more New and notable Ad Block Wonder Privacy & Security 4.3 Average rating 4.3 out of 5 stars. Learn more about results and reviews. Smart popup blocker Tools 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Manus AI Browser Operator Tools 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. See more Editors' Picks for you Handpicked by Chrome Editors See collection Extend your browser See more Discover a new level of convenience and customization with side panel extensions Chat with all AI models (Gemini, Claude, DeepSeek…) & AI Agents | AITOPIA 4.9 Average rating 4.9 out of 5 stars. Learn more about results and reviews. AI Agent Marketplace & AI Sidebar with all AI models (Gemini, Claude, DeepSeek & more) and hundreds of AI Agents Adobe Photoshop 3.7 Average rating 3.7 out of 5 stars. Learn more about results and reviews. Easily remove backgrounds, adjust colors and more. Plus, get 6 months free access to Photoshop web. BrowserGPT: ChatGPT Anywhere Powered by GPT 4 4.4 Average rating 4.4 out of 5 stars. Learn more about results and reviews. Write, reword, and translate 8x faster. Reply to emails in a click. Works on Google Docs, Gmail, YouTube, Twitter, Instagram, etc. Sidebar: ChatGPT, Bookmarks, GPT-4o | Meomni 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Ultimate Sidebar ChatGPT Assistant, Bookmarks with AI, Calendar and Tasks Fleeting Notes 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Quick notes from the browser to Obsidian Eclipse your screen Dim the lights with our dark mode selections See collection Chrome monthly spotlight Promising extensions to try out Web Highlights: PDF & Web Highlighter + Notes & AI Summary Productivity Highlighter & Annotation Tool for Websites & PDFs with AI Summary - free, easy to use, no sign-up required. Moonlight: AI Colleague for Research Papers Everything you need to read a paper: explanation, summary, translation, chat, and reference search. Reboost - Track Water Intake and Set Reminders Track your water intake and set custom reminders. Stay hydrated, stay on track, and never miss a break! ✨ YouTube Notes to Notion with Udemy, Coursera, BiliBili and more by Snipo Take YouTube notes directly to Notion, generate AI flashcards, capture screenshots, and sync learning courses with Notion Works with Gmail See more Boost your email productivity Boomerang for Gmail 4.2 Average rating 4.2 out of 5 stars. Learn more about results and reviews. Meeting scheduling and email management tool trusted by millions. Schedule meetings, track responses, send later, and more. Checker Plus for Gmail™ 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Get notifications, read, listen to or delete emails without opening Gmail and easily manage multiple accounts. Email Tracker by Mailtrack® 4.4 Average rating 4.4 out of 5 stars. Learn more about results and reviews. Free, unlimited email tracker for Gmail, trusted by millions. Accurate, reliable, GDPR-compliant, and Google-audited. Streak CRM for Gmail 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Manage sales and customer relationships directly inside Gmail. GMass: Powerful mail merge for Gmail 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. A powerful mass email and mail merge system for Gmail. Just for fun Bring some joy to your browser See collection Learn a new language See more Study while you browse Google Translate 4.2 Average rating 4.2 out of 5 stars. Learn more about results and reviews. View translations easily as you browse the web. By the Google Translate team. Rememberry - Translate and Memorize with Flashcards 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Translate words while browsing and turn them into spaced repetition flashcards to build foreign language vocabulary. DeepL: translate and write with AI 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Translate while you read and write with DeepL Translate, the world’s most accurate translator. Relingo - Master vocabulary while browsing websites and watching YouTube 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Relingo extract words, full-text immersive translation while browsing. Also supports bilingual subtitles for Youtube, Netflix, etc. Readlang Web Reader 4.3 Average rating 4.3 out of 5 stars. Learn more about results and reviews. Read websites in the language you're learning, translate words you don't know, and we'll create flashcards to help you remember. Game on See more Beat boredom with bite-sized games in your browser BattleTabs 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Multiplayer Battles in your New Tab Tiny Tycoon 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Build a tiny tycoon on a tiny planet. Boxel 3D 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Boxel 3D is a speedrunning game packed with challenging levels, custom skins, online multiplayer, and a creative level editor. Ice Dodo 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Play 3D game easily by clicking the little icon at the top right corner of your browser. Boxel Golf 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Boxel Golf is a multiplayer golf game packed with challenging courses, custom hats, and a powerful level builder. Work smarter, not harder with AI Automate tasks and stay focused and organized with AI-powered productivity extensions See collection For music lovers See more Equalizers, radios, playlists, and more Volume Master 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Up to 600% volume boost Music Mode for YouTube™ 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Hides the video and thumbnails on YouTube. Blocks the video keeping only the audio on YouTube Music. Smart Mute 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Listen to audio one tab at a time. Modest Guitar | Columns for Ultimate-Guitar 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Multiple columns and fullscreen for Ultimate-Guitar tabs Chrome Piano 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Play the piano in your browser Google apps About Chrome Web Store Developer Dashboard Privacy Policy Terms of Service Help
2026-01-13T09:29:32
https://www.ecns.cn/hd/2026-01-06/detail-iheyrzrv3835072.shtml
UN Security Council holds emergency meeting on Venezuela --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo UN Security Council holds emergency meeting on Venezuela ( 1 /3) 2026-01-06 11:25:30 Ecns.cn Editor :Zhao Li The UN Security Council holds an emergency meeting on recent situation in Venezuela at UN headquarters in New York, Jan. 5, local time. (Photo: China News Service/Wang Fan) The UN Security Council holds an emergency meeting on recent situation in Venezuela at UN headquarters in New York, Jan. 5, local time. (Photo: China News Service/Wang Fan) The UN Security Council holds an emergency meeting on recent situation in Venezuela at UN headquarters in New York, Jan. 5, local time. (Photo: China News Service/Wang Fan) Previous Next (1) (2) (3) LINE More Photo Maduro pleads not guilty in N.Y. court UN Security Council holds emergency meeting on Venezuela Harbin opens its 42nd Ice and Snow Festival China's Yangtze River remains world's busiest inland waterway by cargo throughput Protest held in New York against U.S. military strikes on Venezuela Venezuelan President Nicolás Maduro transported to Brooklyn detention center ${visuals_2} ${visuals_3} More Video Insights丨Portuguese economist sees stability and opportunity in China’s long-term planning (W.E. Talk) Experts on 2026: China's 15th Five-Year Plan significant for the World (W.E. Talk) Experts look to 2026: Seizing opportunities amid crises, forging ahead after breakthroughs The Awkward Chronicles of Uncle Sam: Claimed Glory, Met Chaos The Dunhuang Flying Dancers in the 1,360°C kiln fire The Awkward Chronicles of Uncle Sam: Tariff Bullying and Backfire ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://www.chinadaily.com.cn/a/202512/15/WS693f9e71a310d6866eb2ea92.html
Workers build giant snowman in Heilongjiang - Chinadaily.com.cn Search HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL WATCHTHIS SPORTS OPINION REGIONAL FORUM NEWSPAPER MOBILE Home China Society Home / China / Society Workers build giant snowman in Heilongjiang Xinhua | Updated: 2025-12-15 13:36 Share Share - WeChat --> CLOSE A drone photo shows workers building a giant snowman at the Qunli music park in Harbin, Northeast China's Heilongjiang province, Dec 14, 2025. This year's giant snowman, 19 meters in height and made with some 3,000 cubic meters of snow, is one meter taller than that of last year. [Photo/Xinhua]   --> 1 2 3 4 Next    >>| --> 1/4 Next Photo LIVE: SCIO briefing on national economic performance of November Breathing new life into lakes Zhejiang banks bet big on high-tech drivers Thrills designed for 'wimps' make giant leap in tourism Geminid meteor shower seen across China Archives detailing crimes of Japanese unit released --> --> Top BACK TO THE TOP English 中文 HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment FOLLOW US Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. -->
2026-01-13T09:29:32
https://ace.atlassian.com#skip-target
Atlassian Community Events Skip to main content Toggle Navigation Events Connect Atlassian Community Events Join a Chapter Community-led Conferences Online Community Connect with Orbiit Learn Community-Led Classes Company User Groups Earn an Atlassian Certification Become a Champion ACE Speakers Find an ACE Speaker Log in Trouble signing in? Our login has changed. Click here for more info! Come together to network, share ideas, solve problems, and get expert tips on your favorite Atlassian products with users near you. Atlassian Community Events From newbie to advanced, Community Events are a great way to meet other customers using the same Atlassian products you do, right in your city. Learn more Trello Events Say 'hello' to Trello! Learn how other users in your community are using Trello at work and in their personal lives and get inspired. Learn more Company User Groups Take your team to the next level. Learn how you can increase product adoption and success in your organization. Learn more © 2026 Atlassian Community Events All Rights Reserved ∙ Events ∙ Contact Us ∙ Privacy Policy ∙ Terms and Conditions ∙ Notice at Collection
2026-01-13T09:29:32
https://www.ecns.cn/hd/2026-01-09/detail-iheyrzrv3840051.shtml
Venezuelan people call on U.S. to release Nicolás Maduro and his wife --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo Venezuelan people call on U.S. to release Nicolás Maduro and his wife ( 1 /3) 2026-01-09 08:58:30 Ecns Editor :Gong Weiwei Supporters of the Venezuelan government hold a rally in Caracas, the capital of Venezuela, calling on the United States to release Nicolás Maduro and his wife Cilia Flores on Jan. 7, 2026. (Photo provided to China News Service) Supporters of the Venezuelan government hold a rally in Caracas, the capital of Venezuela, calling on the United States to release Nicolás Maduro and his wife Cilia Flores on Jan. 7, 2026. (Photo provided to China News Service) Supporters of the Venezuelan government hold a rally in Caracas, the capital of Venezuela, calling on the United States to release Nicolás Maduro and his wife Cilia Flores on Jan. 7, 2026. (Photo provided to China News Service) Previous Next (1) (2) (3) LINE More Photo Exploring world's largest island Greenland Venezuelan people call on U.S. to release Nicolás Maduro and his wife Heavey snow hits Paris 'Southern Snow Town' draws tourists to Guizhou Province Global mayors attend dialogue in NE China on developing ice, snow economy Indonesia welcomes its first locally born giant panda cub ${visuals_2} ${visuals_3} More Video What's it like doing business in China? Check what foreign friends say More than a business hub: check how global merchants thrive in Yiwu Insights | Sanae Takaichi's erroneous remarks a grave 'diplomatic failure': Japanese scholar Insights丨From energy cooperation to industrial co-building: New momentum in Europe-China ties Insights丨China’s economy in UN official’s eyes: Resilience, exports, and high-tech transition Insights丨Portuguese economist sees stability and opportunity in China’s long-term planning ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
http://groovy-lang.org/syntax.html#_string_interpolation
The Apache Groovy programming language - Syntax Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community You are using an outdated browser. Please upgrade your browser to improve your experience. Apache Groovy™ Learn Documentation Download Support Contribute Ecosystem Blog posts Socialize Table of contents 1. Comments 1.1. Single-line comment 1.2. Multiline comment 1.3. Groovydoc comment 1.4. Shebang line 2. Keywords 3. Identifiers 3.1. Normal identifiers 3.2. Quoted identifiers 4. Strings 4.1. Single-quoted string 4.2. String concatenation 4.3. Triple-single-quoted string 4.3.1. Escaping special characters 4.3.2. Unicode escape sequence 4.4. Double-quoted string 4.4.1. String interpolation 4.4.2. Special case of interpolating closure expressions 4.4.3. Interoperability with Java 4.4.4. GString and String hashCodes 4.5. Triple-double-quoted string 4.6. Slashy string 4.6.1. Special cases 4.7. Dollar slashy string 4.8. String summary table 4.9. Characters 5. Numbers 5.1. Integral literals 5.1.1. Alternative non-base 10 representations Binary literal Octal literal Hexadecimal literal 5.2. Decimal literals 5.3. Underscore in literals 5.4. Number type suffixes 5.5. Math operations 5.5.1. The case of the division operator 5.5.2. The case of the power operator 6. Booleans 7. Lists 8. Arrays 8.1. Java-style array initialization 9. Maps Syntax This chapter covers the syntax of the Groovy programming language. The grammar of the language derives from the Java grammar, but enhances it with specific constructs for Groovy, and allows certain simplifications. 1. Comments 1.1. Single-line comment Single-line comments start with // and can be found at any position in the line. The characters following // , until the end of the line, are considered part of the comment. // a standalone single line comment println "hello" // a comment till the end of the line 1.2. Multiline comment A multiline comment starts with /* and can be found at any position in the line. The characters following /* will be considered part of the comment, including new line characters, up to the first */ closing the comment. Multiline comments can thus be put at the end of a statement, or even inside a statement. /* a standalone multiline comment spanning two lines */ println "hello" /* a multiline comment starting at the end of a statement */ println 1 /* one */ + 2 /* two */ 1.3. Groovydoc comment Similarly to multiline comments, Groovydoc comments are multiline, but start with /** and end with */ . Lines following the first Groovydoc comment line can optionally start with a star * . Those comments are associated with: type definitions (classes, interfaces, enums, annotations), fields and properties definitions methods definitions Although the compiler will not complain about Groovydoc comments not being associated with the above language elements, you should prepend those constructs with the comment right before it. /** * A Class description */ class Person { /** the name of the person */ String name /** * Creates a greeting method for a certain person. * * @param otherPerson the person to greet * @return a greeting message */ String greet(String otherPerson) { "Hello ${otherPerson}" } } Groovydoc follows the same conventions as Java’s own Javadoc. So you’ll be able to use the same tags as with Javadoc. In addition, Groovy supports Runtime Groovydoc since 3.0.0, i.e. Groovydoc can be retained at runtime. Runtime Groovydoc is disabled by default. It can be enabled by adding JVM option -Dgroovy.attach.runtime.groovydoc=true The Runtime Groovydoc starts with /**@ and ends with */ , for example: /**@ * Some class groovydoc for Foo */ class Foo { /**@ * Some method groovydoc for bar */ void bar() { } } assert Foo.class.groovydoc.content.contains('Some class groovydoc for Foo') (1) assert Foo.class.getMethod('bar', new Class[0]).groovydoc.content.contains('Some method groovydoc for bar') (2) 1 Get the runtime groovydoc for class Foo 2 Get the runtime groovydoc for method bar 1.4. Shebang line Beside the single-line comment, there is a special line comment, often called the shebang line understood by UNIX systems which allows scripts to be run directly from the command-line, provided you have installed the Groovy distribution and the groovy command is available on the PATH . #!/usr/bin/env groovy println "Hello from the shebang line" The # character must be the first character of the file. Any indentation would yield a compilation error. 2. Keywords Groovy has the following reserved keywords: Table 1. Reserved Keywords abstract assert break case catch class const continue def default do else enum extends final finally for goto if implements import instanceof interface native new null non-sealed package public protected private return static strictfp super switch synchronized this threadsafe throw throws transient try while Of these, const , goto , strictfp , and threadsafe are not currently in use. The reserved keywords can’t in general be used for variable, field and method names. A trick allows methods to be defined having the same name as a keyword by surrounding the name in quotes as shown in the following example: // reserved keywords can be used for method names if quoted def "abstract"() { true } // when calling such methods, the name must be qualified using "this." this.abstract() Using such names might be confusing and is often best to avoid. The trick is primarily intended to enable certain Java integration scenarios and certain DSL scenarios where having "verbs" and "nouns" with the same name as keywords may be desirable. In addition, Groovy has the following contextual keywords: Table 2. Contextual Keywords as in permits record sealed trait var yields These words are only keywords in certain contexts and can be more freely used in some places, in particular for variables, fields and method names. This extra lenience allows using method or variable names that were not keywords in earlier versions of Groovy or are not keywords in Java. Examples are shown here: // contextual keywords can be used for field and variable names def as = true assert as // contextual keywords can be used for method names def in() { true } // when calling such methods, the name only needs to be qualified using "this." in scenarios which would be ambiguous this.in() Groovy programmers familiar with these contextual keywords may still wish to avoid using those names unless there is a good reason to use such a name. The restrictions on reserved keywords also apply for the primitive types, the boolean literals and the null literal (all of which are discussed later): Table 3. Other reserved words null true false boolean char byte short int long float double While not recommended, the same trick as for reserved keywords can be used: def "null"() { true } // not recommended; potentially confusing assert this.null() // must be qualified Using such words as method names is potentially confusing and is often best to avoid, however, it might be useful for certain kinds of DSLs . 3. Identifiers 3.1. Normal identifiers Identifiers start with a letter, a dollar or an underscore. They cannot start with a number. A letter can be in the following ranges: 'a' to 'z' (lowercase ascii letter) 'A' to 'Z' (uppercase ascii letter) '\u00C0' to '\u00D6' '\u00D8' to '\u00F6' '\u00F8' to '\u00FF' '\u0100' to '\uFFFE' Then following characters can contain letters and numbers. Here are a few examples of valid identifiers (here, variable names): def name def item3 def with_underscore def $dollarStart But the following ones are invalid identifiers: def 3tier def a+b def a#b All keywords are also valid identifiers when following a dot: foo.as foo.assert foo.break foo.case foo.catch 3.2. Quoted identifiers Quoted identifiers appear after the dot of a dotted expression. For instance, the name part of the person.name expression can be quoted with person."name" or person.'name' . This is particularly interesting when certain identifiers contain illegal characters that are forbidden by the Java Language Specification, but which are allowed by Groovy when quoted. For example, characters like a dash, a space, an exclamation mark, etc. def map = [:] map."an identifier with a space and double quotes" = "ALLOWED" map.'with-dash-signs-and-single-quotes' = "ALLOWED" assert map."an identifier with a space and double quotes" == "ALLOWED" assert map.'with-dash-signs-and-single-quotes' == "ALLOWED" As we shall see in the following section on strings , Groovy provides different string literals. All kind of strings are actually allowed after the dot: map.'single quote' map."double quote" map.'''triple single quote''' map."""triple double quote""" map./slashy string/ map.$/dollar slashy string/$ There’s a difference between plain character strings and Groovy’s GStrings (interpolated strings), as in that the latter case, the interpolated values are inserted in the final string for evaluating the whole identifier: def firstname = "Homer" map."Simpson-${firstname}" = "Homer Simpson" assert map.'Simpson-Homer' == "Homer Simpson" 4. Strings Text literals are represented in the form of chain of characters called strings. Groovy lets you instantiate java.lang.String objects, as well as GStrings ( groovy.lang.GString ) which are also called interpolated strings in other programming languages. 4.1. Single-quoted string Single-quoted strings are a series of characters surrounded by single quotes: 'a single-quoted string' Single-quoted strings are plain java.lang.String and don’t support interpolation. 4.2. String concatenation All the Groovy strings can be concatenated with the + operator: assert 'ab' == 'a' + 'b' 4.3. Triple-single-quoted string Triple-single-quoted strings are a series of characters surrounded by triplets of single quotes: '''a triple-single-quoted string''' Triple-single-quoted strings are plain java.lang.String and don’t support interpolation. Triple-single-quoted strings may span multiple lines. The content of the string can cross line boundaries without the need to split the string in several pieces and without concatenation or newline escape characters: def aMultilineString = '''line one line two line three''' If your code is indented, for example in the body of the method of a class, your string will contain the whitespace of the indentation. The Groovy Development Kit contains methods for stripping out the indentation with the String#stripIndent() method, and with the String#stripMargin() method that takes a delimiter character to identify the text to remove from the beginning of a string. When creating a string as follows: def startingAndEndingWithANewline = ''' line one line two line three ''' You will notice that the resulting string contains a newline character as first character. It is possible to strip that character by escaping the newline with a backslash: def strippedFirstNewline = '''\ line one line two line three ''' assert !strippedFirstNewline.startsWith('\n') 4.3.1. Escaping special characters You can escape single quotes with the backslash character to avoid terminating the string literal: 'an escaped single quote: \' needs a backslash' And you can escape the escape character itself with a double backslash: 'an escaped escape character: \\ needs a double backslash' Some special characters also use the backslash as escape character: Escape sequence Character \b backspace \f formfeed \n newline \r carriage return \s single space \t tabulation \\ backslash \' single quote within a single-quoted string (and optional for triple-single-quoted and double-quoted strings) \" double quote within a double-quoted string (and optional for triple-double-quoted and single-quoted strings) We’ll see some more escaping details when it comes to other types of strings discussed later. 4.3.2. Unicode escape sequence For characters that are not present on your keyboard, you can use unicode escape sequences: a backslash, followed by 'u', then 4 hexadecimal digits. For example, the Euro currency symbol can be represented with: 'The Euro currency symbol: \u20AC' 4.4. Double-quoted string Double-quoted strings are a series of characters surrounded by double quotes: "a double-quoted string" Double-quoted strings are plain java.lang.String if there’s no interpolated expression, but are groovy.lang.GString instances if interpolation is present. To escape a double quote, you can use the backslash character: "A double quote: \"". 4.4.1. String interpolation Any Groovy expression can be interpolated in all string literals, apart from single and triple-single-quoted strings. Interpolation is the act of replacing a placeholder in the string with its value upon evaluation of the string. The placeholder expressions are surrounded by ${} . The curly braces may be omitted for unambiguous dotted expressions, i.e. we can use just a $ prefix in those cases. If the GString is ever passed to a method taking a String, the expression value inside the placeholder is evaluated to its string representation (by calling toString() on that expression) and the resulting String is passed to the method. Here, we have a string with a placeholder referencing a local variable: def name = 'Guillaume' // a plain string def greeting = "Hello ${name}" assert greeting.toString() == 'Hello Guillaume' Any Groovy expression is valid, as we can see in this example with an arithmetic expression: def sum = "The sum of 2 and 3 equals ${2 + 3}" assert sum.toString() == 'The sum of 2 and 3 equals 5' Not only are expressions allowed in between the ${} placeholder, but so are statements. However, a statement’s value is just null . So if several statements are inserted in that placeholder, the last one should somehow return a meaningful value to be inserted. For instance, "The sum of 1 and 2 is equal to ${def a = 1; def b = 2; a + b}" is supported and works as expected but a good practice is usually to stick to simple expressions inside GString placeholders. In addition to ${} placeholders, we can also use a lone $ sign prefixing a dotted expression: def person = [name: 'Guillaume', age: 36] assert "$person.name is $person.age years old" == 'Guillaume is 36 years old' But only dotted expressions of the form a.b , a.b.c , etc, are valid. Expressions containing parentheses like method calls, curly braces for closures, dots which aren’t part of a property expression or arithmetic operators would be invalid. Given the following variable definition of a number: def number = 3.14 The following statement will throw a groovy.lang.MissingPropertyException because Groovy believes you’re trying to access the toString property of that number, which doesn’t exist: shouldFail(MissingPropertyException) { println "$number.toString()" } You can think of "$number.toString()" as being interpreted by the parser as "${number.toString}()" . Similarly, if the expression is ambiguous, you need to keep the curly braces: String thing = 'treasure' assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by $thing.x" // <= Not allowed: ambiguous!! assert 'The x-coordinate of the treasure is represented by treasure.x' == "The x-coordinate of the $thing is represented by ${thing}.x" // <= Curly braces required If you need to escape the $ or ${} placeholders in a GString so they appear as is without interpolation, you just need to use a \ backslash character to escape the dollar sign: assert '$5' == "\$5" assert '${name}' == "\${name}" 4.4.2. Special case of interpolating closure expressions So far, we’ve seen we could interpolate arbitrary expressions inside the ${} placeholder, but there is a special case and notation for closure expressions. When the placeholder contains an arrow, ${→} , the expression is actually a closure expression — you can think of it as a closure with a dollar prepended in front of it: def sParameterLessClosure = "1 + 2 == ${-> 3}" (1) assert sParameterLessClosure == '1 + 2 == 3' def sOneParamClosure = "1 + 2 == ${ w -> w << 3}" (2) assert sOneParamClosure == '1 + 2 == 3' 1 The closure is a parameterless closure which doesn’t take arguments. 2 Here, the closure takes a single java.io.StringWriter argument, to which you can append content with the << leftShift operator. In either case, both placeholders are embedded closures. In appearance, it looks like a more verbose way of defining expressions to be interpolated, but closures have an interesting advantage over mere expressions: lazy evaluation. Let’s consider the following sample: def number = 1 (1) def eagerGString = "value == ${number}" def lazyGString = "value == ${ -> number }" assert eagerGString == "value == 1" (2) assert lazyGString == "value == 1" (3) number = 2 (4) assert eagerGString == "value == 1" (5) assert lazyGString == "value == 2" (6) 1 We define a number variable containing 1 that we then interpolate within two GStrings, as an expression in eagerGString and as a closure in lazyGString . 2 We expect the resulting string to contain the same string value of 1 for eagerGString . 3 Similarly for lazyGString 4 Then we change the value of the variable to a new number 5 With a plain interpolated expression, the value was actually bound at the time of creation of the GString. 6 But with a closure expression, the closure is called upon each coercion of the GString into String, resulting in an updated string containing the new number value. An embedded closure expression taking more than one parameter will generate an exception at runtime. Only closures with zero or one parameter are allowed. 4.4.3. Interoperability with Java When a method (whether implemented in Java or Groovy) expects a java.lang.String , but we pass a groovy.lang.GString instance, the toString() method of the GString is automatically and transparently called. String takeString(String message) { (4) assert message instanceof String (5) return message } def message = "The message is ${'hello'}" (1) assert message instanceof GString (2) def result = takeString(message) (3) assert result instanceof String assert result == 'The message is hello' 1 We create a GString variable 2 We double-check it’s an instance of the GString 3 We then pass that GString to a method taking a String as parameter 4 The signature of the takeString() method explicitly says its sole parameter is a String 5 We also verify that the parameter is indeed a String and not a GString. 4.4.4. GString and String hashCodes Although interpolated strings can be used in lieu of plain Java strings, they differ with strings in a particular way: their hashCodes are different. Plain Java strings are immutable, whereas the resulting String representation of a GString can vary, depending on its interpolated values. Even for the same resulting string, GStrings and Strings don’t have the same hashCode. assert "one: ${1}".hashCode() != "one: 1".hashCode() GString and Strings having different hashCode values, using GString as Map keys should be avoided, especially if we try to retrieve an associated value with a String instead of a GString. def key = "a" def m = ["${key}": "letter ${key}"] (1) assert m["a"] == null (2) 1 The map is created with an initial pair whose key is a GString 2 When we try to fetch the value with a String key, we will not find it, as Strings and GString have different hashCode values 4.5. Triple-double-quoted string Triple-double-quoted strings behave like double-quoted strings, with the addition that they are multiline, like the triple-single-quoted strings. def name = 'Groovy' def template = """ Dear Mr ${name}, You're the winner of the lottery! Yours sincerly, Dave """ assert template.toString().contains('Groovy') Neither double quotes nor single quotes need be escaped in triple-double-quoted strings. 4.6. Slashy string Beyond the usual quoted strings, Groovy offers slashy strings, which use / as the opening and closing delimiter. Slashy strings are particularly useful for defining regular expressions and patterns, as there is no need to escape backslashes. Example of a slashy string: def fooPattern = /.*foo.*/ assert fooPattern == '.*foo.*' Only forward slashes need to be escaped with a backslash: def escapeSlash = /The character \/ is a forward slash/ assert escapeSlash == 'The character / is a forward slash' Slashy strings are multiline: def multilineSlashy = /one two three/ assert multilineSlashy.contains('\n') Slashy strings can be thought of as just another way to define a GString but with different escaping rules. They hence support interpolation: def color = 'blue' def interpolatedSlashy = /a ${color} car/ assert interpolatedSlashy == 'a blue car' 4.6.1. Special cases An empty slashy string cannot be represented with a double forward slash, as it’s understood by the Groovy parser as a line comment. That’s why the following assert would actually not compile as it would look like a non-terminated statement: assert '' == // As slashy strings were mostly designed to make regexp easier so a few things that are errors in GStrings like $() or $5 will work with slashy strings. Remember that escaping backslashes is not required. An alternative way of thinking of this is that in fact escaping is not supported. The slashy string /\t/ won’t contain a tab but instead a backslash followed by the character 't'. Escaping is only allowed for the slash character, i.e. /\/folder/ will be a slashy string containing '/folder' . A consequence of slash escaping is that a slashy string can’t end with a backslash. Otherwise that will escape the slashy string terminator. You can instead use a special trick, /ends with slash ${'\\'}/ . But best just avoid using a slashy string in such a case. 4.7. Dollar slashy string Dollar slashy strings are multiline GStrings delimited with an opening $/ and a closing /$ . The escaping character is the dollar sign, and it can escape another dollar, or a forward slash. Escaping for the dollar and forward slash characters is only needed where conflicts arise with the special use of those characters. The characters $foo would normally indicate a GString placeholder, so those four characters can be entered into a dollar slashy string by escaping the dollar, i.e. $$foo . Similarly, you will need to escape a dollar slashy closing delimiter if you want it to appear in your string. Here are a few examples: def name = "Guillaume" def date = "April, 1st" def dollarSlashy = $/ Hello $name, today we're ${date}. $ dollar sign $$ escaped dollar sign \ backslash / forward slash $/ escaped forward slash $$$/ escaped opening dollar slashy $/$$ escaped closing dollar slashy /$ assert [ 'Guillaume', 'April, 1st', '$ dollar sign', '$ escaped dollar sign', '\\ backslash', '/ forward slash', '/ escaped forward slash', '$/ escaped opening dollar slashy', '/$ escaped closing dollar slashy' ].every { dollarSlashy.contains(it) } It was created to overcome some of the limitations of the slashy string escaping rules. Use it when its escaping rules suit your string contents (typically if it has some slashes you don’t want to escape). 4.8. String summary table String name String syntax Interpolated Multiline Escape character Single-quoted '…​' \ Triple-single-quoted '''…​''' \ Double-quoted "…​" \ Triple-double-quoted """…​""" \ Slashy /…​/ \ Dollar slashy $/…​/$ $ 4.9. Characters Unlike Java, Groovy doesn’t have an explicit character literal. However, you can be explicit about making a Groovy string an actual character, by three different means: char c1 = 'A' (1) assert c1 instanceof Character def c2 = 'B' as char (2) assert c2 instanceof Character def c3 = (char)'C' (3) assert c3 instanceof Character 1 by being explicit when declaring a variable holding the character by specifying the char type 2 by using type coercion with the as operator 3 by using a cast to char operation The first option 1 is interesting when the character is held in a variable, while the other two ( 2 and 3 ) are more interesting when a char value must be passed as argument of a method call. 5. Numbers Groovy supports different kinds of integral literals and decimal literals, backed by the usual Number types of Java. 5.1. Integral literals The integral literal types are the same as in Java: byte char short int long java.math.BigInteger You can create integral numbers of those types with the following declarations: // primitive types byte b = 1 char c = 2 short s = 3 int i = 4 long l = 5 // infinite precision BigInteger bi = 6 If you use optional typing by using the def keyword, the type of the integral number will vary: it’ll adapt to the capacity of the type that can hold that number. For positive numbers: def a = 1 assert a instanceof Integer // Integer.MAX_VALUE def b = 2147483647 assert b instanceof Integer // Integer.MAX_VALUE + 1 def c = 2147483648 assert c instanceof Long // Long.MAX_VALUE def d = 9223372036854775807 assert d instanceof Long // Long.MAX_VALUE + 1 def e = 9223372036854775808 assert e instanceof BigInteger As well as for negative numbers: def na = -1 assert na instanceof Integer // Integer.MIN_VALUE def nb = -2147483648 assert nb instanceof Integer // Integer.MIN_VALUE - 1 def nc = -2147483649 assert nc instanceof Long // Long.MIN_VALUE def nd = -9223372036854775808 assert nd instanceof Long // Long.MIN_VALUE - 1 def ne = -9223372036854775809 assert ne instanceof BigInteger 5.1.1. Alternative non-base 10 representations Numbers can also be represented in binary, octal, hexadecimal and decimal bases. Binary literal Binary numbers start with a 0b prefix: int xInt = 0b10101111 assert xInt == 175 short xShort = 0b11001001 assert xShort == 201 as short byte xByte = 0b11 assert xByte == 3 as byte long xLong = 0b101101101101 assert xLong == 2925l BigInteger xBigInteger = 0b111100100001 assert xBigInteger == 3873g int xNegativeInt = -0b10101111 assert xNegativeInt == -175 Octal literal Octal numbers are specified in the typical format of 0 followed by octal digits. int xInt = 077 assert xInt == 63 short xShort = 011 assert xShort == 9 as short byte xByte = 032 assert xByte == 26 as byte long xLong = 0246 assert xLong == 166l BigInteger xBigInteger = 01111 assert xBigInteger == 585g int xNegativeInt = -077 assert xNegativeInt == -63 Hexadecimal literal Hexadecimal numbers are specified in the typical format of 0x followed by hex digits. int xInt = 0x77 assert xInt == 119 short xShort = 0xaa assert xShort == 170 as short byte xByte = 0x3a assert xByte == 58 as byte long xLong = 0xffff assert xLong == 65535l BigInteger xBigInteger = 0xaaaa assert xBigInteger == 43690g Double xDouble = new Double('0x1.0p0') assert xDouble == 1.0d int xNegativeInt = -0x77 assert xNegativeInt == -119 5.2. Decimal literals The decimal literal types are the same as in Java: float double java.math.BigDecimal You can create decimal numbers of those types with the following declarations: // primitive types float f = 1.234 double d = 2.345 // infinite precision BigDecimal bd = 3.456 Decimals can use exponents, with the e or E exponent letter, followed by an optional sign, and an integral number representing the exponent: assert 1e3 == 1_000.0 assert 2E4 == 20_000.0 assert 3e+1 == 30.0 assert 4E-2 == 0.04 assert 5e-1 == 0.5 Conveniently for exact decimal number calculations, Groovy chooses java.math.BigDecimal as its decimal number type. In addition, both float and double are supported, but require an explicit type declaration, type coercion or suffix. Even if BigDecimal is the default for decimal numbers, such literals are accepted in methods or closures taking float or double as parameter types. Decimal numbers can’t be represented using a binary, octal or hexadecimal representation. 5.3. Underscore in literals When writing long literal numbers, it’s harder on the eye to figure out how some numbers are grouped together, for example with groups of thousands, of words, etc. By allowing you to place underscore in number literals, it’s easier to spot those groups: long creditCardNumber = 1234_5678_9012_3456L long socialSecurityNumbers = 999_99_9999L double monetaryAmount = 12_345_132.12 long hexBytes = 0xFF_EC_DE_5E long hexWords = 0xFFEC_DE5E long maxLong = 0x7fff_ffff_ffff_ffffL long alsoMaxLong = 9_223_372_036_854_775_807L long bytes = 0b11010010_01101001_10010100_10010010 5.4. Number type suffixes We can force a number (including binary, octals and hexadecimals) to have a specific type by giving a suffix (see table below), either uppercase or lowercase. Type Suffix BigInteger G or g Long L or l Integer I or i BigDecimal G or g Double D or d Float F or f Examples: assert 42I == Integer.valueOf('42') assert 42i == Integer.valueOf('42') // lowercase i more readable assert 123L == Long.valueOf("123") // uppercase L more readable assert 2147483648 == Long.valueOf('2147483648') // Long type used, value too large for an Integer assert 456G == new BigInteger('456') assert 456g == new BigInteger('456') assert 123.45 == new BigDecimal('123.45') // default BigDecimal type used assert .321 == new BigDecimal('.321') assert 1.200065D == Double.valueOf('1.200065') assert 1.234F == Float.valueOf('1.234') assert 1.23E23D == Double.valueOf('1.23E23') assert 0b1111L.class == Long // binary assert 0xFFi.class == Integer // hexadecimal assert 034G.class == BigInteger // octal 5.5. Math operations Although operators are covered in more detail elsewhere, it’s important to discuss the behavior of math operations and what their resulting types are. Division and power binary operations aside (covered below), binary operations between byte , char , short and int result in int binary operations involving long with byte , char , short and int result in long binary operations involving BigInteger and any other integral type result in BigInteger binary operations involving BigDecimal with byte , char , short , int and BigInteger result in BigDecimal binary operations between float , double and BigDecimal result in double binary operations between two BigDecimal result in BigDecimal The following table summarizes those rules: byte char short int long BigInteger float double BigDecimal byte int int int int long BigInteger double double BigDecimal char int int int long BigInteger double double BigDecimal short int int long BigInteger double double BigDecimal int int long BigInteger double double BigDecimal long long BigInteger double double BigDecimal BigInteger BigInteger double double BigDecimal float double double double double double double BigDecimal BigDecimal Thanks to Groovy’s operator overloading, the usual arithmetic operators work as well with BigInteger and BigDecimal , unlike in Java where you have to use explicit methods for operating on those numbers. 5.5.1. The case of the division operator The division operators / (and /= for division and assignment) produce a double result if either operand is a float or double , and a BigDecimal result otherwise (when both operands are any combination of an integral type short , char , byte , int , long , BigInteger or BigDecimal ). BigDecimal division is performed with the divide() method if the division is exact (i.e. yielding a result that can be represented within the bounds of the same precision and scale), or using a MathContext with a precision of the maximum of the two operands' precision plus an extra precision of 10, and a scale of the maximum of 10 and the maximum of the operands' scale. For integer division like in Java, you should use the intdiv() method, as Groovy doesn’t provide a dedicated integer division operator symbol. 5.5.2. The case of the power operator The power operation is represented by the ** operator, with two parameters: the base and the exponent. The result of the power operation depends on its operands, and the result of the operation (in particular if the result can be represented as an integral value). The following rules are used by Groovy’s power operation to determine the resulting type: If the exponent is a decimal value if the result can be represented as an Integer , then return an Integer else if the result can be represented as a Long , then return a Long otherwise return a Double If the exponent is an integral value if the exponent is strictly negative, then return an Integer , Long or Double if the result value fits in that type if the exponent is positive or zero if the base is a BigDecimal , then return a BigDecimal result value if the base is a BigInteger , then return a BigInteger result value if the base is an Integer , then return an Integer if the result value fits in it, otherwise a BigInteger if the base is a Long , then return a Long if the result value fits in it, otherwise a BigInteger We can illustrate those rules with a few examples: // base and exponent are ints and the result can be represented by an Integer assert 2 ** 3 instanceof Integer // 8 assert 10 ** 9 instanceof Integer // 1_000_000_000 // the base is a long, so fit the result in a Long // (although it could have fit in an Integer) assert 5L ** 2 instanceof Long // 25 // the result can't be represented as an Integer or Long, so return a BigInteger assert 100 ** 10 instanceof BigInteger // 10e20 assert 1234 ** 123 instanceof BigInteger // 170515806212727042875... // the base is a BigDecimal and the exponent a negative int // but the result can be represented as an Integer assert 0.5 ** -2 instanceof Integer // 4 // the base is an int, and the exponent a negative float // but again, the result can be represented as an Integer assert 1 ** -0.3f instanceof Integer // 1 // the base is an int, and the exponent a negative int // but the result will be calculated as a Double // (both base and exponent are actually converted to doubles) assert 10 ** -1 instanceof Double // 0.1 // the base is a BigDecimal, and the exponent is an int, so return a BigDecimal assert 1.2 ** 10 instanceof BigDecimal // 6.1917364224 // the base is a float or double, and the exponent is an int // but the result can only be represented as a Double value assert 3.4f ** 5 instanceof Double // 454.35430372146965 assert 5.6d ** 2 instanceof Double // 31.359999999999996 // the exponent is a decimal value // and the result can only be represented as a Double value assert 7.8 ** 1.9 instanceof Double // 49.542708423868476 assert 2 ** 0.1f instanceof Double // 1.0717734636432956 6. Booleans Boolean is a special data type that is used to represent truth values: true and false . Use this data type for simple flags that track true/false conditions . Boolean values can be stored in variables, assigned into fields, just like any other data type: def myBooleanVariable = true boolean untypedBooleanVar = false booleanField = true true and false are the only two primitive boolean values. But more complex boolean expressions can be represented using logical operators . In addition, Groovy has special rules (often referred to as Groovy Truth ) for coercing non-boolean objects to a boolean value. 7. Lists Groovy uses a comma-separated list of values, surrounded by square brackets, to denote lists. Groovy lists are plain JDK java.util.List , as Groovy doesn’t define its own collection classes. The concrete list implementation used when defining list literals are java.util.ArrayList by default, unless you decide to specify otherwise, as we shall see later on. def numbers = [1, 2, 3] (1) assert numbers instanceof List (2) assert numbers.size() == 3 (3) 1 We define a list numbers delimited by commas and surrounded by square brackets, and we assign that list into a variable 2 The list is an instance of Java’s java.util.List interface 3 The size of the list can be queried with the size() method, and shows our list contains 3 elements In the above example, we used a homogeneous list, but you can also create lists containing values of heterogeneous types: def heterogeneous = [1, "a", true] (1) 1 Our list here contains a number, a string and a boolean value We mentioned that by default, list literals are actually instances of java.util.ArrayList , but it is possible to use a different backing type for our lists, thanks to using type coercion with the as operator, or with explicit type declaration for your variables: def arrayList = [1, 2, 3] assert arrayList instanceof java.util.ArrayList def linkedList = [2, 3, 4] as LinkedList (1) assert linkedList instanceof java.util.LinkedList LinkedList otherLinked = [3, 4, 5] (2) assert otherLinked instanceof java.util.LinkedList 1 We use coercion with the as operator to explicitly request a java.util.LinkedList implementation 2 We can say that the variable holding the list literal is of type java.util.LinkedList You can access elements of the list with the [] subscript operator (both for reading and setting values) with positive indices or negative indices to access elements from the end of the list, as well as with ranges, and use the << leftShift operator to append elements to a list: def letters = ['a', 'b', 'c', 'd'] assert letters[0] == 'a' (1) assert letters[1] == 'b' assert letters[-1] == 'd' (2) assert letters[-2] == 'c' letters[2] = 'C' (3) assert letters[2] == 'C' letters << 'e' (4) assert letters[ 4] == 'e' assert letters[-1] == 'e' assert letters[1, 3] == ['b', 'd'] (5) assert letters[2..4] == ['C', 'd', 'e'] (6) 1 Access the first element of the list (zero-based counting) 2 Access the last element of the list with a negative index: -1 is the first element from the end of the list 3 Use an assignment to set a new value for the third element of the list 4 Use the << leftShift operator to append an element at the end of the list 5 Access two elements at once, returning a new list containing those two elements 6 Use a range to access a range of values from the list, from a start to an end element position As lists can be heterogeneous in nature, lists can also contain other lists to create multidimensional lists: def multi = [[0, 1], [2, 3]] (1) assert multi[1][0] == 2 (2) 1 Define a list of numbers 2 Access the second element of the top-most list, and the first element of the inner list 8. Arrays Groovy reuses the list notation for arrays, but to make such literals arrays, you need to explicitly define the type of the array through coercion or type declaration. String[] arrStr = ['Ananas', 'Banana', 'Kiwi'] (1) assert arrStr instanceof String[] (2) assert !(arrStr instanceof List) def numArr = [1, 2, 3] as int[] (3) assert numArr instanceof int[] (4) assert numArr.size() == 3 1 Define an array of strings using explicit variable type declaration 2 Assert that we created an array of strings 3 Create an array of ints with the as operator 4 Assert that we created an array of primitive ints You can also create multi-dimensional arrays: def matrix3 = new Integer[3][3] (1) assert matrix3.size() == 3 Integer[][] matrix2 (2) matrix2 = [[1, 2], [3, 4]] assert matrix2 instanceof Integer[][] 1 You can define the bounds of a new array 2 Or declare an array without specifying its bounds Access to elements of an array follows the same notation as for lists: String[] names = ['Cédric', 'Guillaume', 'Jochen', 'Paul'] assert names[0] == 'Cédric' (1) names[2] = 'Blackdrag' (2) assert names[2] == 'Blackdrag' 1 Retrieve the first element of the array 2 Set the value of the third element of the array to a new value 8.1. Java-style array initialization Groovy has always supported literal list/array definitions using square brackets and has avoided Java-style curly braces so as not to conflict with closure definitions. In the case where the curly braces come immediately after an array type declaration however, there is no ambiguity with closure definitions, so Groovy 3 and above support that variant of the Java array initialization expression. Examples: def primes = new int[] {2, 3, 5, 7, 11} assert primes.size() == 5 && primes.sum() == 28 assert primes.class.name == '[I' def pets = new String[] {'cat', 'dog'} assert pets.size() == 2 && pets.sum() == 'catdog' assert pets.class.name == '[Ljava.lang.String;' // traditional Groovy alternative still supported String[] groovyBooks = [ 'Groovy in Action', 'Making Java Groovy' ] assert groovyBooks.every{ it.contains('Groovy') } 9. Maps Sometimes called dictionaries or associative arrays in other languages, Groovy features maps. Maps associate keys to values, separating keys and values with colons, and each key/value pairs with commas, and the whole keys and values surrounded by square brackets. def colors = [red: '#FF0000', green: '#00FF00', blue: '#0000FF'] (1) assert colors['red'] == '#FF0000' (2) assert colors.green == '#00FF00' (3) colors['pink'] = '#FF00FF' (4) colors.yellow = '#FFFF00' (5) assert colors.pink == '#FF00FF' assert colors['yellow'] == '#FFFF00' assert colors instanceof java.util.LinkedHashMap 1 We define a map of string color names, associated with their hexadecimal-coded html colors 2 We use the subscript notation to check the content associated with the red key 3 We can also use the property notation to assert the color green’s hexadecimal representation 4 Similarly, we can use the subscript notation to add a new key/value pair 5 Or the property notation, to add the yellow color When using names for the keys, we actually define string keys in the map. Groovy creates maps that are actually instances of java.util.LinkedHashMap . If you try to access a key which is not present in the map: assert colors.unknown == null def emptyMap = [:] assert emptyMap.anyKey == null You will retrieve a null result. In the examples above, we used string keys, but you can also use values of other types as keys: def numbers = [1: 'one', 2: 'two'] assert numbers[1] == 'one' Here, we used numbers as keys, as numbers can unambiguously be recognized as numbers, so Groovy will not create a string key like in our previous examples. But consider the case you want to pass a variable in lieu of the key, to have the value of that variable become the key: def key = 'name' def person = [key: 'Guillaume'] (1) assert !person.containsKey('name') (2) assert person.containsKey('key') (3) 1 The key associated with the 'Guillaume' name will actually be the "key" string, not the value associated with the key variable 2 The map doesn’t contain the 'name' key 3 Instead, the map contains a 'key' key You can also pass quoted strings as well as keys: ["name": "Guillaume"]. This is mandatory if your key string isn’t a valid identifier, for example if you wanted to create a string key containing a dash like in: ["street-name": "Main street"]. When you need to pass variable values as keys in your map definitions, you must surround the variable or expression with parentheses: person = [(key): 'Guillaume'] (1) assert person.containsKey('name') (2) assert !person.containsKey('key') (3) 1 This time, we surround the key variable with parentheses, to instruct the parser we are passing a variable rather than defining a string key 2 The map does contain the name key 3 But the map doesn’t contain the key key as before Groovy Learn Documentation Download Support Contribute Ecosystem Blog posts About Source code Security Books Thanks Sponsorship FAQ Search Socialize Discuss on the mailing-list Groovy on X Groovy on Bluesky Groovy on Mastodon Groovy on LinkedIn Events and conferences Source code on GitHub Report issues in Jira Stack Overflow questions Slack Community The Groovy programming language is supported by the Apache Software Foundation and the Groovy community. Apache, Apache Groovy, Groovy, and the ASF logo are either registered trademarks or trademarks of The Apache Software Foundation. © 2003-2025 the Apache Groovy project — Groovy is Open Source: license , privacy policy .
2026-01-13T09:29:32
https://dev.to/web4/the-30-second-social-network-how-one-sentence-replaced-months-of-code-28pg
The 30-Second Social Network: How One Sentence Replaced Months of Code - DEV Community Forem Feed Follow new Subforems to improve your feed DEV Community Follow A space to discuss and keep up software development and manage your software career Future Follow News and discussion of science and technology such as AI, VR, cryptocurrency, quantum computing, and more. Open Forem Follow A general discussion space for the Forem community. If it doesn't have a home elsewhere, it belongs here Gamers Forem Follow An inclusive community for gaming enthusiasts Music Forem Follow From composing and gigging to gear, hot music takes, and everything in between. Vibe Coding Forem Follow Discussing AI software development, and showing off what we're building. Popcorn Movies and TV Follow Movie and TV enthusiasm, criticism and everything in-between. DUMB DEV Community Follow Memes and software development shitposting Design Community Follow Web design, graphic design and everything in-between Security Forem Follow Your central hub for all things security. From ethical hacking and CTFs to GRC and career development, for beginners and pros alike Golf Forem Follow A community of golfers and golfing enthusiasts Crypto Forem Follow A collaborative community for all things Crypto—from Bitcoin to protocol development and DeFi to NFTs and market analysis. Parenting Follow A place for parents to the share the joys, challenges, and wisdom that come from raising kids. We're here for them and for each other. Forem Core Follow Discussing the core forem open source software project — features, bugs, performance, self-hosting. Maker Forem Follow A community for makers, hobbyists, and professionals to discuss Arduino, Raspberry Pi, 3D printing, and much more. HMPL.js Forem Follow For developers using HMPL.js to build fast, lightweight web apps. A space to share projects, ask questions, and discuss server-driven templating Dropdown menu Dropdown menu Skip to content Navigation menu Search Powered by Algolia Search Log in Create account DEV Community Close Add reaction Like Unicorn Exploding Head Raised Hands Fire Jump to Comments Save Boost More... Copy link Copy link Copied to Clipboard Share to X Share to LinkedIn Share to Facebook Share to Mastodon Share Post via... Report Abuse Web4 Posted on Oct 29, 2025           The 30-Second Social Network: How One Sentence Replaced Months of Code # linkspreed # web4 # community # socialmedia The dream of launching your own thriving social network used to be a daunting nightmare. It meant months of complex coding, exorbitant development costs, and the continuous headache of server management. Worse, it often meant total dependency on external tech giants — building your community on borrowed land where the rules could change at any moment. This barrier of time, cost, and complexity has killed countless brilliant community ideas before they ever had a chance to start. That era is officially over. A radical, architecturally revolutionary paradigm shift has occurred, making it not just easier, but an unparalleled, joyful experience to launch a thriving digital community from scratch. The old barriers have been shattered, and the power has been placed directly into the hands of creators. This article reveals the most impactful takeaways from this revolution, showing how you can go from a simple idea to a live social network in less time than it takes to brew a pot of coffee. 2.0 Takeaway 1: The 30-Second Sound Barrier Has Been Broken 1. You Can Launch a Full Social Network in Less Time Than It Takes to Make Coffee The "30-Second Guarantee" from Linkspreed® Web4™ technology isn't a minor improvement — it's a complete transformation of what's possible. It means your idea for a community can become a live, scalable, and fully functional technical infrastructure in under half a minute. This speed redefines the very act of creation. The long, frustrating gap between inspiration and implementation has been completely eliminated. The impact of this velocity is profound — it removes the single greatest barrier to entry for community builders: the initial technical and financial investment . Now, creators can act on their vision instantaneously, test ideas without risk, and focus their energy where it matters most — on the people they want to bring together. Ready to see it in action? Start building your network now . 3.0 Takeaway 2: Your Vision Is the Only Code You Need 2. A Single Sentence Is Now More Powerful Than a Thousand Lines of Code The mechanism behind this 30-second miracle is a powerful yet simple “Single AI Prompt.” To be clear, this requires zero lines of code and zero technical expertise . The only tool you need is a clear vision for your community . You simply provide a single, descriptive sentence that acts as the magical command, instructing the AI to construct the entire network architecture, tailored perfectly to your specific needs. This prompt is the blueprint , the instruction manual , and the “go” command all in one. For instance, consider this prompt: “Create a sophisticated, mobile-first social platform for professional landscape photographers, featuring a private gallery system, integrated payment gateways for online courses, and a geographically filtered job board.” In just 30 seconds , the AI engine executes that command and performs a series of complex tasks that once took entire development teams months to complete: Instant Infrastructure Provisioning: The AI instantaneously sets up the entire backend, frontend, and database architecture, optimized for speed and global scalability. Modular Function Mapping: It automatically generates and seamlessly integrates the complex modules specified in your prompt, like the private gallery system, payment gateways, and geo-filtered job board. Responsive Design & Branding: A beautiful, intuitive design is applied, ensuring a flawless user experience across all devices—from mobile to desktop. Initial Content & Structure: It pre-populates the necessary channels, groups, and even basic terms of service, giving you a functional starting point for content management. The significance of this cannot be overstated. The primary skill required to build a world-class digital community is no longer technical prowess — it is the clarity and power of your vision . You can start transforming your ideas into thriving communities right now on web4.community . 4.0 Takeaway 3: You’re Not a Tenant — You’re the Architect 3. You Reclaim Absolute Sovereignty Over Your Digital World Beyond speed and simplicity, this new paradigm returns something even more valuable: control . The Web4™ concept empowers you to establish a “sovereign node on the internet.” You are no longer a digital tenant building on someone else’s platform, subject to their shifting rules, invasive data policies, and manipulative algorithms. You are the architect and owner of your own digital home. This sovereignty delivers core benefits that are impossible to achieve on traditional platforms: You Set the Rules: Define your own content policies and moderation guidelines to create a safe, productive space that aligns perfectly with your community’s values. You Own the Data: Ensure your members’ data is protected and used to benefit the community itself, not sold to third-party advertisers. You Control the Experience: Eliminate the opaque, manipulative algorithms of Big Tech. Allow content to be prioritized by relevance and genuine community input. You Decide How to Thrive: Choose your own monetization model — be it subscriptions, exclusive content, or ads — without facing punitive platform fees or arbitrary restrictions. This model returns power to the creator, transforming you from a mere user into the master architect of an independent and flourishing digital world . Take back your digital sovereignty today at web4.community . 5.0 Conclusion: The Age of the Community Creator Is Here Building a social network is no longer a technical challenge — it is a purely creative one . This revolution is being led by a pioneering ecosystem designed to empower you. For those ready to build , TribeMaker.space is the ultimate destination for making your “Tribe” a reality, providing intuitive tools to cultivate a deeply engaged community. For those who want to understand the philosophy behind this movement, web4.community is the ideological and technological home of the Web4 revolution — where you can explore the blueprint for a freer, decentralized internet. The old excuses of time, cost, and complexity are gone. You now have the freedom to create something truly wonderful, unique, and eternally your own. Now that the barriers have been completely removed, only one question remains: What community will you build? 👉 Start building yours on web4.community Top comments (0) Subscribe Personal Trusted User Create template Templates let you quickly answer FAQs or store snippets for re-use. Submit Preview Dismiss Code of Conduct • Report abuse Are you sure you want to hide this comment? It will become hidden in your post, but will still be visible via the comment's permalink . Hide child comments as well Confirm For further actions, you may consider blocking this person and/or reporting abuse Web4 Follow Shaping the Future of Web4 with Innovation and Community 🚀 Location Germany Work CEO at Linkspreed Joined Jul 9, 2024 More from Web4 Beyond Blockchain: How Decoupled Identity Aims to End Election Fraud for Good # linkspreed # web4 # uiid # vote The Web4 Revolution: 5 Ways Small AI is Giving Power Back to Online Communities # linkspreed # web4 # ai # mlm Beyond Ads: 5 Powerful Strategies to Build a Profitable Social Network You Actually Own # linkspreed # web4 # community # socialmedia 💎 DEV Diamond Sponsors Thank you to our Diamond Sponsors for supporting the DEV Community Google AI is the official AI Model and Platform Partner of DEV Neon is the official database partner of DEV Algolia is the official search partner of DEV DEV Community — A space to discuss and keep up software development and manage your software career Home DEV++ Podcasts Videos DEV Education Tracks DEV Challenges DEV Help Advertise on DEV DEV Showcase About Contact Free Postgres Database Software comparisons Forem Shop Code of Conduct Privacy Policy Terms of Use Built on Forem — the open source software that powers DEV and other inclusive communities. Made with love and Ruby on Rails . DEV Community © 2016 - 2026. We're a place where coders share, stay up-to-date and grow their careers. Log in Create account
2026-01-13T09:29:32
https://www.chinadaily.com.cn/a/202512/15/WS69400570a310d6866eb2ebdd.html
Hengshan Mountain glistens with iconic winter rime scenery - Chinadaily.com.cn Search HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL WATCHTHIS SPORTS OPINION REGIONAL FORUM NEWSPAPER MOBILE Home China Society Home / China / Society Hengshan Mountain glistens with iconic winter rime scenery By LI MUYUN and ZHU YOUFANG in Changsha | chinadaily.com.cn | Updated: 2025-12-15 20:56 Share Share - WeChat --> CLOSE Hengshan Mountain in Hunan province transformed into a glistening winter paradise this past weekend, with spectacular rime scenery drawing visitors after a recent snowfall. [Photo by Lin Xiyang/for chinadaily.com.cn] Hengshan Mountain in Hunan province transformed into a glistening winter paradise this past weekend, with spectacular rime scenery drawing visitors after a recent snowfall. This renowned mountain, also known as Nanyue, frequently showcases trees adorned with crystal ice formations created by the combination of low temperatures and high humidity. Known as the "Nanyue rime", this phenomenon typically occurs between November and March, gracing the landscape for an average of 63 days each winter season. This winter spectacle has inspired many poets and artists throughout history.   --> 1 2 3 4 5 6 7 8 Next    >>| --> 1/8 Next Photo Symphony of life in Yellow River Delta Workers build giant snowman in Heilongjiang Watch it again: SCIO briefing on national economic performance of November Breathing new life into lakes Zhejiang banks bet big on high-tech drivers Thrills designed for 'wimps' make giant leap in tourism --> Related Stories Hengshan Mountain in Hunan shimmers with first rime of winter Modern agriculture making harvests more fruitful Photographer documents final days of centenarian war heroes Chinese villagers busy with farm work Provinces work to protect crops amid drought --> Top BACK TO THE TOP English 中文 HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment FOLLOW US Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. -->
2026-01-13T09:29:32
https://cloudflare.com/zh-cn/zero-trust/solutions/multi-channel-phishing/
多渠道网络钓鱼 | Zero Trust | Cloudflare 注册 语言 English English (United Kingdom) Deutsch Español (Latinoamérica) Español (España) Français Italiano 日本語 한국어 Polski Português (Brasil) Русский 繁體中文 简体中文 平台 全球连通云 Cloudflare 全球连通云提供 60 多种网络、安全和性能服务。 Enterprisee 适用于中大型组织 小型公司 对于小型组织 合作伙伴 成为 Cloudflare 合作伙伴 用户案例 现代化应用 加速性能 确保应用的可用性 优化网络体验 现代化安全 VPN 替代品 网络钓鱼防护 保护 Web 应用和 API 现代化网络 咖啡店网络 WAN 现代化 简化您的企业网络 CXO 主题 采用 AI 将 AI 融入员工团队与数字体验 AI 安全 保护智能体式 AI 和生成式 AI 应用 数据合规 简化合规并最小化风险 后量子加密技术 保护数据并满足合规标准 行业 医疗保健 银行 零售 游戏 公共部门 资源 产品指南 参考架构 分析师报告 互动 活动 演示 网络研讨会 研讨会 请求演示 产品 产品 工作空间安全 Zero Trust 网络访问 安全 Web 网关 电子邮件安全 云访问安全代理 应用安全 L7 DDoS 防护 Web 应用防火墙 API 安全解决方案 机器人管理 应用性能 CDN DNS 智能路由 Load balancing 网络和 SASE L3/4 DDoS 保护 NaaS / SD- WAN 防火墙即服务 网络互连 计划与价格 Enterprise 计划 小型企业计划 个人计划 比较各项计划 全球服务 支持和 Success 捆绑包 优化的 Cloudflare 体验 专业服务 专家引导部署 技术帐户管理 专注的技术管理 安全运营服务 Cloudflare 监控与响应 域名注册 购买和管理域名 1.1.1.1 免费 DNS 解析器 资源 产品指南 参考架构 分析师报告 产品演示和导览 帮助我选择 开发人员 文档 开发人员图书馆 文档和指南 应用演示 探索您能构建什么 教程 分步构建教程 参考架构 图表和设计模式 产品 人工智能 AI Gateway 观测和控制 AI 应用 Workers AI 在我们的网络上运行 ML 模型 计算 Observability 日志、指标和追踪 Workers 构建和部署无服务器应用 媒体 Images 转换、优化图像 Realtime 构建实时音频和视频应用 存储和数据库 D1 创建无服务器 SQL 数据库 R2 存储数据无需支付昂贵的出口费用 计划与价格 Workers 构建并部署无服务器应用 Workers KV 应用的无服务器键值存储 R2 轻松存储数据,无高昂出口费用 探索项目 客户故事 30 秒 AI 演示 快速入门指南 探索 Workers Playground 构建、测试和部署 开发人员 Discord 加入社区 开始构建 合作伙伴 合作伙伴网络 通过 Cloudflare 发展、创新并满足客户需求 合作伙伴门户 查找资源并注册交易 合作关系类型 PowerUP 计划 发展业务的同时保障客户连接和安全 技术合作伙伴 探索我们的技术合作伙伴和集成生态系统 全球系统集成商 支持无缝的大规模数字化转型 服务提供商 发现我们的重要服务提供商网络 自助服务代理计划 为您的客户管理自助帐户 对等互连门户 为您的网络提供流量洞察 查找合作伙伴 为您的业务赋能 —— 与 Cloudflare Powered+ 合作伙伴携手 资源 互动 演示 + 产品导览 按需产品演示 案例研究 Cloudflare 助力成功 网络研讨会 深入洞察的讨论 研讨会 虚拟论坛 图书馆 实用指南、技术路线图及其他资源 报告 来自 Cloudflare 研究的见解 博客 技术深挖和产品资讯 学习中心 教育工具和操作指南 构建 参考架构 技术指南 解决方案与产品指南 产品文档 文档 开发者文档 探索 theNET 数字企业战略洞察 Cloudflare TV 创新系列和活动 Cloudforce One 威胁研究与运营 Radar 互联网流量和安全趋势 分析师报告 行业研究报告 活动 即将举行的区域活动 信任、隐私和合规 合规信息和政策 支持 联系我们 社区论坛 无法访问帐户? 开发人员 Discord 获取帮助 公司 公司信息 领导力 认识我们的领导团队 投资者关系 投资者信息 媒体中心 探索近期新闻 招聘 探索空缺职位 信任,隐私与安全 隐私 政策、数据和保护 信任 政策、流程和安全 合规性 认证与监管 透明度 政策与披露 公众利益 人道主义 Project Galileo 政府机构 Athenian Project 选举 Cloudflare For Campaigns 健康 Project Fair Shot 全球网络 全球节点和状态 登录 联系销售 电子邮件检测的 Cloudy LLM 摘要 | 阅读博客 > SASE 与工作空间安全 概述 解决方案 产品 资源 定价 利用 Cloudflare 防范多渠道网络钓鱼 实施超越收件箱的分层保护 Cloudflare 全球连通云提供一种自动化、分层的方式,阻止通过电子邮件、短信、社交媒体、即时通讯和其他协作应用传播的网络钓鱼威胁。 联系我们 Cloudflare 的不同之处 低干预、高效率的保护 业界领先的检测能力,近零调优,最大程度减少网络钓鱼风险。 更高程度整合,更低成本 一站式、全集成平台解决所有网络钓鱼用例,帮助降低支出 快速部署,易于管理 立即获得保护,并减少持续管理所需的时间和精力。 工作方式 通过一站式平台实现全面的多渠道防护 利用 Cloudflare 的统一安全平台,首先保护电子邮件,然后启用其他 Zero Trust 服务,将网络钓鱼防护扩展到所有渠道。 阅读解决方案简介 轻松部署和扩展 快速部署电子邮件安全解决方案,以保护这一最关键的通讯渠道,随后根据自身节奏轻松启用多渠道功能。 阻止电子邮件威胁 使用机器学习驱动的上下文分析,自动阻止企业电子邮件破坏(BEC)攻击、恶意附件和其他基于电子邮件的威胁。 防止凭据盗窃导致的泄露 实施条件访问和防网络钓鱼 FIDO2 安全密钥,作为凭据被盗或泄露时的最后防线。 阻止基于欺骗性链接的攻击 保护用户以防使用各种协作应用诱使用户点击巧妙伪装链接的针对性攻击。 Werner Enterprises 利用 Cloudflare 遏制网络钓鱼攻击并整合安全 作为美国最大的整车货运承运商之一,Werner Enterprises 位于世界级供应链解决方案互联联盟的中心。随着网络钓鱼攻击的频率和复杂性不断增加,该公司需要为其庞大且分散的员工队伍加强钓鱼防护。 Werner 部署 Cloudflare Email Security 以保护 Microsoft 365 收件箱,增强对移动和远程用户的保护,并采取更主动的方式来阻止网络钓鱼。该公司不但简化了管理,还成功减少了恶意电子邮件的数量。 “自从实施以来,我们发现用户每天收到的恶意或可疑电子邮件数量减少了 50%。” 准备好阻止多渠道网络钓鱼了吗? 联系我们 分析机构的表彰 在这份邮件安全分析师报告中,Cloudflare 在“当前产品”类别中排名前三 Cloudflare 在“2025 年第二季度 Forrester Wave™:电子邮件、消息传递与协作安全解决方案”报告中被评为“表现卓越者”。我们在 9 项标准中获得了满分(5.0/5.0),包括反恶意软件和沙盒、恶意 URL 检测和Web安全、威胁情报以及内容分析和处理。 报告称: “ 对于希望通过深度内容分析、处理和恶意软件检测能力来增强当前电子邮件、消息传递和协作安全工具的组织来说, Cloudflare是一个可靠的选择。 阅读报告 选择 Cloudflare 的原因 Cloudflare 全球连通云简化多渠道网络钓鱼防护 Cloudflare 的一站式 云原生安全 和连接服务平台应对通过电子邮件、即时通讯、短信、社交媒体和其他协作应用传播的网络钓鱼攻击。 组合式架构 利用广泛的互操作性和定制化来满足全面的安全需求。 性能 使用距离 95% 互联网用户约 50 ms 的全球网络,保护和赋能员工,无论身处何地。 威胁情报 利用通过代理约 20% 网站、每日阻止数以亿计威胁过程中收集的情报,全面阻止各种网络攻击。 同一界面 整合您的工具和工作流程。 资源 Slide 1 of 6 解决方案简介 了解 Cloudflare 如何通过电子邮件安全和 Zero Trust 服务为员工和应用提供全面的网络钓鱼保护。 获取解决方案详情 洞察力 探索如何使用 Cloudflare Email Security 主动防范钓鱼、BEC 和基于链接的攻击。 访问网页 洞察力 识别当前电子邮件防御措施无法阻挡的网络钓鱼攻击——无任何费用,也不会对您的用户造成影响。 申请一次免费评估 解决方案简介 了解 Cloudflare 如何通过应用浏览器隔离保护和控制来降低基于链接的网络钓鱼风险。 下载简介 案例研究 了解 Cloudflare 如何利用基于硬件密钥的多因素认证(MFA),成功挫败一起复杂短信钓鱼攻击。 阅读案例研究 报告 基于 Cloudflare 在一年内处理的大约 130 亿封电子邮件,探索关键的攻击模式。 获取报告 解决方案简介 了解 Cloudflare 如何通过电子邮件安全和 Zero Trust 服务为员工和应用提供全面的网络钓鱼保护。 获取解决方案详情 洞察力 探索如何使用 Cloudflare Email Security 主动防范钓鱼、BEC 和基于链接的攻击。 访问网页 洞察力 识别当前电子邮件防御措施无法阻挡的网络钓鱼攻击——无任何费用,也不会对您的用户造成影响。 申请一次免费评估 解决方案简介 了解 Cloudflare 如何通过应用浏览器隔离保护和控制来降低基于链接的网络钓鱼风险。 下载简介 案例研究 了解 Cloudflare 如何利用基于硬件密钥的多因素认证(MFA),成功挫败一起复杂短信钓鱼攻击。 阅读案例研究 报告 基于 Cloudflare 在一年内处理的大约 130 亿封电子邮件,探索关键的攻击模式。 获取报告 解决方案简介 了解 Cloudflare 如何通过电子邮件安全和 Zero Trust 服务为员工和应用提供全面的网络钓鱼保护。 获取解决方案详情 洞察力 探索如何使用 Cloudflare Email Security 主动防范钓鱼、BEC 和基于链接的攻击。 访问网页 洞察力 识别当前电子邮件防御措施无法阻挡的网络钓鱼攻击——无任何费用,也不会对您的用户造成影响。 申请一次免费评估 解决方案简介 了解 Cloudflare 如何通过应用浏览器隔离保护和控制来降低基于链接的网络钓鱼风险。 下载简介 案例研究 了解 Cloudflare 如何利用基于硬件密钥的多因素认证(MFA),成功挫败一起复杂短信钓鱼攻击。 阅读案例研究 报告 基于 Cloudflare 在一年内处理的大约 130 亿封电子邮件,探索关键的攻击模式。 获取报告 开始使用 Free 计划 小型企业计划 企业级服务 获得推荐 请求演示 联系销售 解决方案 全球连通云 应用程序服务 SASE 和工作空间安全 网络服务 开发人员平台 支持 帮助中心 客户支持 社区论坛 开发人员 Discord 无法访问帐户? Cloudflare 状态 合规性 合规资源 信任 GDPR 负责任的 AI 透明度报告 报告滥用行为 公共利益 Project Galileo Athenian Project Cloudflare for Campaigns Project Fairshot 公司 关于 Cloudflare 网络地图 我们的团队 标识与媒体资料包 多样性、公平性与包容性 影响/ESG © 2026 Cloudflare 公司 隐私政策 使用条款 报告安全问题 信任与安全 Cookie 首选项 商标
2026-01-13T09:29:32
https://wordpress.com/de/support/erstellen-einer-staging-website/
Eine Staging-Website erstellen – Support Produkte Funktionen Ressourcen Tarife Anmelden Jetzt starten Menü WordPress-Hosting WordPress für Agenturen Werde Partner Domainnamen KI-Website-Builder Website-Baukasten Erstelle ein Blog Newsletter Professional E-Mail Webdesign-Service Commerce WordPress Studio WordPress für Unternehmen   Übersicht WordPress Themes WordPress-Plugins WordPress-Vorlagen Google Apps Support-Center WordPress News Firmennamen-Generator Logo Maker Neue Beiträge entdecken Beliebte Schlagwörter Blog-Suche Navigationsmenü schließen Jetzt starten Registrieren Anmelden Über Tarife Produkte WordPress-Hosting WordPress für Agenturen Werde Partner Domainnamen KI-Website-Builder Website-Baukasten Erstelle ein Blog Newsletter Professional E-Mail Webdesign-Service Commerce WordPress Studio WordPress für Unternehmen   Funktionen Übersicht WordPress Themes WordPress-Plugins WordPress-Vorlagen Google Apps Ressourcen Support-Center WordPress News Firmennamen-Generator Logo Maker Neue Beiträge entdecken Beliebte Schlagwörter Blog-Suche Jetpack-App Weitere Informationen Support-Center Anleitungen Kurse Foren Kontakt Suche Support-Center / Anleitungen Support-Center Anleitungen Kurse Foren Kontakt Anleitungen / Konto verwalten / Hosting / Eine Staging-Website erstellen Eine Staging-Website erstellen Mit einer Staging-Website kannst du deine gesamte WordPress.com-Website klonen. Du kannst wichtige Theme- und Plugin-Updates, Inkompatibilitäten oder andere wichtige Änderungen auf der Staging-Website testen, bevor du sie auf deine veröffentlichte Website anwendest. In diesem Ratgeber erfährst du, wie du eine Staging-Website auf WordPress.com erstellen kannst. Diese Funktion ist auf Websites mit den WordPress.com-Tarifen Business und Commerce verfügbar. Wenn du einen Business-Tarif hast, aktiviere ihn unbedingt . Führe für Websites mit Kostenlos-, altem Pro-, Persönlich- und Premium-Tarif ein Tarif-Upgrade durch, um auf diese Funktion zuzugreifen. In diesem Ratgeber Eine Staging-Website erstellen So funktionieren Staging-Websites Auf eine Staging-Website kopierte Daten Zwischen Staging-Website und veröffentlichter Website synchronisieren Das Verhalten von Suchmaschinen anpassen Eine Staging-Website löschen Hast du Fragen? Unseren AI Assistant fragen Zurück nach oben Eine Staging-Website erstellen Eine Staging-Website kann von einem Administrator auf deiner Website erstellt werden. Der Website-Betreiber wird immer als Eigentümer der Staging-Website hinzugefügt, auch wenn die Staging-Website von einem anderen Administrator erstellt wurde. Du kannst für jede aktive Website eine Staging-Website erstellen. Befolge diese Schritte, um eine Staging-Website zu erstellen: Rufe die Website-Liste im Dashboard auf. Klicke in der Liste deiner Websites auf die Website. Klicke oben auf dem Bildschirm auf den Button Staging-Website hinzufügen . Dieser Vorgang kann einige Zeit dauern. Nachdem du deine Staging-Website erstellt hast, hast du mehrere Möglichkeiten, darauf zuzugreifen: Wenn du deine Website-Liste aufrufst, wird deine Staging-Website neben dem Website-Namen mit dem Schlagwort „Staging“ und in der Spalte mit dem Namen des Tarifs als „Staging-Website“ aufgeführt. Wenn du die Hosting-Übersicht deiner aktiven Website aufrufst (indem du in der Website-Liste auf den Website-Titel klickst), kannst du über das Dropdown-Menü neben der Website-Adresse zwischen aktiver Website und Staging-Website wechseln. Wenn du keine Staging-Website erstellen kannst (da möglicherweise der Button zum Erstellen der Website ausgegraut ist), liegt dies in der Regel an einem Verbindungsproblem mit Jetpack. Erfahre, wie du die häufigsten Jetpack-Fehler behebst . So funktionieren Staging-Websites Die Staging-Website ist eine Kopie deiner bestehenden Website, die zu Testzwecken verwendet wird. Du kannst auf der Staging-Website wie auf der aktiven Website Plugins installieren , Themes wechseln und Backups wiederherstellen . Deine neu erstellte Staging-Website ist vollständig von der ursprünglichen Website entkoppelt: Änderungen an einer Website haben keine Auswirkungen auf die andere. Die Adresse (URL) der Staging-Website wird automatisch erstellt, indem der Adresse der aktiven Website „ staging-[vier-zufällige-zeichen] “ vorangestellt wird. Jedes Mal, wenn du eine Staging-Website löschst und eine neue erstellst, ändert sich die zufällige Zeichenfolge mit vier Zeichen, sodass die Staging-URL nicht mehr dieselbe ist. Es ist nicht möglich, diese Adresse zu bearbeiten oder eine individuelle Domain hinzuzufügen, da eine Staging-Website nicht als aktive Website verwendet werden soll. Wenn du eine Kopie deiner Website erstellen möchtest, die für die Öffentlichkeit sichtbar sein soll, befolge stattdessen die Schritte in unserem Ratgeber zum Kopieren einer Website . Außerdem fügen wir die Konstante WP_ENVIRONMENT_TYPE=staging zur Datei wp-config.php hinzu, die einige Plugins ggfs. verwenden, um aktive und Staging-Umgebungen zu unterscheiden. Die Staging-Website bleibt so lange aktiv, wie deine veröffentlichte Website (also deine aktive Website) einen aktiven Tarif aufweist. Die veröffentlichte Website und die Staging-Website teilen sich dieselbe Speicher zuweisung und der Speicherplatz wird hälftig zwischen beiden aufgeteilt. Auf eine Staging-Website kopierte Daten Die folgenden websitespezifischen Daten werden auf deine Staging-Website geklont: Beiträge Seiten Themes Plugins Medien-Uploads Benutzer Konfigurationsoptionen, API-Schlüssel oder Datenbankdaten, die auf deiner Website gespeichert sind. Die folgenden WordPress.com-spezifischen Daten werden nicht zu deiner neuen Website kopiert, da sie websitespezifisch sind: Abonnenten Likes Verbundene SSH-Schlüssel Zwischen Staging-Website und veröffentlichter Website synchronisieren Du kannst Datenbank und Dateisystem zwischen der Staging- und der aktiven Umgebung in beide Richtungen synchronisieren. Dies ist nützlich, wenn du Änderungen an der Staging-Website vorgenommen hast, die du auf deine veröffentlichte Website anwenden möchtest, ohne sie manuell neu zu erstellen. In unserem Ratgeber erfährst du, wie du zwischen der Staging-Website und der aktiven Website synchronisieren kannst . Du musst sowohl Zugriff auf die veröffentlichte als auch auf die Staging-Websites haben, um Änderungen zwischen ihnen synchronisieren zu können. Wenn ein Benutzer Zugriff auf die eine, aber nicht auf die andere hat, solltest du ihn sowohl auf der veröffentlichten als auch auf der Staging-Website als Administrator hinzufügen , damit er Änderungen synchronisieren kann. Das Verhalten von Suchmaschinen anpassen Standardmäßig werden Suchmaschinen daran gehindert, die Staging-Website zu indexieren. Dieses Verhalten kann jedoch mit einer individuellen robots.txt -Datei überschrieben werden, die im Stammordner deiner Website abgelegt wird. Eine Staging-Website löschen Befolge diese Schritte, um deine Staging-Website zu entfernen: Rufe die Website-Liste im Dashboard auf. Klicke in der Liste deiner Websites auf den Titel der Staging-Website Navigiere zum Tab Einstellungen . Scrolle nach unten zum Ende der Seite und klicke auf den Button Löschen . Nachdem du eine Staging-Website gelöscht hast, kannst du jederzeit eine neue erstellen. Die neue Staging-Website wird immer als neuer Klon deiner aktuellen veröffentlichten Website gestartet.  Bewerten: Verwandte Ratgeber Zwischen der Staging-Website und der aktiven Website synchronisieren 5 Min. Lesezeit Wechseln der PHP-Version 1 Min. Lesezeit Website-Cache löschen 3 Min. Lesezeit Wähle einen WordPress-Host 8 Min. Lesezeit In diesem Ratgeber Eine Staging-Website erstellen So funktionieren Staging-Websites Auf eine Staging-Website kopierte Daten Zwischen Staging-Website und veröffentlichter Website synchronisieren Das Verhalten von Suchmaschinen anpassen Eine Staging-Website löschen Hast du Fragen? Unseren AI Assistant fragen Zurück nach oben Du konntest nicht finden, was du brauchst? Kontaktiere uns Erhalte Antworten von unserem AI Assistant, der rund um die Uhr professionellen Support für kostenpflichtige Tarife bietet. Eine Frage in unserem Forum stellen Durchsuche Fragen und erhalte Antworten von anderen erfahrenen Benutzern. Copied to clipboard! WordPress.com Produkte WordPress-Hosting WordPress für Agenturen Werde Partner Domainnamen KI-Website-Builder Website-Baukasten Erstelle ein Blog Professional E-Mail Webdesign-Service WordPress Studio WordPress für Unternehmen Funktionen Übersicht WordPress Themes WordPress-Plugins WordPress-Vorlagen Google Apps Ressourcen WordPress.com-Blog Firmennamen-Generator Logo Maker WordPress.com-Reader Barrierefreiheit Abonnements kündigen Hilfe Support-Center Anleitungen Kurse Foren Kontakt Ressourcen für Entwickler Firma Über Presse Geschäftsbedingungen Datenschutzerklärung Meine persönlichen Informationen nicht verkaufen oder weitergeben Datenschutzhinweis für Benutzer in Kalifornien Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English Mobil-Apps Herunterladen im App Store Herunterladen im Google Play Social Media WordPress.com auf Facebook WordPress.com auf X (Twitter) WordPress.com auf Instagram WordPress.com auf YouTube Automattic Automattic Arbeite für uns   Kommentare werden geladen …   Verfasse einen Kommentar … E-Mail Name Website Support Registrieren Anmelden Kurzlink kopieren Melde diesen Inhalt Abonnements verwalten
2026-01-13T09:29:32
https://cloudflare.com/en-gb/ai-solution/
Artificial intelligence (AI) solutions | Cloudflare Sign up Languages English English (United Kingdom) Deutsch Español (Latinoamérica) Español (España) Français Italiano 日本語 한국어 Polski Português (Brasil) Русский 繁體中文 简体中文 Platform Connectivity cloud Cloudflare’s connectivity cloud delivers 60+ networking, security, and performance services. Enterprise For large and medium organizations Small business For small organizations Partner Become a Cloudflare partner use cases Modernize applications Accelerate performance Ensure app availability Optimize web experience Modernize security VPN replacement Phishing protection Secure web apps and APIs Modernize networks Coffee shop networking WAN modernization Simplify your corporate network CxO topics Adopt AI Bring AI into workforces and digital experiences AI security Secure agentic AI and GenAI applications Data compliance Streamline compliance and minimize risk Post-quantum cryptography Safeguard data and meet compliance standards Industries Healthcare Banking Retail Gaming Public sector Resources Product guides Reference architectures Analyst reports Engage Events Demos Webinars Workshops Request a demo Products products Workspace security Zero trust network access Secure web gateway Email security Cloud access security broker Application security L7 DDoS protection Web application firewall API security Bot management Application performance CDN DNS Smart routing Load balancing Networking and SASE L3/4 DDoS protection NaaS / SD-WAN Firewall-as-a-service Network Interconnect plans & pricing Enterprise plans Small business plans Individual plans Compare plans Global services Support and success bundles Optimized Cloudflare experience Professional services Expert-led implementation Technical account management Focused technical management Security operations service Cloudflare monitoring and response Domain registration Buy and manage domains 1.1.1.1 Free DNS resolver Resources Product guides Reference architectures Analyst reports Product demos and tours Help me choose Developers documentation Developer library Documentation and guides Application demos Explore what you can build Tutorials Step-by-step build tutorials Reference architecture Diagrams and design patterns Products Artificial Intelligence AI Gateway Observe, control AI apps Workers AI Run ML models on our network Compute Observability Logs, metrics, and traces Workers Build, deploy serverless apps Media Images Transform, optimize images Realtime Build real-time audio/video apps Storage & database D1 Create serverless SQL databases R2 Store data without costly egress fees Plans & Pricing Workers Build and deploy serverless apps Workers KV Serverless key-value store for apps R2 Store data without costly egrees fees Explore projects Customer stories AI Demo in 30 seconds Quick guide to get started Explore Workers Playground Build, test, and deploy Developers Discord Join the community Start building Partners Partner Network Grow, innovate and meet customer needs with Cloudflare Partner Portal Find resources and register deals Partnership Types PowerUP Program Grow your business while keeping your customers connected and secure Technology Partners Explore our ecosystem of technology partners and integrators Global System Integrators Support seamless large-scale digital transformation Service Providers Discover our network of valued service providers Self-serve agency program Manage Self-Serve Accounts for your clients Peer-to-peer portal Traffic insights for your network Find a partner PowerUP your business - connect with Cloudflare Powered+ partners. Resources Engage Demos + product tours On-demand product demos Case studies Driving success with Cloudflare Webinars Insightful discussions Workshops Virtual forums Library Helpful guides, roadmaps, and more Reports Insights from Cloudflare’s research Blog Technical deep dives and product news Learning center Educational tools and how-to content Build Reference architecture Technical guides Solution + product guides Product documentation Documentation Developer documentation Explore theNET Executive insights for the digital enterprise Cloudflare TV Innovative series and events Cloudforce One Threat research and operations Radar Internet traffic and security trends Analyst reports Industry research reports Events Upcoming regional events Trust, privacy, and compliance Compliance information and policies Support Contact us Community forum Lost account access? Developers Discord Get help Company Company info Leadership Meet our leaders Investor relations Investor information Press Explore recent news Careers Explore open roles Trust, Privacy, & Safety Privacy Policy, data, and protection Trust Policy, process, and safety Compliance Certification and regulation Transparency Policy and disclosures Public Interest Humanitarian Project Galileo Government Athenian Project Elections Cloudflare For Campaigns Health Project Fair Shot Global network Global locations and status Log in Contact sales Accelerate your AI journey You’ve got your AI vision. Cloudflare’s unified security, connectivity, and developer platform helps you execute on that vision with greater speed and security. Request a consultation PROBLEM Complexity diminishes AI impact Organizations have ambitious AI goals. But many projects are held back by slow development, scaling issues, and new kinds of risk. Slow AI development Complex toolchains and a constantly shifting tech landscape hinder AI innovation. Challenging AI scaling Global user bases, usage spikes, and inflexible compute costs hold back AI growth. Growing AI risk Limited visibility, complex risk management, and poor data governance limit AI’s impact, including with AI-generated code. SOLUTION Cloudflare is your single point of AI control Cloudflare’s connectivity cloud lets organizations build AI applications, connect and scale AI apps, and protect their entire AI lifecycle from a single global platform. Build AI Secure AI Key AI needs Faster innovation Build AI applications with greater speed, lower costs, and increased agility — no matter the AI model. Global scale Deliver reliable, fast experiences across complex AI stacks and global user bases. Built-in security Understand and manage AI risk without getting lost in dashboards or constant policy updates. Ebook: The enterprise guide to securing and scaling AI Learn why enterprises struggle to meaningfully build and secure AI infrastructure at scale, why hyperscalers’ AI infrastructure often falls short, and how to overcome those struggles. Read ebook Global leaders, including 30% of the Fortune 1000, rely on Cloudflare Ready to have a conversation with a specialist? Request a consultation HOW IT WORKS A unified platform of AI security, connectivity, and developer services Cloudflare’s AI services are built to run anywhere in our 330+ city global network — and are already used by 80% of the top 50 generative AI companies. Build Build full-stack AI applications with access to 50+ AI models across our global network. Build and run agents without paying for wait time. Learn more Connect Control and observe AI-powered apps, while reducing inference costs and dynamically routing traffic. Build MCP servers that run across our global network Learn more Protect Extend visibility, mitigate risk, and protect data across the AI lifecycle. Control how AI crawlers can access your web content. Learn more Cloudflare helps Indeed discover and manage shadow AI use Indeed, a leading job site, wanted better insight into and control over the AI applications their workforce used. They turned to Cloudflare’s AI security suite , which helps discover AI usage patterns and enforce data use policies. Now, Indeed is on the road to achieving the right balance of innovation and control. “Cloudflare helps us find what shadow AI risks exist and block unsanctioned AI apps and chatbots.” GETTING STARTED Free plans Small business plans For enterprises Get a recommendation Request a demo Contact sales SOLUTIONS Connectivity cloud Application services SASE and workspace security Network services Developer platform SUPPORT Help center Customer support Community forum Developers Discord Lost account access? Cloudflare status COMPLIANCE Compliance resources Trust GDPR Responsible AI Transparency report Report abuse PUBLIC INTEREST Project Galileo Athenian Project Cloudflare for Campaigns Project Fairshot COMPANY About Cloudflare Network map Our team Logos & press kit Diversity, equity, & inclusion Impact/ESG © 2026 Cloudflare, Inc. Privacy Policy Terms of Use Report Security Issues Cookie Preferences Trademark
2026-01-13T09:29:32
https://developer.wordpress.com/docs/developer-tools/github-deployments/
Use GitHub deployments on WordPress.com – WordPress.com Support Products Features Resources Plans & Pricing Log in Get started Menu WordPress Hosting WordPress for Agencies Become an Affiliate Domain Names AI Website Builder Website Builder Create a Blog Newsletter Professional Email Website Design Services Commerce WordPress Studio Enterprise WordPress   Overview WordPress Themes WordPress Plugins WordPress Patterns Google Apps Support Center WordPress News Business Name Generator Logo Maker Discover New Posts Popular Tags Blog Search Close the navigation menu Get started Sign up Log in About Plans & Pricing Products WordPress Hosting WordPress for Agencies Become an Affiliate Domain Names AI Website Builder Website Builder Create a Blog Newsletter Professional Email Website Design Services Commerce WordPress Studio Enterprise WordPress   Features Overview WordPress Themes WordPress Plugins WordPress Patterns Google Apps Resources Support Center WordPress News Business Name Generator Logo Maker Discover New Posts Popular Tags Blog Search Jetpack App Learn more Support Center Guides Courses Forums Contact Search Support Center / Guides Support Center Guides Courses Forums Contact Guides / Plugins and tools / Tools / Use GitHub deployments on WordPress.com Use GitHub deployments on WordPress.com Last reviewed on November 6, 2025 GitHub Deployments integrates your GitHub repositories directly with your WordPress.com site, giving you a version-controlled, automated workflow for deploying plugins, themes, or complete site changes. This guide covers the setup process and how to manage your connected repositories. This feature is available on sites with the WordPress.com  Business and Commerce plans . If you have a Business plan, make sure to  activate it . For free sites and sites on the Personal and Premium plans, upgrade your plan to access this feature. In this guide Video tutorial Connect a repository Manage deployment settings Advanced deployment Deploy your code Manage existing connections Deployment run logs Disconnect a repository Disconnect WordPress.com from GitHub Have a question? Ask our AI assistant Back to top Video tutorial Connect a repository Before you can deploy a GitHub repository to your WordPress.com site, you’ll first need to set up the connection between the two using the following steps: Visit your Sites page: https://wordpress.com/sites/ Click the name of your site to view the site overview. Click on the Deployments tab. Click the “ Connect repository ” button. Then, if you see repositories listed, you have already connected your GitHub account. Continue to step 11. Click the “ Install the WordPress.com app ” button. A new window will open, and you will be prompted to log into your GitHub account if you haven’t already done so. Then you’ll see this screen: Click the “ Authorize WordPress.com for Developers ” button. Select the GitHub organization or account where your repository is located. Select which repository/repositories you’d like to connect: All repositories: Selecting this option will grant WordPress.com access to all current and future repositories owned by the selected GitHub account. This includes public repositories that are read-only. Only select repositories: Selecting this option will allow you to choose which repositories WordPress.com can access on the selected GitHub account.  Once you’ve selected an option, click the Install button. The new window will close, and you will be taken back to WordPress.com. Your selected repository/repositories should be listed along with the GitHub account associated with that repository: Click Select next to the repository you wish to connect. At this point, you should see WordPress.com for Developers under your Authorized GitHub Apps and Installed GitHub Apps . Manage deployment settings Once you select a repository, you will need to adjust the deployment settings: Deployment branch: Defaults to the default branch of the repository (typically main ) but can be changed to the branch you wish to use. Destination directory: The server folder where you want to deploy the files. For plugins, it will be /wp-content/plugins/my-plugin-name . For themes, it will be /wp-content/themes/my-theme-name . For a partial site deployment (i.e., multiple plugins or themes), you can use /wp-content . The contents of a repository will be merged with the existing contents of the WordPress site in the specified directory. Automatic deployments: There are two ways you can deploy to WordPress.com: Automatic: Once the code is committed, it will be deployed to your WordPress.com site. Automatic deployments are recommended for staging sites. Manual: The code will be deployed once you request a deployment . Manual deployments are recommended for production sites. Deployment mode: There are two types of deployments: Simple: This mode will copy all files from a branch of the repository to the site and deploy them with no post-processing. Advanced: With this mode, you can use a workflow script, enabling custom build steps such as installing Composer dependencies, conducting pre-deployment code testing, and controlling file deployment. Ideal for repositories that need Composer or Node software. See Advanced Deployment below for more information . Once all settings have been configured, click the Connect button. Your repository will be added: Note that you must trigger the first deployment, either automatically or manually . You can then connect another repository at any time by clicking the “ Connect repository ” button. Advanced deployment With Advanced Deployment, you can provide a workflow script to process files in your repository before deployment. This opens up many possibilities, such as checking your code to ensure it meets your team’s coding standards, running unit tests, excluding files from the deployment, installing dependencies, and much more. To get started, check out our workflow recipes . To set up Advanced Deployment: A form will appear where you can configure the deployment. Click the repository’s name to manage the connection. On the right side, under “ Pick your deployment mode “, choose Advanced . If the repository already contains a workflow file, you can select it here. The system will check the file for any errors. If no errors are found, proceed to step 7. You can also select the “ Create new workflow ” option to add a preconfigured workflow file. Choosing this option will overwrite the wpcom.yml workflow file if it already exists in your repository. Click the “ Install workflow for me ” button to commit the workflow file to the repository. Once a workflow has been added and verified, click Update . Your repository will now use advanced deployment. Deploy your code After connecting your GitHub repository to a site, the next step is actually deploying your code. There are two deployment methods available: Automatic and Manual . Automatic deployments are not recommended for live production sites, as any code changes in the repository are automatically deployed from GitHub to the live site. Instead, consider setting up automatic deployment to a staging site and syncing it to production once you’re ready. Manual deployments give you more control over when your code changes are pushed live, as you will manually need to trigger each deployment. We recommend manual deployments if you don’t want to use a staging site. To manually trigger a deployment: Visit your Sites page: https://wordpress.com/sites/ Click the name of your site to view the site overview. Click on the Deployments tab. Click the ellipsis menu (⋮) on the repository you wish to deploy. Choose “ Trigger manual deployment “. You should see a banner notification that says, “Deployment run created,” and the deployment status will change to “Queued.” Wait for the deployment to complete (the status will change to “Deployed”). Click the ellipsis menu (⋮) again and choose “ See deployment runs “.  The Deployment run log displays the Author and the deployed commit. If you click the deployment run entry, you can view more information. Manage existing connections To manage your existing GitHub repository connections: Visit your Sites page: https://wordpress.com/sites/ Click the name of your site to view the site overview. Click on the Deployments tab. You should then see the connections list.  The connection list is shown if there is at least one connection between a GitHub repository and your site. The list includes relevant information for each connection, such as the repository name and branch, the last commit that was deployed to a site, when it happened, where the code was placed, how long the deployment run took, and its status. There are additional actions available after clicking the ellipsis menu (⋮): Trigger manual deployment: Starts a deployment run on the latest commit of the configured branch. See deployment runs: Opens the deployment run logs view for the connected repository. Configure connection: Opens the manage connection view for the repository. Disconnect repository: Removes the connection between the repository and the site. Deployment run logs Deployment run logs provide a detailed, step-by-step record of each deployment, whether triggered automatically or manually. These logs help you track changes, monitor deployment status, and troubleshoot any issues that arise. With access to logs from the last 10 runs within 30 days, you can easily review what happened during each deployment and ensure everything is running smoothly. To check the logs of a deployment: Visit your Sites page: https://wordpress.com/sites/ Click the name of your site to view the site overview. Click on the Deployments tab. Click the ellipsis menu (⋮) next to the repository you want to view logs for. Select “ See deployment runs “. The  Deployment runs   list view shows commits that were deployed to the site, the deployment status, the date, and the duration. Click anywhere on a run to expand and view more information about the deployment. The logs provide a record of all executed commands, from fetching code from GitHub to placing it in the target directory. You can expand log lines to see more information by clicking “ show more “. Disconnect a repository When you disconnect a GitHub repository from your site, any future changes to the repository will no longer impact your site. By default, the deployed files remain on your site, but you have the option to remove them during the disconnection process. To remove a repository: Visit your Sites page: https://wordpress.com/sites/ Click the name of your site to view the site overview. Click on the Deployments tab. Click the ellipsis menu (⋮) on the repository. Select “ Disconnect repository “. A dialog window will appear. Click the switch to remove associated files from the site. Click “ Disconnect repository ” to close the dialog and disconnect the repository. Note that WordPress.com for Developers will still appear in your Installed GitHub Apps and your Authorized GitHub Apps . This is because WordPress.com still has access to the repository, but the connection has been deleted. Disconnect WordPress.com from GitHub You may also choose to revoke WordPress.com’s access to your GitHub account. You can do so at any time by visiting your Applications settings  on GitHub.  To revoke authorized app access to your GitHub account: Go to  Authorized GitHub Apps . Click  Revoke  next to  WordPress.com for Developers . Click the “ I understand, revoke access ” button. Even if you revoke authorized app access, code can still be deployed because the WordPress.com for Developers app remains installed on the selected accounts. To revoke access to the WordPress.com installation and disable the ability to deploy code to your WordPress.com site: Go to  Installed GitHub Apps . Click  Configure  next to  WordPress.com for Developers . In the  Danger zone  area, click  Uninstall , then click  OK  when prompted. Removing WordPress.com from the list of authorized apps  does not  mean that the repositories will be deleted or stop working; your repositories will still exist on GitHub after you revoke WordPress.com’s access, but WordPress.com will no longer be able to deploy code. Was this guide helpful for you? Yay Nay Not quite what you're looking for? Get Help! Get Help What can we do to make this guide more helpful? (Optional) This form is not monitored for support. Need support? Get help here . Get help here. Related guides Workflow recipes for GitHub Deployments 3 min read Troubleshooting GitHub Deployments 2 min read View your site’s activity 3 min read Use SFTP on WordPress.com 3 min read In this guide Video tutorial Connect a repository Manage deployment settings Advanced deployment Deploy your code Manage existing connections Deployment run logs Disconnect a repository Disconnect WordPress.com from GitHub Have a question? Ask our AI assistant Back to top Couldn't find what you needed? Contact us Get answers from our AI assistant, with access to 24/7 expert human support on paid plans. Ask a question in our forum Browse questions and get answers from other experienced users. Copied to clipboard! WordPress.com Products WordPress Hosting WordPress for Agencies Become an Affiliate Domain Names AI Website Builder Website Builder Create a Blog Professional Email Website Design Services WordPress Studio Enterprise WordPress Features Overview WordPress Themes WordPress Plugins WordPress Patterns Google Apps Resources WordPress.com Blog Business Name Generator Logo Maker WordPress.com Reader Accessibility Remove Subscriptions Help Support Center Guides Courses Forums Contact Developer Resources Company About Press Terms of Service Privacy Policy Do Not Sell or Share My Personal Information Privacy Notice for California Users Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English Mobile Apps Download on the App Store Get it on Google Play Social Media WordPress.com on Facebook WordPress.com on X (Twitter) WordPress.com on Instagram WordPress.com on YouTube Automattic Automattic Work With Us   Loading Comments...   Write a Comment... Email Name Website
2026-01-13T09:29:32
https://www.ecns.cn/video/
Video --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Video --> The Source Keeper Season 3 | Episode 1: The Whispers of Mountains and Rivers 2026.01.13 10:47 Comicomment: Wings clipped, Latin America left to suffer 2026.01.12 17:14 A surreal start of 2026: When one president seizes another, next target — Greenland 2026.01.12 15:58 Comicomment: No country has the right to act as the world's police 2026.01.09 17:03 What's it like doing business in China? Check what foreign friends say 2026.01.08 10:46 More than a business hub: check how global merchants thrive in Yiwu 2026.01.07 13:40 Comicomment: Save or Slave? Hegemony at play 2026.01.07 13:01 Insights | Sanae Takaichi's erroneous remarks a grave 'diplomatic failure': Japanese scholar 2026.01.07 10:13 Insights丨From energy cooperation to industrial co-building: New momentum in Europe-China ties 2026.01.07 09:14 Insights丨China’s economy in UN official’s eyes: Resilience, exports, and high-tech transition 2026.01.06 13:58 Insights丨Portuguese economist sees stability and opportunity in China’s long-term planning 2026.01.05 16:20 (W.E. Talk) Experts on 2026: China's 15th Five-Year Plan significant for the World 2026.01.02 08:41 (W.E. Talk) Experts look to 2026: Seizing opportunities amid crises, forging ahead after breakthroughs 2026.01.01 10:00 The Awkward Chronicles of Uncle Sam: Claimed Glory, Met Chaos 2026.01.01 08:09 The Dunhuang Flying Dancers in the 1,360°C kiln fire 2025.12.31 22:22 The Awkward Chronicles of Uncle Sam: Tariff Bullying and Backfire 2025.12.31 18:24 (W.E. Talk) Experts' review on 2025: China serves as a stabilizing force in a world of turmoil and chaos 2025.12.31 18:12 End of 2025: How the 'kill line' shatters the American Dream 2025.12.31 17:06 China's 2025 New Frontiers in three minutes 2025.12.30 19:32 Insights | UN expert: China's AI factories showcase manufacturing strength 2025.12.30 18:34 Tech at Its Best! Yiwu's small commodities win over global merchants with real strength 2025.12.24 14:08 Insights | Russian scholar: Japan's rising militarism has deep roots for long time 2025.12.17 16:13 China Q&A | How will China advance people-centered sci-tech development during the 15th Five-Year Plan period? 2025.12.17 10:01 SCO Deputy Secretary-General:Tianjin Summit sets direction for next decade 2025.12.16 15:28 HKSAR security chief comments on conviction of Jimmy Lai 2025.12.16 09:09 Insights | Former Belarusian Deputy PM: China's development path ensures capital serves the people 2025.12.15 10:27 (W.E. Talk) Takaichi's erroneous remarks on Taiwan imply three hidden motives: expert 2025.12.14 18:15 (W.E. Talk) Japanese PM Takaichi's wrong remarks on Taiwan 'dangerously divisive': David Gosset 2025.12.14 18:15 Insights | Global affair expert: Takaichi's remarks on Taiwan show she tries to ignore the past 2025.12.11 15:43 This is Qinghai 2025.12.11 14:52 --> First Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 Next Last Most popular in 24h More Top news Greenland says U.S. takeover unacceptable 'under any circumstances' China files over 200,000 satellite frequency, orbit applications with ITU John Ross: China's 14th Five-Year Plan has enabled a qualitative breakthrough and reshaped its relationship with the world economy China's Tianma-1000 cargo drone able to deliver 1 metric ton of supplies to plateau  China bans medical institutions from offering funeral services in crackdown on sector abuses More Photo China's commercial recoverable spacecraft completes test flight South Korea's ex-President Yoon Suk Yeol faces sentencing in insurrection trial LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://www.chinadaily.com.cn/a/202601/07/WS695e0ba2a310d6866eb327c9.html
Through the Seasons invites reflection and renewal - Chinadaily.com.cn Search HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL WATCHTHIS SPORTS OPINION REGIONAL FORUM NEWSPAPER MOBILE Home Culture Art Home / Culture / Art Through the Seasons invites reflection and renewal By Lin Qi | chinadaily.com.cn | Updated: 2026-01-07 15:30 Share Share - WeChat --> CLOSE Works by artists specializing in four areas — landscape, flower-and-bird, figure, and oil painting — are on display at the Beijing Fine Art Academy. [Photo provided to chinadaily.com.cn] As artists consider new directions at the start of a new year, they also reflect on what they have achieved so far. Through the Seasons , an ongoing exhibition at the Art Museum of Beijing Fine Art Academy, provides such an opportunity for both artists and visitors to examine creative approaches and works made in recent years. Running until Jan 25, the show gathers the works of resident artists working at the academy's four studios — landscape, flower-and-bird, figure, and oil painting. Here, meticulous brushwork intertwines with freehand expression, while realism coexists with more expressive styles. Through this interconnection, artists invite people to explore the world of forms, the vastness of artistic conception, and feel the emotional resonance that touches minds and souls.   --> 1 2 3 4 5 6 Next    >>| --> 1/6 Next Photo Eyeing China's high-tech vision Polished inbound tourism sector sparkles brightly again Colombian commentator: US the real pirates of the Caribbean Residents rebuild lives a year after Xizang quake New Year holiday sees strong growth in travel, consumption Tracking Chinese cultural frontline in 2025 --> Related Stories Where a city shaped art Video: Leaping into the dark Heritage crafts find new life A sweeping portrait of China's vast northwest Painted petals fan centuries of grace --> Top BACK TO THE TOP English 中文 HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment FOLLOW US Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. -->
2026-01-13T09:29:32
https://cloudflare.com/es-es/banking-and-financial-services/
Transformación digital en los servicios bancarios y financieros | Cloudflare Me interesa Idiomas English English (United Kingdom) Deutsch Español (Latinoamérica) Español (España) Français Italiano 日本語 한국어 Polski Português (Brasil) Русский 繁體中文 简体中文 Plataforma Conectividad cloud La conectividad cloud de Cloudflare ofrece más de 60 servicios de red, seguridad y rendimiento. Enterprise Para grandes y medianas empresas Pequeña empresa Para pequeñas empresas Socio ¡Hazte socio de Cloudflare! Casos de uso Moderniza tus aplicaciones Acelera el rendimiento Protege la disponibilidad de tus aplicaciones Optimiza tu experiencia web Moderniza tu seguridad Reemplaza tu VPN Protégete contra el phishing Protege las aplicaciones web y las API Moderniza tus redes Modelo de "red de cafetería" Moderniza tu WAN Simplifica tu red corporativa Temas para directivos Adopta la IA Integra la IA en los equipos de trabajo y las experiencias digitales Seguridad de la IA Protección de aplicaciones de IA agéntica e IA generativa Conformidad de los datos Mejora la conformidad y minimiza el riesgo. Criptografía poscuántica Protege los datos y cumple con las normas de conformidad. Sectores Servicios sanitarios Banca Minoristas Videojuegos Sector público Recursos Guías de producto Arquitecturas de referencia Informes de analistas Participa Eventos Demostraciones Seminarios web Talleres Solicita una demo Productos Productos Seguridad en el espacio de trabajo Acceso a la red Zero Trust Puerta de enlace web segura Seguridad del correo electrónico Agente de seguridad de acceso a la nube Seguridad para aplicaciones Protección DDoS de capa 7 Firewall de aplicaciones web Seguridad de la API Gestión de bots Rendimiento de aplicaciones CDN DNS Enrutamiento inteligente Load balancing Redes y SASE Protección DDoS de capas 3 y 4 NaaS/SD-WAN Firewall como servicio Interconexión de redes planes y precios Planes Enterprise Planes para pequeñas empresas Planes individuales Comparar planes Servicios globales Paquetes de soporte y éxito Experiencia optimizada de Cloudflare Servicios profesionales Implementación guiada por expertos Gestión técnica de cuentas Gestión técnica focalizada Servicio de operaciones de seguridad Supervisión y respuesta de Cloudflare Registro de dominios Compra y gestión de dominios 1.1.1.1 Resolución DNS gratuita Recursos Guías de producto Arquitecturas de referencia Informes de analistas Demos y recorridos de productos Ayúdame a elegir Desarrolladores Documentación Biblioteca para desarrolladores Documentación y guías Demos de aplicaciones Explora lo que puedes desarrollar Tutoriales Tutoriales de creación paso a paso Arquitectura de referencia Diagramas y patrones de diseño Productos Inteligencia artificial AI Gateway Observa y controla las aplicaciones de IA Workers AI Ejecuta modelos de aprendizaje automático en nuestra red Procesos Observability Registros, métricas y rastreos Workers Desarrolla e implementa aplicaciones sin servidor Contenido multimedia Images Transforma y optimiza imágenes Realtime Crea aplicaciones de audio y vídeo en tiempo real Almacenamiento y base de datos D1 Desarrolla bases de datos SQL sin servidor R2 Almacena datos sin costosas tarifas de salida Planes y precios Workers Desarrolla e implementa aplicaciones sin servidor Workers KV Almacén de pares clave-valor sin servidor para aplicaciones R2 Almacena datos sin costosas tarifas de salida Descubre proyectos Historias de nuestros clientes Demo de IA en 30 segundos Guía rápida para empezar Descubre Workers Playground Crea, prueba e implementa Discord para desarrolladores Únete a la comunidad Empezar Socios Red de socios Crece, innova y satisface las necesidades de los clientes con Cloudflare Portal de socios Encuentra recursos y registra acuerdos Tipos de socios Programa PowerUP Impulsa el crecimiento de tu negocio mientras garantizas la conexión y la protección de tus usuarios Socios tecnológicos Explora nuestro ecosistema de socios e integradores tecnológicos Integradores de sistemas globales Impulsa una transformación digital eficaz a gran escala Proveedores de servicios Descubre nuestra red de valiosos proveedores de servicios Programa de autoservicio para agencias Gestiona las cuentas de autoservicio de tus clientes Portal punto a punto Información sobre el tráfico de tu red Encontrar socio Saca el máximo partido a tu negocio - Conecta con los socios de Cloudflare Powered+. Recursos Participa Demos y recorridos por los productos Demostraciones de productos bajo demanda Casos prácticos Cloudflare, la clave del éxito Seminarios web Debates interesantes Talleres Foros virtuales Biblioteca Guías útiles, hojas de ruta y mucho más Informes Información a partir de las investigaciones de Cloudflare Blog Análisis técnicos y novedades de productos Centro de aprendizaje Herramientas educativas y contenido práctico Desarrolla Arquitectura de referencia Guías técnicas Guías de soluciones y productos Documentación de productos Documentación Documentación para desarrolladores Explora theNET Información estratégica para empresas digitales Cloudflare TV Series y eventos innovadores Cloudforce One Investigaciones y operaciones sobre amenazas Radar Tendencias del tráfico y la seguridad en Internet Informes de analistas Informes de estudios del sector Eventos Próximos eventos regionales Confianza, privacidad y conformidad Información y políticas de conformidad Soporte Te ayudamos Foro de la comunidad ¿Has perdido el acceso a tu cuenta? Discord para desarrolladores Te ayudamos Empresa información de la empresa Liderazgo Conoce a nuestros líderes Relaciones con inversores Información para inversores Prensa Consulta noticias recientes Empleo Consulta los puestos disponibles confianza, privacidad y seguridad Privacidad Política, datos y protección Confianza Política, proceso y seguridad Cumplimiento Certificación y regulación Transparencia Política y divulgaciones Interés público Asistencia humanitaria Proyecto Galileo Sector público Proyecto Athenian Elecciones Cloudflare For Campaigns Salud Project Fair Shot Red global Ubicaciones globales y estado Iniciar sesión Contacta con Ventas Proteger la modernización digital de los bancos globales Con Cloudflare, los bancos pueden proporcionar experiencias digitales seguras y fluidas, al mismo tiempo que cumplen con los requisitos relacionados con la soberanía de datos, el cumplimiento normativo y la resiliencia, impulsando así la innovación y la eficiencia operativa. Regístrate para la demostración Resumen de la solución Seguridad mejorada en un panorama de amenazas más amplio Cloudflare proporciona una eficaz protección contra las amenazas emergentes, como las vulnerabilidades web, de las API y de red, con encriptación de última generación, así como con capacidades basadas en IA para la detección y respuesta a las amenazas. Desarrollo de aplicaciones modernas e innovación en la nube Impulsa la modernización digital gracias al desarrollo seguro de aplicaciones en la nube y la incorporación de IA avanzada y aprendizaje automático para mejorar las experiencias de los clientes. Resiliencia y rendimiento a gran escala Garantiza la resiliencia y el rendimiento de la red con alta prioridad y un alcance global, al mismo tiempo que cumples con los requisitos de soberanía de datos , para una mejor experiencia de los clientes. Cumplimiento simplificado de la normativa Responde a los requisitos relacionados con las normativas a nivel mundial, como PCI, RGPD, DORA y NIS2, a fin de garantizar la conformidad, al mismo tiempo que proteges los datos confidenciales y garantizas la eficiencia operativa. Transforma la banca con soluciones digitales seguras, escalables y conformes a la normativa Protección contra las amenazas de ciberseguridad emergentes Los bancos afrontan un panorama de amenazas en evolución y demandas normativas más estrictas. La información avanzada sobre amenazas y la información en tiempo real han ayudado a los bancos a proteger proactivamente sus activos digitales. Servimos y analizamos el 20 % del tráfico web global, por lo que disponemos de una visibilidad inigualable. Esto nos permite bloquear cientos de miles de millones de amenazas al día y proteger tus entornos. Además, te ayudamos a proteger los vectores de fuga más comunes, deteniendo el ransomware, el phishing y shadow IT con nuestra seguridad Zero Trust así como los ataques a la cadena de suministro o a las aplicaciones web con encriptación de última generación y protección contra DDoS y en el lado del cliente. Más información Impulsa la innovación con el desarrollo de aplicaciones modernas en la nube Acelera el futuro y la innovación digitales con el desarrollo de aplicaciones modernas en la nube. Integra de forma segura la IA, el aprendizaje automático y el análisis de los macrodatos en sus operaciones, impulsando servicios personalizados y procesos optimizados. Moderniza los sistemas esenciales y lanza nuestros productos financieros (p. ej., carteras digitales) para mejorar el interés de los clientes en todas las interacciones. Más información Resiliencia, rendimiento y alcance global inigualables Garantiza la resiliencia y un rendimiento optimizado de tus operaciones con una capacidad de red de 280 Tb/s y conexiones de baja latencia (a unos 50 ms del 95 % de los usuarios de Internet). Proporciona redundancia global con nuestro enrutamiento de red anycast, que permite que varios servidores ejecuten todos nuestros servicios al mismo tiempo que comparten la misma dirección ID y enrutan las solicitudes al servidor más cercano. Admite requisitos de proveedor dual con nuestra configuración activo/en espera multiproveedor para la protección del tráfico de red en la capa 3. Este punto fuerte de la red garantiza un servicio coherente y fiable (incluso durante los picos de tráfico) para una experiencia sin interrupciones de los clientes. Más información Aborda el cumplimiento normativo a nivel mundial Cumple las normativas fundamentales como PCI DSS 4.0, RGPD, DORA y NIS2. Un enfoque de seguridad Zero Trust garantiza una verificación de identidad continua y estrictos controles de acceso, mientras que la seguridad de las aplicaciones, la encriptación eficiente y el enmascaramiento de datos protegen la información confidencial. Te ayudamos a prepararte para las auditorías, a minimizar el riesgo y a garantizar el cumplimiento normativo sin problemas. Más información Aumenta la fidelización de los clientes, reduce el riesgo y mejora los tiempos de respuesta con la conectividad cloud de Cloudflare 49 % Aumenta hasta un 49 % la fidelización de clientes gracias al rendimiento de las aplicaciones 1 . 50 % Reduce hasta un 50 % los riesgos relacionados con las políticas y la conformidad normativa 2 . 75 % Acelera hasta un 75 % los tiempos de respuesta a los ataques DDoS 3 . Reconocimientos de analistas Cloudflare ha sido reconocido en Gartner® Magic Quadrant™ for SSE Creemos que este reconocimiento evidencia la arquitectura "filial ligera, nube pesada" de Cloudflare y su capacidad para ayudar a las empresas globales, orientadas a la nube, a acelerar la modernización de sus redes. Leer informe Cloudflare, reconocida como empresa líder en el informe The Forrester Wave™: Edge Development Platforms, 4º trimestre de 2023 Forrester Research, Inc evaluó los proveedores más importantes en el mercado de plataformas para desarrolladores en el perímetro en función de 33 categorías, entre ellas, experiencia del desarrollador, seguridad y flexibilidad y transparencia de precios. Leer informe Cloudflare es reconocida empresa líder en el informe "2024 GigaOm Radar for CDN" Cloudflare ha sido reconocida como líder y empresa con un rendimiento sobresaliente en el informe "2024 GigaOm Radar for CDN". El informe GigaOm Radar evaluó 19 soluciones de proveedores en una serie de anillos concéntricos, en los que las empresas más cercanas al centro se consideraron de mayor valor global. Leer informe SoFi combate con éxito el tráfico malicioso gracias a Cloudflare En 2018, el equipo de seguridad de SoFi afrontaba constantemente amenazas de ciberataques, por lo que empezaron a buscar un firewall de aplicaciones web (WAF). Querían una solución fácil de usar que no solo bloqueara el tráfico malicioso sino que conforme surgían nuevas amenazas también mejorara sus conocimientos con el tiempo. Con el WAF de Cloudflare, los ingenieros de SoFi pudieron desarrollar e implementar casi al instante conjuntos de reglas granulares y reducir más del 60 % el tráfico malicioso, con un índice de falsos positivos realmente bajo. "Lo más sorprendente fue que el uso del WAF de Cloudflare era muy fácil e intuitivo. Nuestros ingenieros alcanzaron la máxima productividad en muy poco tiempo. Cloudflare solucionó en horas los problemas que otros proveedores tardaban días en resolver. Ahora hemos empezado a usar otros productos de la oferta de Cloudflare. La integración con todas sus soluciones ha sido rápida y sin contratiempos". 35 % de las empresas de la lista Fortune 500 confían en nosotros Ver todos los casos prácticos Primeros pasos con Cloudflare Nuestros expertos te ayudarán a elegir la solución más adecuada para tu negocio. Te ayudamos Regístrate para la demostración Fuentes: TechValidate by Survey Monkey, un estudio TechValidate sobre Cloudflare Ibid Ibid CÓMO EMPEZAR Planes gratuitos Planes para pequeñas empresas Para empresas Sugerencias Solicita una demostración Contactar con ventas SOLUCIONES Conectividad cloud Servicios para aplicaciones SASE y seguridad en el espacio de trabajo Servicios de red Plataforma para desarrolladores SOPORTE Centro de ayuda Atención al cliente Foro de la comunidad Discord para desarrolladores ¿Has perdido el acceso a tu cuenta? Estado de Cloudflare CONFORMIDAD Recursos de conformidad Confianza RGPD IA responsable Informe de transparencia Notificar abuso INTERÉS PÚBLICO Proyecto Galileo Proyecto Athenian Cloudflare for Campaigns Project Fair Shot EMPRESA Acerca de Cloudflare Mapa de red Nuestro equipo Logotipos y dossier de prensa Diversidad, equidad e inclusión Impact/ESG © 2026 Cloudflare, Inc. Política de privacidad Condiciones de uso Informar sobre problemas de seguridad Confianza y seguridad Preferencias de cookies Marca
2026-01-13T09:29:32
https://wordpress.com/de/support/auf-wordpress-com-mit-ssh-verbinden/
Auf WordPress.com mit SSH verbinden – Support Produkte Funktionen Ressourcen Tarife Anmelden Jetzt starten Menü WordPress-Hosting WordPress für Agenturen Werde Partner Domainnamen KI-Website-Builder Website-Baukasten Erstelle ein Blog Newsletter Professional E-Mail Webdesign-Service Commerce WordPress Studio WordPress für Unternehmen   Übersicht WordPress Themes WordPress-Plugins WordPress-Vorlagen Google Apps Support-Center WordPress News Firmennamen-Generator Logo Maker Neue Beiträge entdecken Beliebte Schlagwörter Blog-Suche Navigationsmenü schließen Jetzt starten Registrieren Anmelden Über Tarife Produkte WordPress-Hosting WordPress für Agenturen Werde Partner Domainnamen KI-Website-Builder Website-Baukasten Erstelle ein Blog Newsletter Professional E-Mail Webdesign-Service Commerce WordPress Studio WordPress für Unternehmen   Funktionen Übersicht WordPress Themes WordPress-Plugins WordPress-Vorlagen Google Apps Ressourcen Support-Center WordPress News Firmennamen-Generator Logo Maker Neue Beiträge entdecken Beliebte Schlagwörter Blog-Suche Jetpack-App Weitere Informationen Support-Center Anleitungen Kurse Foren Kontakt Suche Support-Center / Anleitungen Support-Center Anleitungen Kurse Foren Kontakt Anleitungen / Konto verwalten / Hosting / Auf WordPress.com mit SSH verbinden Auf WordPress.com mit SSH verbinden SSH oder Secure Shell ist ein Protokoll, mit dem man eine Verbindung zu Diensten wie Webservern herstellen kann. Damit kannst du dich mit unseren Servern verbinden und deine WordPress.com-Website über Befehlszeilen-Tools wie WP-CLI verwalten. Diese Funktion ist auf Websites mit dem WordPress.com Business- oder dem E-Commerce-Tarif verfügbar. In diesem Ratgeber WordPress.com SSH-Anmeldedaten erhalten und SSH aktivieren Ein SSH-Passwort zurücksetzen Mit SSH verbinden Verbinden mit SSH unter MacOS und Linux Verbinden von SSH unter Windows SSH-Schlüssel Hinzufügen eines SSH-Schlüssels zu deinem Konto Verbinden eines bestehenden SSH-Schlüssels mit einer Website Trennen der Verbindung eines Schlüssels mit einer Website Aktualisieren eines bestehenden SSH-Schlüssels Entfernen eines bestehenden SSH-Schlüssels Verwenden von Shell-Befehlen Verwenden der WP-CLI Verwalten von Themes und Plugins mit WP-CLI Überspringen von Themes und Plugins mit WP-CLI Weitere WP-CLI-Ressourcen Was ist, wenn etwas schiefläuft? Häufig gestellte Fragen Kann ich Support für die Verwendung von Befehlszeilentools erhalten? Sind alle Befehle verfügbar? Kann ich mein eigenes SSH-Passwort festlegen? Hast du Fragen? Unseren AI Assistant fragen Zurück nach oben WordPress.com SSH-Anmeldedaten erhalten und SSH aktivieren Wenn du zum ersten Mal auf SSH zugreifst, musst du deine Anmeldedaten erstellen und SSH-Zugriff aktivieren: Navigiere im WordPress.com- Dashboard deiner Website zu Einstellungen → Hosting-Konfiguration , um die SSH-Optionen deiner Website aufzurufen. Klicke bei Aufforderung auf Anmeldedaten erstellen . Durch diesen einmaligen Vorgang werden der SSH-Benutzername und das Passwort für die ausgewählte Website generiert. Die Anmeldedaten werden sowohl für SFTP- als auch für SSH-Verbindungen verwendet. Bewahre das Passwort an einem sicheren Ort auf. Solltest du es verlieren oder vergessen, kannst du mit dem Button Passwort zurücksetzen ein neues generieren. Suche den Abschnitt SSH Access (SSH-Zugriff) und aktiviere die Option Aktiviere SSH-Zugriff für diese Website . SSH-Zugriff ist standardmäßig deaktiviert. Sobald SSH-Zugriff aktiviert wurde, wird ein Verbindungsbefehl angezeigt. Dieser kann kopiert und in eine Terminalanwendung eingefügt werden. Weitere Informationen dazu, wie du über SSH auf deine Website zugreifen kannst, findest du in unserer Anleitung Mit SSH verbinden . Ein SSH-Passwort zurücksetzen Wenn du dein SFTP/SSH-Passwort vergisst oder verlierst, kannst du es unter Einstellungen → Hosting-Konfiguration zurücksetzen. Klicke im Abschnitt mit den SFTP-/SSH-Anmeldedaten auf Passwort zurücksetzen . Mit SSH verbinden Für den Zugriff auf deine Website über SSH benötigst du deinen SSH-Benutzernamen, dein Passwort und ein Terminalprogramm. Es folgt eine Anleitung, wie du über einige der gängigsten Programme eine Verbindung herstellen kannst. Verbinden mit SSH unter MacOS und Linux Öffne das Terminalprogramm deines Computers. Rufe unter MacOS auf deinem Computer Programme → Dienstprogramme auf und öffne die Terminalanwendung. Für Linux findest du in der Dokumentation zu deiner Distribution weitere Informationen zum Öffnen eines Terminalfensters. In einigen Versionen wird das Terminalprogramm auch als Shell, Konsole oder Eingabeaufforderung bezeichnet. Navigiere im WordPress.com- Dashboard deiner Website zu Einstellungen → Hosting-Konfiguration , um die SSH-Optionen deiner Website aufzurufen. Achte darauf, dass auf der Seite Hosting-Konfiguration SSH-Zugriff aktiviert ist, und kopiere den SSH -Befehl, der für deine Website angegeben ist, z. B. ssh example.wordpress.com@sftp.wp.com . Füge den SSH -Befehl in deine Terminalanwendung ein oder gib diesen ein und drücke die EINGABETASTE. Wenn du zum ersten Mal eine Verbindung herstellst, wird möglicherweise angezeigt, dass dein Terminal die Authentizität des Hosts nicht feststellen kann. Gib „Yes“ (Ja) ein und drücke die EINGABETASTE, um fortzufahren. Du solltest nun von deinem Terminal zur Eingabe eines Passworts aufgefordert werden. Füge das SSH-Passwort ein, das du bei der Erstellung deiner SSH-Anmeldedaten angegeben hast, oder gib es ein und drücke die EINGABETASTE. Beachte, dass bei der Eingabe deines Passworts in deine Terminalanwendung die Zeichen bei der Eingabe nicht angezeigt werden. Das ist normal. Wenn du dein SSH-Passwort vergessen oder verloren hast, kannst du es zurücksetzen . War der Vorgang erfolgreich, solltest du nun mit SSH verbunden sein und Shell- und WP-CLI-Befehle ausführen können. Verbinden von SSH unter Windows Neuere Windows-Versionen, beginnend mit 10, verfügen über SSH-Unterstützung über das Windows-Subsystem für Linux sowie den OpenSSH-Client. Informationen zur Verwendung dieser Methoden findest du in der offiziellen Dokumentation von Microsoft. Eine weitere Option, die sowohl mit aktuellen als auch mit älteren Windows-Versionen genutzt werden kann, ist PuTTY. Lade den kostenlosen PuTTY-Client herunter und installiere diesen. Starte PuTTY, konfiguriere die Einstellungen für Hostname und Port und klicke auf Open (Öffnen). Der Hostname sollte sftp.wp.com lauten. Der Port sollte auf 22 festgelegt sein. PuTTY-SSH-Client für Windows Wenn du zum ersten Mal eine Verbindung herstellst, wirst du möglicherweise aufgefordert, dem RSA2-Fingerabdruck und dem Host zu vertrauen. Klicke auf Yes (Ja). PuTTY öffnet daraufhin einen Terminal-Bildschirm. Gib deinen SSH-Benutzernamen ein und drücke die EINGABETASTE. Gib bei Aufforderung dein SSH-Passwort ein. War der Vorgang erfolgreich, solltest du nun mit SSH verbunden sein und Shell- und WP-CLI-Befehle ausführen können. SSH-Schlüssel Die folgende Anleitung zeigt dir, wie du einen SSH-Schlüssel zu deinem WordPress.com-Konto hinzufügst. Wichtig ist, dass du zuerst den SSH-Schlüssel zu deinem Konto hinzufügst und dann den SSH-Schlüssel mit allen Websites verbindest, für die du ihn verwenden möchtest. Wenn du keinen SSH-Schlüssel auf deinem Computer hast, kannst du die Verbindung zu SSH auch über die Passwortauthentifizierung herstellen. Hinzufügen eines SSH-Schlüssels zu deinem Konto Bevor du deinen SSH-Schlüssel zu deinem WordPress.com-Konto hinzufügst, musst du ihn in deine Zwischenablage kopieren. Dazu hast du mit deinem Computerterminal zwei Möglichkeiten: Mac pbcopy < ~/.ssh/id_rsa.pub Windows clip < ~/.ssh/id_rsa.pub Linux cat ~/.ssh/id_rsa.pub Wenn deine öffentliche SSH-Schlüsseldatei einen anderen Namen als den oben genannten hat, bearbeite den Code so, dass er mit dem Dateinamen auf deinem Computer übereinstimmt. Nachdem du deinen öffentlichen SSH-Schlüssel in deine Zwischenablage kopiert hast, kannst du ihn mit diesen Schritten zu deinem Konto hinzufügen: Navigiere in deinem WordPress.com- Dashboard zu Mein Profil . Klicke auf der Seite „Mein Profil“ auf Sicherheit . Klicke in der Sicherheits-Checkliste auf die Option SSH-Schlüssel . Füge deinen SSH-Schlüssel in das Feld Public SSH Key (Öffentlicher SSH-Schlüssel) ein. Klicke auf den Button SSH-Schlüssel speichern . Sobald du deinen SSH-Schlüssel zu deinem WordPress.com-Konto hinzugefügt hast, musst du ihn an jede Website anhängen, auf der du ihn verwenden möchtest. Verbinden eines bestehenden SSH-Schlüssels mit einer Website Nachdem du einen SSH-Schlüssel zu deinem Konto hinzugefügt hast, musst du ihn an die Website anhängen, mit der du dich über SSH verbinden möchtest. Gehe folgendermaßen vor, um deinen SSH-Schlüssel an eine Website anzuhängen: Navigiere im WordPress.com- Dashboard zu Einstellungen → Hosting-Konfiguration . Verwende im Abschnitt SSH-Zugriff das Feld SSH-Schlüssel , um den gewünschten Schlüssel auszuwählen. Klicke auf den Button SSH-Schlüssel mit der Website verbinden . Sobald dein SSH-Schlüssel mit der Website verbunden ist, kannst du den SSH-Schlüssel bei der Authentifizierung über SSH verwenden. Trennen der Verbindung eines Schlüssels mit einer Website Wenn du dich nicht länger mit deinem SSH-Schlüssel mit einer Website verbinden möchtest, kannst du den Schlüssel folgendermaßen von der Website trennen: Navigiere im WordPress.com- Dashboard zu Einstellungen → Hosting-Konfiguration . Suche im Abschnitt SSH-Zugriff nach dem SSH-Schlüssel, den du entfernen möchtest. Klicke auf den Button Loslösen , um den Schlüssel von der Website zu entfernen. Der SSH-Schlüssel ist so lange mit deinem WordPress.com-Konto verbunden, bis du ihn entfernst. Aktualisieren eines bestehenden SSH-Schlüssels So kannst du deinen öffentlichen SSH-Schlüssel aktualisieren: Navigiere in deinem WordPress.com- Dashboard zu Mein Profil . Klicke auf der Seite „Mein Profil“ auf Sicherheit . Klicke in der Sicherheits-Checkliste auf die Option SSH-Schlüssel . Klicke neben dem Schlüssel, den du aktualisieren möchtest, auf den Button SSH-Schlüssel aktualisieren . Füge deinen aktualisierten SSH-Schlüssel in das Feld Neuer öffentlicher SSH-Schlüssel ein. Klicke auf den Button SSH-Schlüssel aktualisieren , um die Änderungen zu speichern. Entfernen eines bestehenden SSH-Schlüssels Wenn du einen SSH-Schlüssel von deinem WordPress.com-Konto entfernst, wird er auch von jeder Website getrennt, mit der er verbunden ist. Gehe folgendermaßen vor, um einen vorhandenen SSH-Schlüssel von deinem WordPress.com-Konto zu entfernen: Navigiere in deinem WordPress.com-Dashboard zu Mein Profil . Klicke auf der Seite „Mein Profil“ auf Sicherheit . Klicke in der Sicherheits-Checkliste auf die Option SSH-Schlüssel . Klicke auf den Button „SSH-Schlüssel entfernen“, der neben dem vorhandenen Schlüssel angezeigt wird. Eine Bestätigungsmeldung wird angezeigt. Bestätige durch einen Klick auf den OK-Button, dass du den Schlüssel entfernen möchtest. Verwenden von Shell-Befehlen ⚠️ Du solltest bei der Ausführung von Befehlen vorsichtig sein, um Datenverlust oder Schäden an deiner Website zu vermeiden. Führe Befehle nur dann aus, wenn du ihre Funktion genau kennst. Zur Verwendung der Linux-Befehlszeile gibt es zahlreiche Ressourcen. Bekannte Beispiele dafür sind die folgenden Drittanbieter-Quellen: Ubuntu’s Command Line for Beginners Tutorial (Ubuntu-Tutorial – Befehlszeile für Anfänger) freeCodeCamp’s Linux Commands Handbook (freeCodeCamp-Handbuch zu Linux-Befehlen) LinuxCommand.org Microsoft’s Shell Course (Shell-Kurs von Microsoft) Es folgen einige gängige Befehle. Befehl Beschreibung ls Eine Liste des Inhalts des aktuellen Verzeichnisses anzeigen. cd Verzeichnis wechseln. mkdir Einen neuen Ordner/ein neues Verzeichnis erstellen. touch Eine Datei erstellen. rm Eine Datei entfernen. cat Den Inhalt einer Datei anzeigen. cp Kopieren. mv Verschieben. pwd Aktuelles Verzeichnis anzeigen. grep In einer Datei/Zeilen nach einem bestimmten Ausdruck suchen. find Dateien und Verzeichnisse durchsuchen. nano Texteditor. history Die 50 zuletzt verwendeten Befehle anzeigen. Löschen Den Terminal-Bildschirm löschen. du Dateigröße anzeigen. rsync Dateien zum und vom Server kopieren. Verwenden der WP-CLI WP-CLI ist auf WordPress.com vorinstalliert und erweitert die Shell um WordPress-spezifische Kommandozeilentools. Du kannst mit der Ausführung von WP-CLI-Befehlen beginnen, sobald du eine Verbindung zu SSH hergestellt hast. Es gibt viele Befehle und Unterbefehle, die dir bei der Verwaltung und Problembehandlung deiner Website helfen können. Weitere Informationen zu den verfügbaren Befehlen und ihrer Verwendung findest du in unserem WP-CLI-Ratgeber oder in der WP-CLI-Dokumentation von WordPress.org . Verwalten von Themes und Plugins mit WP-CLI WP-CLI kann zur Verwaltung und Problembehandlung von Plugins und Themes verwendet werden. WP-CLI-Befehl Beschreibung wp plugin list Installierte Plugins und deren Status und Version auflisten. wp theme list Installierte Themes auflisten. wp plugin deactivate plugin-name Plugin wird deaktiviert. Ersetze plugin-name durch einen name -Wert, den du über wp plugin list findest. Es können mehrere Plugin-Namen eingegeben werden, um mehr als eines zu deaktivieren. wp plugin activate plugin-name Ein Plugin wird aktiviert. Ersetze plugin-name durch einen name -Wert, den du über wp plugin list findest. Es können mehrere Plugin-Namen eingegeben werden, um mehr als eines zu aktivieren. wp theme activate theme-name Ein Theme aktivieren. Ersetze theme-name durch einen name -Wert, den du über wp theme list findest. wp php-errors Die letzten protokollierten PHP-Fehler auflisten. Das ist nützlich, um problematische Plugins und Themes zu identifizieren, die möglicherweise aktualisiert oder deaktiviert werden müssen. Überspringen von Themes und Plugins mit WP-CLI Wenn auf deiner Website Fehler auftreten und Befehle nicht ausgeführt werden können, ist es gegebenenfalls notwendig, den aktiven Theme- und Plugin-Code der Website zu überspringen. Um dies zu tun, füge --skip-themes und --skip-plugins zu einem WP-CLI-Befehl hinzu. WP-CLI-Befehl Beschreibung wp --skip-plugins --skip-themes plugin deactivate plugin-name Theme- und Plugin-Code überspringen und dann ein Plugin deaktivieren. Ersetze plugin-name durch einen name -Wert, den du über wp plugin list findest. wp --skip-plugins --skip-themes theme activate theme-name Theme- und Plugin-Code überspringen und dann ein Plugin aktivieren. Ersetze theme-name durch einen name -Wert, den du über wp theme list findest. wp --skip-plugins --skip-themes php-errors Theme- und Plugin-Code überspringen und dann die zuletzt protokollierten PHP-Fehler auflisten. Das ist nützlich, um problematische Plugins und Themes zu identifizieren, die möglicherweise aktualisiert oder deaktiviert werden müssen. Weitere WP-CLI-Ressourcen Verwendung der WP-CLI WP-CLI-Dokumentation von WordPress.org WP-CLI-Dokumentation von WooCommerce WP-CLI.org Was ist, wenn etwas schiefläuft? Wenn auf deiner Website Problem auftreten, nachdem du Änderungen über SSH vorgenommen hast, kannst du deine Website von einem Jetpack-Backup wiederherstellen . Wenn du einen Befehl ausführst und etwas Unerwartetes geschieht, können wir dir dabei helfen, deine Website auf eine frühere Version wiederherzustellen. Wir können dir nicht dabei helfen, die Fehler in deinem Befehl zu finden und diese zu korrigieren. Häufig gestellte Fragen Kann ich Support für die Verwendung von Befehlszeilentools erhalten? Aufgrund der Komplexität von SSH und WP-CLI sind wir nicht in der Lage, umfassenden Support für die Verwendung dieser Tools anzubieten. Support-Mitarbeiter helfen dir bei Problemen mit der Verbindung über SSH, können dich aber nicht durch die Verwendung von Befehlen führen. Sind alle Befehle verfügbar? Um eine sichere und leistungsfähige Umgebung bereitzustellen, kann WordPress.com bestimmte Shell- und WP-CLI-Befehle einschränken oder deaktivieren. Kann ich mein eigenes SSH-Passwort festlegen? Benutzername und Passwort werden vom System automatisch generiert und gelten immer nur für eine Website. Wenn du also mehrere Websites hast, musst du für jede Website einen eigenen Benutzernamen und ein eigenes Passwort verwenden. Bewerten: Verwandte Ratgeber Wechseln der PHP-Version 1 Min. Lesezeit Website-Cache löschen 3 Min. Lesezeit Wähle einen WordPress-Host 8 Min. Lesezeit Symlink-Dateien und -Ordner 2 Min. Lesezeit In diesem Ratgeber WordPress.com SSH-Anmeldedaten erhalten und SSH aktivieren Ein SSH-Passwort zurücksetzen Mit SSH verbinden Verbinden mit SSH unter MacOS und Linux Verbinden von SSH unter Windows SSH-Schlüssel Hinzufügen eines SSH-Schlüssels zu deinem Konto Verbinden eines bestehenden SSH-Schlüssels mit einer Website Trennen der Verbindung eines Schlüssels mit einer Website Aktualisieren eines bestehenden SSH-Schlüssels Entfernen eines bestehenden SSH-Schlüssels Verwenden von Shell-Befehlen Verwenden der WP-CLI Verwalten von Themes und Plugins mit WP-CLI Überspringen von Themes und Plugins mit WP-CLI Weitere WP-CLI-Ressourcen Was ist, wenn etwas schiefläuft? Häufig gestellte Fragen Kann ich Support für die Verwendung von Befehlszeilentools erhalten? Sind alle Befehle verfügbar? Kann ich mein eigenes SSH-Passwort festlegen? Hast du Fragen? Unseren AI Assistant fragen Zurück nach oben Du konntest nicht finden, was du brauchst? Kontaktiere uns Erhalte Antworten von unserem AI Assistant, der rund um die Uhr professionellen Support für kostenpflichtige Tarife bietet. Eine Frage in unserem Forum stellen Durchsuche Fragen und erhalte Antworten von anderen erfahrenen Benutzern. Copied to clipboard! WordPress.com Produkte WordPress-Hosting WordPress für Agenturen Werde Partner Domainnamen KI-Website-Builder Website-Baukasten Erstelle ein Blog Professional E-Mail Webdesign-Service WordPress Studio WordPress für Unternehmen Funktionen Übersicht WordPress Themes WordPress-Plugins WordPress-Vorlagen Google Apps Ressourcen WordPress.com-Blog Firmennamen-Generator Logo Maker WordPress.com-Reader Barrierefreiheit Abonnements kündigen Hilfe Support-Center Anleitungen Kurse Foren Kontakt Ressourcen für Entwickler Firma Über Presse Geschäftsbedingungen Datenschutzerklärung Meine persönlichen Informationen nicht verkaufen oder weitergeben Datenschutzhinweis für Benutzer in Kalifornien Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English Mobil-Apps Herunterladen im App Store Herunterladen im Google Play Social Media WordPress.com auf Facebook WordPress.com auf X (Twitter) WordPress.com auf Instagram WordPress.com auf YouTube Automattic Automattic Arbeite für uns   Kommentare werden geladen …   Verfasse einen Kommentar … E-Mail Name Website Support Registrieren Anmelden Kurzlink kopieren Melde diesen Inhalt Abonnements verwalten
2026-01-13T09:29:32
https://www.ecns.cn/hd/2025-12-26/detail-iheyfqph6159105.shtml
In Numbers: China holds Central Economic Work Conference to plan for 2026 --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo In Numbers: China holds Central Economic Work Conference to plan for 2026 ( 1 /1) 2025-12-13 09:12:34 Ecns.cn Editor :Chen Shankun Previous Next (1) LINE More Photo Global mayors attend dialogue in NE China on developing ice, snow economy Indonesia welcomes its first locally born giant panda cub Chinese FM on Venezuela situation: China always opposes imposing one country's will on another Maduro pleads not guilty in N.Y. court UN Security Council holds emergency meeting on Venezuela Harbin opens its 42nd Ice and Snow Festival ${visuals_2} ${visuals_3} More Video More than a business hub: check how global merchants thrive in Yiwu Insights | Sanae Takaichi's erroneous remarks a grave 'diplomatic failure': Japanese scholar Insights丨From energy cooperation to industrial co-building: New momentum in Europe-China ties Insights丨China’s economy in UN official’s eyes: Resilience, exports, and high-tech transition Insights丨Portuguese economist sees stability and opportunity in China’s long-term planning (W.E. Talk) Experts on 2026: China's 15th Five-Year Plan significant for the World ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://docs.aws.amazon.com/pt_br/cost-management/latest/userguide/what-is-costmanagement.html
O que Gerenciamento de Faturamento e Custos da AWSé - AWS Gestão de custos O que Gerenciamento de Faturamento e Custos da AWSé - AWS Gestão de custos Documentação AWS Billing and Cost Management Manual do usuário Características do Gerenciamento de Faturamento e Custos da AWS Serviços relacionados As traduções são geradas por tradução automática. Em caso de conflito entre o conteúdo da tradução e da versão original em inglês, a versão em inglês prevalecerá. O que Gerenciamento de Faturamento e Custos da AWSé Bem-vindo ao Guia do usuário do gerenciamento de AWS custos. Gerenciamento de Faturamento e Custos da AWS fornece um conjunto de recursos para ajudá-lo a configurar seu faturamento, recuperar e pagar faturas e analisar, organizar, planejar e otimizar seus custos. Para começar, configure seu faturamento de acordo com seus requisitos. Para indivíduos ou pequenas organizações, AWS cobrará automaticamente o cartão de crédito fornecido. Para organizações maiores, você pode usar AWS Organizations para consolidar suas cobranças em várias Contas da AWS. Em seguida, você pode configurar faturamento, impostos, pedidos de compra e métodos de pagamento para se adequar aos processos de aquisição da sua organização. Se você tiver várias AWS Organizations, use a transferência de faturamento para gerenciar e pagar centralmente todas as suas organizações a partir de uma única conta. Você pode alocar seus custos para equipes, aplicações ou ambientes usando categorias de custo ou etiquetas de alocação de custos, ou usando AWS Cost Explorer. Também é possível exportar dados para o data warehouse ou ferramenta de business intelligence de sua preferência. Veja a seguinte visão geral de recursos para ajudar você a gerenciar suas finanças na nuvem. Características do Gerenciamento de Faturamento e Custos da AWS Tópicos Faturamento e pagamentos Análise de custos Otimização de custo Orçamento e planejamento Economias e compromissos Faturamento e pagamentos Entenda suas cobranças mensais, visualize e pague faturas e gerencie as preferências de cobrança, faturas, impostos e pagamentos. Página de faturas : baixe faturas e visualize dados detalhados de faturamento mensal para entender como suas cobranças foram calculadas. Pedidos de compra : crie e gerencie seus pedidos de compra para estar em conformidade com os processos de aquisição exclusivos de sua organização. Pagamentos : entenda seu saldo de pagamentos pendentes ou vencidos e seu histórico de pagamentos. Perfis de pagamento — configure várias formas de pagamento para diferentes AWS service (Serviço da AWS) provedores ou partes da sua organização. Créditos : analise os saldos de crédito e escolha onde os créditos devem ser aplicados. Preferências de cobrança : habilite a entrega de faturas por e-mail e suas preferências de compartilhamento de crédito, alertas e compartilhamento de descontos. Transferência de faturamento — separa o gerenciamento financeiro e de faturamento do gerenciamento de segurança e governança. Isso permite que uma única AWS organização tenha acesso centralizado a dados de custos e AWS faturas em várias AWS organizações. Análise de custos Analise seus custos, exporte dados detalhados de custo e uso e preveja seus gastos. AWS Cost Explorer : analise seus dados de custo e uso com recursos visuais, filtragem e agrupamento. Você pode prever seus custos e criar relatórios personalizados. Exportação de dados : crie exportações de dados personalizadas com base em conjuntos de dados do Gerenciamento de Faturamento e Custos. Detecção de anomalias de custo — configure alertas automatizados ao AWS detectar uma anomalia de custo para reduzir custos inesperados. Nível gratuito da AWS : monitore o uso atual e previsto dos serviços de nível gratuito para evitar custos inesperados. Dividir dados de alocação de custos : habilite dados detalhados de custo e uso para recursos compartilhados do Amazon Elastic Container Service (Amazon ECS). Preferências do Gerenciamento de Custos : gerenciar quais dados as contas de membros podem visualizar, altere a granularidade dos dados da conta e configure as preferências de otimização de custos. Otimização de custo Organize seus custos entre equipes, aplicações ou clientes finais. Categorias de custo : mapeie os custos para equipes, aplicações ou ambientes e, em seguida, visualizar os custos ao longo dessas dimensões no Explorador de Custos e nas exportações de dados. Use regras de encargos entre os valores da categoria de custo. Tags de alocação de custos : use tags de recursos para organizar e, em seguida, visualize os custos por tag de alocação de custos no Explorador de Custos e nas exportações de dados. Orçamento e planejamento Estime o custo de um workload planejada e crie orçamentos para acompanhar e controlar os custos. Orçamentos : defina orçamentos personalizados de custo e uso para controlar os custos em toda a organização e receber alertas quando os custos excederem os limites definidos. Calculadora de preços no console – Use esse atributo para estimar o planejamento dos custos de nuvem considerando seus descontos e compromissos de compra. Site público da calculadora de preços — Crie estimativas de custo para usar AWS serviços com tarifas sob demanda. Economias e compromissos Otimize o uso de recursos e use modelos de preços flexíveis para reduzir sua fatura. Hub de Otimização de Custos da AWS : identifique oportunidades de economia com recomendações personalizadas, incluindo exclusão de recursos não utilizados, dimensionamento correto, Savings Plans e reservas. Savings Plans – Reduza sua fatura em comparação com os preços sob demanda com modelos de preços flexíveis. Gerencie seu inventário de Savings Plans, revise recomendações de compra, faça análises de compra e da utilização e cobertura de Savings Plans. Reservas — Reserve capacidade com tarifas reduzidas para Amazon Elastic Compute Cloud (Amazon EC2), Amazon Relational Database Service (Amazon RDS), Amazon Redshift, Amazon DynamoDB e muito mais. Serviços relacionados AWS Billing Conductor O Billing Conductor é um serviço de cobrança personalizado que oferece suporte aos fluxos de trabalho de showback e chargeback de AWS parceiros que revendem Serviços da AWS, soluções e AWS clientes que compram serviços em nuvem diretamente por meio dele. AWS Você pode personalizar uma segunda versão alternativa dos seus dados de faturamento mensal. O serviço modela a relação de faturamento entre você e seus clientes ou unidades de negócios. O Billing Conductor não muda a forma como você é cobrado a AWS cada mês. Em vez disso, você pode usar o serviço para configurar, gerar e exibir tarifas para clientes específicos durante um determinado período de faturamento. Você também pode usá-lo para analisar a diferença entre as taxas que você aplica aos seus agrupamentos em relação às taxas reais dessas mesmas contas de. AWS Como resultado da configuração do Billing Conductor, a conta de gerenciamento também pode ver a taxa personalizada aplicada na página de detalhes do faturamento do Gerenciamento de Faturamento e Custos da AWS console. A conta de gerenciamento também pode configurar relatórios de AWS custo e uso por grupo de cobrança. Quando os usuários da transferência de faturamento acessam a conta de transferência de faturamento, o Billing Conductor permite que a conta de gerenciamento da AWS organização que transfere suas faturas (conta de origem da fatura) visualize somente o preço de uso com as tarifas da conta de transferência de faturamento. Para obter mais informações sobre o Billing Conductor, consulte o Guia do usuário do AWS Billing Conductor . Para obter mais informações sobre transferência de faturamento, consulte Transferir gerenciamento de faturamento para contas externas . IAM Você pode usar AWS Identity and Access Management (IAM) para controlar quem em sua conta ou organização tem acesso a páginas específicas no console Billing and Cost Management. É possível, por exemplo, controlar o acesso às faturas e informações detalhadas relacionadas a cobranças e atividades da conta, orçamentos, métodos de pagamento e créditos. O IAM é um recurso do seu Conta da AWS. Você não precisa fazer mais nada para se inscrever no IAM, e não há custo para usá-lo. Ao criar uma conta, você começa com uma identidade de login que tem acesso completo a todos Serviços da AWS os recursos da conta. Essa identidade é chamada de Usuário raiz da conta da AWS e é acessada fazendo login com o endereço de e-mail e a senha que você usou para criar a conta. É altamente recomendável não usar o usuário-raiz para tarefas diárias. Proteja as credenciais do usuário-raiz e use-as para executar as tarefas que somente ele puder executar. Para obter a lista completa das tarefas que exigem login como usuário-raiz, consulte Tarefas que exigem credenciais de usuário-raiz no Guia do Usuário do IAM . Por padrão, os perfis e usuários do IAM em sua conta não podem acessar as páginas do console de Gerenciamento de Faturamento e Custos. Para conceder acesso, ative a configuração Ativar acesso ao IAM . Para obter mais informações, consulte Sobre o acesso do IAM . Se você tiver vários Contas da AWS em sua organização, poderá gerenciar o acesso da conta vinculada aos dados do Cost Explorer usando a página de preferências de Gerenciamento de Custos . Para obter mais informações, consulte Como controlar o acesso ao Cost Explorer . Para obter mais informações sobre o IAM, consulte o Guia do usuário do IAM . AWS Organizations Você pode usar o recurso de faturamento consolidado no Organizations para consolidar o faturamento e o pagamento de várias Contas da AWS. Toda organização tem uma conta de gerenciamento que paga as despesas de todas as contas de membros . O faturamento consolidado tem os seguintes benefícios: Uma fatura : receba uma fatura para várias contas. Fácil rastreamento : rastrear as despesas em várias contas e fazer download dos dados combinados de custos e uso. Uso combinado : combine o uso em todas as contas na organização para compartilhar os descontos de preços por volume, descontos em Instâncias Reservadas e Savings Plans. Isso pode resultar em um custo mais baixo para o seu projeto, departamento ou empresa do que com contas independentes individuais. Para obter mais informações, consulte Descontos de volume . Sem taxa extra : o faturamento consolidado é oferecido sem qualquer custo adicional. Para obter mais informações sobre o Organizations, consulte o Guia do usuário do AWS Organizations . Transferência de faturamento Você pode usar a transferência de faturamento para gerenciar e pagar centralmente vários AWS Organizations em uma única conta. A transferência de faturamento permite que uma conta de gerenciamento designe uma conta de gerenciamento externa para gerenciar e pagar sua fatura consolidada. Isso centraliza o faturamento e, ao mesmo tempo, mantém a autonomia do gerenciamento de segurança. Para configurar a transferência de faturamento, uma conta externa (conta de transferência de faturamento) envia um convite de transferência de cobrança para uma conta de gerenciamento (conta de origem da fatura). Se o convite for aceito, a conta externa se tornará a conta de transferência de faturas. A conta de transferência de faturas então gerencia e paga a fatura consolidada da conta de origem da fatura, começando na data especificada no convite. Para obter mais informações, consulte Transferir o gerenciamento do faturamento para contas externas . AWS API de lista de preços AWS A API de lista de preços é um catálogo centralizado que você pode consultar programaticamente AWS para obter informações sobre serviços, produtos e preços. Você pode usar a API em massa para recuperar informações up-to-date AWS de serviço em massa, disponível nos formatos JSON e CSV. Para obter mais informações, consulte O que é a API de lista de AWS preços? . O Javascript está desativado ou não está disponível no seu navegador. Para usar a documentação da AWS, o Javascript deve estar ativado. Consulte as páginas de Ajuda do navegador para obter instruções. Convenções do documento Introdução ao gerenciamento AWS de custos Essa página foi útil? - Sim Obrigado por nos informar que estamos fazendo um bom trabalho! Se tiver tempo, conte-nos sobre o que você gostou para que possamos melhorar ainda mais. Essa página foi útil? - Não Obrigado por nos informar que precisamos melhorar a página. Lamentamos ter decepcionado você. Se tiver tempo, conte-nos como podemos melhorar a documentação.
2026-01-13T09:29:32
https://www.chinadaily.com.cn/sports/basketball
Basketball - Chinadaily.com.cn Search HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER MOBILE Global Edition ASIA 中文 双语 Français HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Sports Soccer Basketball Volleyball Tennis Golf Track & field Swimming Home / Sports / Basketball Home Sports / Basketball A learning curve 2026-01-08 19:46 CBA Roundup: Beijing ends Guangdong's eight-game winning streak 2026-01-04 10:00 CPB league opens with a bang 2026-01-02 23:11 Rivers: Bucks don't need to make wholesale changes 2025-12-19 09:44 World's tallest teen Rioux, delivers emphatic dunk 2025-12-19 09:35 EASL designated as official qualification path to BCL Asia 2025-12-18 09:55 Knicks rally to win NBA Cup 2025-12-18 09:51 WNBA MVP Wilson is AP Female Athlete of the Year 2025-12-12 10:14 Rozier pleads not guilty to sports betting charges 2025-12-10 09:27 All paint, no gains 2025-12-03 10:32 Seth Curry rejoins Warriors to reunite with older brother Stephen 2025-12-03 10:21 Team China suffers tough reality check on its way to FIBA World Cup 2025-11-29 00:32 How 'basketball city' jumped to national prominence 2025-11-28 07:39 Exhibition highlights historical roots of game 2025-11-28 07:33 Buzzer sounds on scholarship selection camp 2025-11-27 09:40 Billups pleads not guilty to rigged poker game charges 2025-11-26 09:49 A changing of the guard 2025-11-14 09:29 Miami beats Cavs in OT with 'Quinn-or-lose' play 2025-11-12 09:26 3x3 tourney headlines Yunnan sports and culture festival 2025-11-05 09:32 No fanfare, just fan ire as Turner returns to Indiana with the Bucks 2025-11-05 09:28 1 2 3 4 5 6 7 8 9 10 Next    >>| 1/100 Next Most Popular China ties Iraq 0-0 in its U23 Asian Cup opening match A learning curve Russian team wins Harbin International Ice Sculpture Competition Worldloppet ski season opens with Changchun cross-country event Women's half-marathon draws 20,000 runners to Guangzhou Picture perfect Highlights Venus still a force at 45, despite Auckland loss Reboot begins with hard work Russian team wins Harbin International Ice Sculpture Competition What's Hot Worldloppet ski season opens with Changchun cross-country event Special Chengdu World University Games Winter sports in China NHL plays in China Top BACK TO THE TOP English 中文 HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment FOLLOW US Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. -->
2026-01-13T09:29:32
https://www.ecns.cn/hd/2026-01-07/detail-iheyrzrv3836970.shtml
Chinese FM on Venezuela situation: China always opposes imposing one country's will on another --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo Chinese FM on Venezuela situation: China always opposes imposing one country's will on another ( 1 /1) 2026-01-07 10:16:40 Ecns.cn Editor :Yao Lan China always opposes the use or threat of force, as well as any imposition of one country's will on another, Chinese Foreign Minister Wang Yi said on Sunday when speaking of the situation in Venezuela. Previous Next (1) LINE More Photo Maduro pleads not guilty in N.Y. court UN Security Council holds emergency meeting on Venezuela Harbin opens its 42nd Ice and Snow Festival China's Yangtze River remains world's busiest inland waterway by cargo throughput Protest held in New York against U.S. military strikes on Venezuela Venezuelan President Nicolás Maduro transported to Brooklyn detention center ${visuals_2} ${visuals_3} More Video Insights丨From energy cooperation to industrial co-building: New momentum in Europe-China ties Insights丨China’s economy in UN official’s eyes: Resilience, exports, and high-tech transition Insights丨Portuguese economist sees stability and opportunity in China’s long-term planning (W.E. Talk) Experts on 2026: China's 15th Five-Year Plan significant for the World (W.E. Talk) Experts look to 2026: Seizing opportunities amid crises, forging ahead after breakthroughs The Awkward Chronicles of Uncle Sam: Claimed Glory, Met Chaos ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://www.chinadaily.com.cn/a/202601/03/WS6958891ba310d6866eb31a73.html
Dishing up dynasties - Chinadaily.com.cn Search HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL WATCHTHIS SPORTS OPINION REGIONAL FORUM NEWSPAPER MOBILE Home Culture Home / Culture Dishing up dynasties From the Tang to the Song, immersive restaurant performances turn Chinese history into a multisensory feast, Yang Feiyue reports. By Yang Feiyue | China Daily | Updated: 2026-01-03 11:12 Share Share - WeChat --> CLOSE Women dressed in ancient costumes serve dishes. [Photo provided to China Daily] The lantern light flickers, casting dancing shadows on stone as a woman in elegant, flowing silks in the style of the Southern Song Dynasty (1127-1279) glides forward to greet guests at a palace-like restaurant in Jianou city, north of eastern Fujian province. She recites a welcome in ancient verse before leading them through a luminous tunnel that evokes a feeling of traveling back in time to Jianzhou (established prefecture), Jianou's historical name a thousand years ago. Before them, a panoramic LED screen, stretching an impressive 28.8 meters, unrolls like a living scroll, depicting the bustling markets, teahouses, and waterways of ancient Jianzhou. It makes for a vivid opening to the Jianzhou Grand Feast , a 30-million-yuan ($4.2 million) immersive cultural dining spectacle that has, since its opening about three months ago, become a popular local tourist spot. "We have been seeing a steady flow of visitors on weekends and holidays," notes Sun Ze, the restaurant's marketing director. The restaurant taps into the profound history and culture of ancient Jianzhou, which has passed down the legacies of Zhu Xi's Neo-Confucianism and the Song Dynasty's Beiyuan imperial tea. "Traditional cultural tourism often remains passive — it's static observation — but we think that enjoying food, something that is a common factor throughout history, can become the ultimate cultural medium," he explains. "We wanted the weighty culture of Jianzhou to step out of the history books and become an immersive experience modern consumers can eat, see and participate in." Nearly 1,500 kilometers to the northwest, in the ancient capital of Xi'an in Shaanxi province, a Tang Dynasty (618-907) scene also comes to life over the dining table. Sun Ting, director of Fu Rong Yan Restaurant's seasonal aesthetic dining show, has witnessed similar robust demand. "It is common to have our weekend shows fully booked a week in advance and we operate double sessions daily for lunch and dinner, since we launched over half a year ago," Sun Ting states.   --> 1 2 3 4 5 Next    >>| --> 1/5 Next Photo Teahouses turn nostalgia temples Lianjiang's long road to renewal AI must serve humanity, not endanger it Shopping campaign to unleash market potential Minor Cold: Winter digs in Trump says US will take temporary control of Venezuela --> Related Stories High stakes in short takes: Micro-drama industry levels up China Daily launches 'China Bound' — an English-language smart-tourism service platform for int'l travelers Breathing life into hanfu Revival of a long-gone dress code Currents carry history of capitals --> Top BACK TO THE TOP English 中文 HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment FOLLOW US Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. -->
2026-01-13T09:29:32
https://wordpress.com/de/support/github-bereitstellungen/
Verwenden von GitHub-Bereitstellungen auf WordPress.com – Support Produkte Funktionen Ressourcen Tarife Anmelden Jetzt starten Menü WordPress-Hosting WordPress für Agenturen Werde Partner Domainnamen KI-Website-Builder Website-Baukasten Erstelle ein Blog Newsletter Professional E-Mail Webdesign-Service Commerce WordPress Studio WordPress für Unternehmen   Übersicht WordPress Themes WordPress-Plugins WordPress-Vorlagen Google Apps Support-Center WordPress News Firmennamen-Generator Logo Maker Neue Beiträge entdecken Beliebte Schlagwörter Blog-Suche Navigationsmenü schließen Jetzt starten Registrieren Anmelden Über Tarife Produkte WordPress-Hosting WordPress für Agenturen Werde Partner Domainnamen KI-Website-Builder Website-Baukasten Erstelle ein Blog Newsletter Professional E-Mail Webdesign-Service Commerce WordPress Studio WordPress für Unternehmen   Funktionen Übersicht WordPress Themes WordPress-Plugins WordPress-Vorlagen Google Apps Ressourcen Support-Center WordPress News Firmennamen-Generator Logo Maker Neue Beiträge entdecken Beliebte Schlagwörter Blog-Suche Jetpack-App Weitere Informationen Support-Center Anleitungen Kurse Foren Kontakt Suche Support-Center / Anleitungen Support-Center Anleitungen Kurse Foren Kontakt Anleitungen / Tools / Verwenden von GitHub-Bereitstellungen auf WordPress.com Verwenden von GitHub-Bereitstellungen auf WordPress.com GitHub Deployments integriert deine GitHub-Repositorys direkt in deine WordPress.com-Website und ermöglicht einen versionsgesteuerten, automatisierten Workflow für die Bereitstellung von Plugins, Themes oder vollständigen Website-Änderungen. Dieser Ratgeber behandelt den Einrichtungsprozess und die Verwaltung der verbundenen Repositorys. Diese Funktion ist auf Websites mit den WordPress.com-Tarifen Business und Commerce verfügbar. Wenn du einen Business-Tarif hast, aktiviere ihn unbedingt. Führe für kostenlose Websites und Websites mit Persönlich- und Premium-Tarif ein Tarif-Upgrade durch, um auf diese Funktion zuzugreifen. In diesem Ratgeber Video-Tutorial Ein Repository verbinden Einstellungen für die Bereitstellung verwalten Erweiterte Bereitstellung Code bereitstellen Bestehende Verbindungen verwalten Ausführungsprotokolle der Bereitstellung Ein Repository trennen WordPress.com von GitHub trennen Hast du Fragen? Unseren AI Assistant fragen Zurück nach oben Video-Tutorial Dieses Video ist auf Englisch. YouTube bietet automatische Übersetzungsfunktionen, damit du es in deiner Sprache ansehen kannst: Automatisch übersetzte Untertitel: Spiele das Video ab. Klicke auf ⚙️ Einstellungen (unten rechts im Video). Wähle Untertitel/CC . Wähle Automatisch übersetzen . Wähle deine bevorzugte Sprache. Automatische Synchronisation (experimentell): Klicke auf ⚙️ Einstellungen . Wähle Audiospur . Wähle die Sprache, in der du das Video hören möchtest. ℹ️ Übersetzungen und Synchronisationen werden von Google erstellt, können ungenau sein und sind möglicherweise noch nicht für alle Sprachen verfügbar. Ein Repository verbinden Bevor du ein GitHub-Repository auf deiner WordPress.com-Website bereitstellen kannst, musst du zunächst eine Verbindung einrichten. Gehe dazu folgendenmaßen vor: Besuche deine Websites-Seite unter  https://wordpress.com/sites Klicke auf den Namen deiner Website, um die Website-Übersicht anzuzeigen. Klicke auf den Tab Bereitstellungen . Klicke auf den Button Repository verbinden . Wenn du jetzt eine Liste mit Repositorys siehst, ist dein GitHub-Konto bereits verbunden. Fahre fort mit Schritt 11. Klicke auf den Button WordPress.com-App installieren . Ein neues Fenster öffnet sich und du wirst aufgefordert, dich bei deinem GitHub-Konto anzumelden, falls du das noch nicht getan hast. Dann siehst du diesen Bildschirm: Klicke auf den Button WordPress.com für Entwickler autorisieren . Wähle die GitHub-Organisation oder das GitHub-Konto aus, in der/dem sich dein Repository befindet. Wähle aus, welche Repositorys du verbinden möchtest: Alle Repositorys: Wenn du diese Option auswählst, erhält WordPress.com Zugriff auf alle aktuellen und zukünftigen Repositorys, die mit dem ausgewählten GitHub-Konto verbunden sind. Dies schließt öffentliche schreibgeschützte Repositorys ein. Nur ausgewählte Repositorys: Wenn du diese Option auswählst, kannst du entscheiden, auf welche Repositorys WordPress.com im ausgewählten GitHub-Konto zugreifen kann.  Sobald du eine Option ausgewählt hast, klicke auf den Button Installieren . Das neue Fenster wird geschlossen und du wirst zu WordPress.com zurückgeleitet. Die von dir ausgewählten Repositorys sollten zusammen mit dem GitHub-Konto aufgelistet werden, das mit diesem Repository verknüpft ist: Klicke neben dem Repository, das du verbinden möchtest, auf Auswählen . Jetzt solltest du WordPress.com für Entwickler unter deinen Autorisierten GitHub-Apps und Installierten GitHub-Apps sehen. Einstellungen für die Bereitstellung verwalten Nachdem du ein Repository ausgewählt hast, musst du die Bereitstellungseinstellungen anpassen: Bereitstellungsbranch: Als Standard ist der Standardbranch des Repositorys festgelegt (üblicherweise main ), du kannst den Branch aber nach Belieben ändern. Zielverzeichnis: Der Serverordner, in dem die Dateien bereitgestellt werden sollen. Für Plugins ist das /wp-content/plugins/my-plugin-name , für Themes /wp-content/themes/my-theme-name . Für eine teilweise Website-Bereitstellung (d. h. mehrere Plugins oder Themes) kannst du /wp-content verwenden. Die Inhalte eines Repositorys werden mit den bestehenden Inhalten der WordPress-Website im angegebenen Verzeichnis zusammengeführt. Automatische Bereitstellungen: Es gibt zwei Möglichkeiten zur Bereitstellung auf WordPress.com: Automatisch: Sobald der Code aktiviert ist, wird er auf deiner Website WordPress.com bereitgestellt. Automatische Bereitstellungen werden für Staging-Websites empfohlen. Manuell: Der Code wird erst bereitgestellt, wenn du eine Bereitstellung anforderst . Die manuelle Bereitstellung wird für veröffentlichte Websites empfohlen. Bereitstellungsmodus: Es gibt zwei Arten von Bereitstellungen: Einfach: In diesem Modus werden alle Dateien aus einem Branch des Repositorys auf die Website kopiert und ohne Nachbearbeitung bereitgestellt. Erweitert: In diesem Modus kannst du ein Workflow-Skript verwenden, das individuelle Anpassungen des Builds ermöglicht, z. B. das Installieren von Composer-Abhängigkeiten, das Durchführen von Code-Tests vor der Bereitstellung und das Steuern der Dateibereitstellung. Ideal für Repositorys, die Composer- oder Node-Software benötigen. Weitere Informationen findest du unten unter „Erweiterte Bereitstellung“. Sobald alle Einstellungen konfiguriert wurden, klicke auf den Button Verbinden . Dein Repository wird hinzugefügt: Beachte, dass du die erste Bereitstellung entweder automatisch oder manuell auslösen musst. Du kannst dann jederzeit ein anderes Repository verbinden, indem du auf den Button Repository verbinden klickst. Erweiterte Bereitstellung Mit der erweiterten Bereitstellung kannst du ein Workflow-Skript bereitstellen, um Dateien in deinem Repository vor der Bereitstellung zu verarbeiten. Dies eröffnet dir viele Möglichkeiten, wie das Überprüfen des Codes, um sicherzustellen, dass er den Codierungsstandards deines Teams entspricht, das Ausführen von Komponententests, das Ausschließen von Dateien aus der Bereitstellung, das Installieren von Abhängigkeiten und vieles mehr. Sieh dir zunächst unsere Workflow-Rezepte an. So richtest du die erweiterte Bereitstellung ein: Ein Formular wird angezeigt, in dem du die Bereitstellung konfigurieren kannst. Klicke auf den Namen des Repositorys, um die Verbindung zu verwalten. Wähle auf der rechten Seite unter Bereitstellungsmodus auswählen die Option Erweitert . Wenn das Repository bereits eine Workflow-Datei enthält, kannst du sie hier auswählen. Das System prüft die Datei auf Fehler. Wenn keine Fehler gefunden werden, fahre mit Schritt 7 fort. Du kannst auch die Option Neuen Workflow erstellen auswählen, um eine vorkonfigurierte Workflow-Datei hinzuzufügen. Wenn du diese Option auswählst, wird die Workflow-Datei wpcom.yml überschrieben, falls sie bereits in deinem Repository existiert. Klicke auf den Button Workflow für mich installieren , um die Workflow-Datei in das Repository zu übernehmen. Sobald ein Workflow hinzugefügt und verifiziert wurde, klicke auf Aktualisieren . Dein Repository verwendet ab jetzt erweiterte Bereitstellungen. Code bereitstellen Nachdem du dein GitHub-Repository mit einer Website verbunden hast, besteht der nächste Schritt darin, deinen Code bereitzustellen. Es sind zwei Bereitstellungsmethoden verfügbar: Automatisch und Manuell . Automatische Bereitstellungen werden für aktive veröffentlichte Websites nicht empfohlen, da alle Codeänderungen im Repository von GitHub automatisch auf der aktiven Website bereitgestellt werden. Du könntest allerdings stattdessen eine automatische Bereitstellung auf einer Staging-Website einrichten und sie mit der aktiven Website synchronisieren, sobald du so weit bist. Manuelle Bereitstellungen geben dir mehr Kontrolle darüber, wann deine Codeänderungen aktiv werden, da du jede Bereitstellung manuell auslösen musst. Wir empfehlen manuelle Bereitstellungen, wenn du keine Staging-Website verwenden möchtest. Manuelle Bereitstellung auslösen Besuche deine Websites-Seite unter  https://wordpress.com/sites Klicke auf den Namen deiner Website, um die Website-Übersicht anzuzeigen. Klicke auf den Tab Bereitstellungen . Klicke im Repository, das du bereitstellen möchtest, auf das Ellipsenmenü (⋮). Wähle Manuelle Bereitstellung auslösen . Es sollte eine Bannerbenachrichtigung mit der Aufschrift „Bereitstellungsausführung erstellt“ angezeigt werden, und der Bereitstellungsstatus wird in „In Warteschlange“ geändert. Warte, bis die Bereitstellung abgeschlossen ist (der Status wird in „Bereitgestellt“ geändert). Klicke erneut auf das Ellipsenmenü (⋮) und wähle Bereitstellungsausführungen anzeigen .  Im Bereitstellungsprotokoll werden der Autor und der bereitgestellte Commit angezeigt. Wenn du auf den Eintrag „Bereitstellungsausführung“ klickst, kannst du weitere Informationen anzeigen. Bestehende Verbindungen verwalten So verwaltest du deine bestehenden GitHub-Repository-Verbindungen: Besuche deine Websites-Seite unter  https://wordpress.com/sites Klicke auf den Namen deiner Website, um die Website-Übersicht anzuzeigen. Klicke auf den Tab Bereitstellungen . Dann sollte dir die Verbindungsliste angezeigt werden.  Die Verbindungsliste wird angezeigt, wenn mindestens eine Verbindung zwischen einem GitHub-Repository und deiner Website besteht. Die Liste enthält relevante Informationen für jede Verbindung, z. B. den Repository-Namen und die Verzweigung, den letzten Commit, der auf einer Website bereitgestellt wurde, den Zeitpunkt, zu dem der Code platziert wurde, die Dauer der Bereitstellungsausführung und den Status. Nach einem Klick auf das Ellipsenmenü (⋮) stehen dir weitere Aktionen zur Verfügung: Manuelle Bereitstellung auslösen: Startet eine Bereitstellungsausführung für den letzten Commit des konfigurierten Branch. Bereitstellungsausführungen ansehen: Öffnet die Ansicht Protokolle für die Bereitstellungsausführung für das verbundene Repository. Verbindung konfigurieren: Öffnet die Ansicht Verbindung verwalten für das Repository. Repository trennen: Entfernt die Verbindung zwischen dem Repository und der Website. Ausführungsprotokolle der Bereitstellung Die Ausführungsprotokolle der Bereitstellung bieten eine detaillierte, Schritt-für-Schritt-Aufzeichnung jeder Bereitstellung, unabhängig davon, ob sie automatisch oder manuell ausgelöst wird. Diese Protokolle helfen dir dabei, Änderungen zu verfolgen, den Bereitstellungsstatus zu überwachen und auftretende Probleme zu beheben. Dank des Zugriffs auf Protokolle der letzten 10 Ausführungen innerhalb von 30 Tagen kannst du leicht überprüfen, was während jeder Bereitstellung passiert ist, und sicherstellen, dass alles reibungslos abläuft. So überprüfst die Protokolle einer Bereitstellung: Besuche deine Websites-Seite unter  https://wordpress.com/sites Klicke auf den Namen deiner Website, um die Website-Übersicht anzuzeigen. Klicke auf den Tab Bereitstellungen . Klicke auf das Ellipsenmenü (⋮) neben dem Repository, für das du die Protokolle anzeigen möchtest. Wähle Bereitstellungsausführungen anzeigen aus. Die Listenansicht für  Bereitstellungsausführungen   zeigt die Commits, die auf der Website bereitgestellt wurden, den Bereitstellungsstatus, das Datum und die Dauer. Klicke auf eine beliebige Stelle in einem Durchlauf, um die Bereitstellung zu erweitern und weitere Informationen anzuzeigen. Die Protokolle zeichnen alle ausgeführten Befehle auf, vom Abruf des Codes von GitHub bis hin zu dessen Platzierung im Zielverzeichnis. Du kannst Zeilen des Protokolls erweitern, um weitere Informationen zu sehen, indem du auf Mehr anzeigen klickst. Ein Repository trennen Wenn du ein GitHub-Repository von deiner Website trennst, haben zukünftige Änderungen am Repository keine Auswirkungen mehr auf deine Website. Standardmäßig bleiben die bereitgestellten Dateien auf deiner Website erhalten, aber du hast die Möglichkeit, sie während des Trennungsvorgangs zu entfernen. So entfernst du ein Repository: Besuche deine Websites-Seite unter  https://wordpress.com/sites Klicke auf den Namen deiner Website, um die Website-Übersicht anzuzeigen. Klicke auf den Tab Bereitstellungen . Klicke im Repository auf das Ellipsenmenü (⋮). Wähle Repository trennen . Ein Dialogfeld wird angezeigt. Klicke auf den Schalter, um die zugehörigen Dateien von der Website zu entfernen. Klicke auf Repository trennen , um das Dialogfeld zu schließen und das Repository zu trennen. Beachte, dass WordPress.com für Entwickler weiterhin in deinen Installierten GitHub-Apps und deinen Autorisierten GitHub-Apps angezeigt wird. Dies liegt daran, dass WordPress.com zwar weiterhin Zugriff auf das Repository hat, die Verbindung aber gelöscht wurde. WordPress.com von GitHub trennen Du kannst auch den Zugriff von WordPress.com auf dein GitHub-Konto widerrufen. Das ist jederzeit über deine Anwendungseinstellungen auf GitHub möglich.  So widerrufst du den Zugriff autorisierter Apps auf dein GitHub-Konto: Gehe zu den  autorisierten GitHub-Apps . Klicke neben  WordPress.com für Entwickler auf  Widerrufen . Klicke auf den Button  Verstanden, Zugriff widerrufen . Selbst wenn du den Zugriff durch autorisierte Apps widerrufst, kann der Code dennoch bereitgestellt werden, da die App WordPress.com für Entwickler auf den ausgewählten Konten installiert bleibt. So widerrufst du den Zugriff auf die WordPress.com-Installation und deaktivierst die Möglichkeit, Code auf deiner WordPress.com-Website bereitzustellen: Gehe zu   Installierte GitHub-Apps . Klicke neben  WordPress.com für Entwickler auf  Konfigurieren . Klicke im Bereich  Gefahrenzone  auf  Deinstallieren und klicke bei der entsprechenden Aufforderung auf  OK . Das Entfernen von WordPress.com aus der Liste der autorisierten Apps  bedeutet nicht , dass die Repositorys gelöscht werden oder nicht mehr funktionieren. Deine Repositorys existieren auf GitHub weiterhin, auch nachdem du den Zugriff durch WordPress.com widerrufst, aber WordPress.com kann keinen Code mehr bereitstellen. Bewerten: Verwandte Ratgeber Mit SSH verbinden 4 Min. Lesezeit Den Defensivmodus aktivieren 1 Min. Lesezeit Auf die Datenbank deiner Website zugreifen 3 Min. Lesezeit In diesem Ratgeber Video-Tutorial Ein Repository verbinden Einstellungen für die Bereitstellung verwalten Erweiterte Bereitstellung Code bereitstellen Bestehende Verbindungen verwalten Ausführungsprotokolle der Bereitstellung Ein Repository trennen WordPress.com von GitHub trennen Hast du Fragen? Unseren AI Assistant fragen Zurück nach oben Du konntest nicht finden, was du brauchst? Kontaktiere uns Erhalte Antworten von unserem AI Assistant, der rund um die Uhr professionellen Support für kostenpflichtige Tarife bietet. Eine Frage in unserem Forum stellen Durchsuche Fragen und erhalte Antworten von anderen erfahrenen Benutzern. Copied to clipboard! WordPress.com Produkte WordPress-Hosting WordPress für Agenturen Werde Partner Domainnamen KI-Website-Builder Website-Baukasten Erstelle ein Blog Professional E-Mail Webdesign-Service WordPress Studio WordPress für Unternehmen Funktionen Übersicht WordPress Themes WordPress-Plugins WordPress-Vorlagen Google Apps Ressourcen WordPress.com-Blog Firmennamen-Generator Logo Maker WordPress.com-Reader Barrierefreiheit Abonnements kündigen Hilfe Support-Center Anleitungen Kurse Foren Kontakt Ressourcen für Entwickler Firma Über Presse Geschäftsbedingungen Datenschutzerklärung Meine persönlichen Informationen nicht verkaufen oder weitergeben Datenschutzhinweis für Benutzer in Kalifornien Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English Mobil-Apps Herunterladen im App Store Herunterladen im Google Play Social Media WordPress.com auf Facebook WordPress.com auf X (Twitter) WordPress.com auf Instagram WordPress.com auf YouTube Automattic Automattic Arbeite für uns   Kommentare werden geladen …   Verfasse einen Kommentar … E-Mail Name Website Support Registrieren Anmelden Kurzlink kopieren Melde diesen Inhalt Abonnements verwalten
2026-01-13T09:29:32
https://wp.me/P36nUh-2
The Art of R.Black Skip to content The Art of R.Black Menu Tarot Merch Contact Home IMG_8321 IMG_8321 <meta name=”p:domain_verify” content=”07717ec9661c506749590c3d3e1377f0″/> IMG_8321 IMG_8321 Copyright © RBlack. All rights reserved.
2026-01-13T09:29:32
https://www.chinadaily.com.cn/world/special_coverage/6853d7e3a310a04af22c74be
Videos - Chinadaily.com.cn Search HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER MOBILE Global Edition ASIA 中文 双语 Français HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE World Asia-Pacific Americas Europe Middle East Africa China-US China-Europe China-Japan China-Africa Home World / Videos Home / World / Videos Explore Tianjin: Is everyone here so optimistic? 2025-07-11 17:40 Kazakh scholar: Chinese modernization worth studying 2025-07-10 14:01 Dushanbe draws smart city inspiration from Tianjin 2025-07-10 12:07 Technology empowers SCO summit cities 2025-07-10 11:36 Kyrgyz expert: SCO summit cities can set global example 2025-07-09 21:35 Joined together: A taste of Tianjin at the SCO Mayors' Dialogue 2025-07-09 20:30 A story of trust discovered at Tianjin Port 2025-07-09 20:21 The SCO event in Tianjin with family warmth 2025-07-09 20:07 Tatiana Urzhumtseva: Youth driving force of people-to-people diplomacy 2025-07-09 19:20 Bishkek seeks deeper ties with Chinese cities 2025-07-09 18:49 Uzbek scholar: Educational exchanges foster China-Uzbekistan bonds 2025-07-09 17:46 St. Petersburg official: SCO nations achieve fruitful outcomes through cultural exchanges 2025-07-09 16:46 Mayor of St. Petersburg: China is a strategic partner 2025-07-09 16:29 China and Russia: Cities building stronger ties 2025-07-09 15:03 Uzbek expert has high hopes for SCO event in Tianjin 2025-07-08 17:28 Why Central Asian experts love this port 2025-07-08 16:12 Kyrgyz expert: We should work together for a bright future 2025-07-08 16:07 SCO youth: China is the future 2025-07-08 15:59 From smart Tianjin Port to SCO story 2025-07-08 15:52 How craftsmanship is turned into career aspirations 2025-07-08 14:42 1 2 Next    >>| 1/2 Next Most Viewed in 24 Hours World in Focus Clean energy push Across Asia + Match online Himalayas warming 50 percent faster than global average: Study Special Coverage + 2025 A Date with China GMD SCO Summit Cities Tianjin Reporter's Journal + Shandong puts ancient philosophers into tourism draw A divergence of fates for two illustrious American newspapers Friends Afar + Blogger aims to bridge France, China links Ties That Bind + Vital pass to boost China-Pakistan trade Top BACK TO THE TOP English 中文 HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment FOLLOW US Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. -->
2026-01-13T09:29:32
https://cloudflare.com/de-de/banking-and-financial-services/
Digitale Transformation im Bankwesen & Finanzdienstleistungen | Cloudflare Registrieren Sprachen English English (United Kingdom) Deutsch Español (Latinoamérica) Español (España) Français Italiano 日本語 한국어 Polski Português (Brasil) Русский 繁體中文 简体中文 Plattform Connectivity Cloud Die Connectivity Cloud von Cloudflare bietet mehr als 60 Netzwerk-, Sicherheits- und Performance-Services. Enterprise Für große und mittelständische Unternehmen Kleinunternehmen Für kleine Organisationen Partner Werden Sie Cloudflare-Partner Anwendungsfälle Modernisierung von Anwendungen Höhere Performance App-Verfügbarkeit sicherstellen Web-Erfahrung optimieren Sicherheit modernisieren VPN-Ersatz Phishing-Schutz Schutz von Webanwendungen und APIs Netzwerkmodernisierung Coffee Shop-Networking WAN-Modernisierung Vereinfachung des Firmennetzwerks CXO-Themen KI einführen Die KI-Nutzung in der Belegschaft und digitalen Erlebnissen fördern. KI-Sicherheit Sichern Sie agentenbasierte KI- und GenAI-Anwendungen Datenkonformität Compliance optimieren und Risiken minimieren Post-Quanten-Kryptografie Daten schützen und Compliance-Standards erfüllen Branchen Gesundheitswesen Bankwesen Einzelhandel Gaming Öffentlicher Sektor Weitere Informationen Produktleitfaden Referenz-Architekturen Analyseberichte Vertiefung Ereignisse Demos Webinare Workshops Demo anfragen Produkte Produkte Workspace-Sicherheit Zero-Trust-Netzwerkzugriff Secure Web Gateway E-Mail-Sicherheit Cloud Access Security Broker Anwendungssicherheit DDoS-Schutz auf L7 Web Application Firewall API-Sicherheit Bot-Management Anwendungsperformance CDN DNS Smart Routing Load Balancing Netzwerke und SASE DDoS-Schutz auf L3/4 NaaS / SD- WAN Firewall as a Service Netzwerk-Interconnection Tarife und Preise Enterprise-Tarife KMU-Tarife Tarife für Privatanwender Zum Tarifvergleich Globale Dienste Support- und Success-Pakete Optimiertes Cloudflare-Erlebnis Professionelle Services Implementierung unter Leitung von Experten Technische Kundenbetreuung Fokussiertes technisches Management Security Operations-Dienst Cloudflare-Überwachung und -Vorfallsreaktion Domainregistrierung Domains kaufen und verwalten 1.1.1.1 Kostenlose DNS-Auflösung Weitere Informationen Produktleitfaden Referenz-Architekturen Analyseberichte Produktdemonstrationen und Rundgänge Entscheidungshilfe Entwickler Dokumentation Entwickler-Bibliothek Dokumentation und Leitfäden Anwendungsdemos Entwicklungsmöglichkeiten entdecken Tutorials Schritt-für-Schritt-Entwicklungsleitfäden Referenz-Architektur Diagramme und Designmuster Produkte Künstliche Intelligenz AI Gateway KI-Apps beobachten & steuern Workers AI ML-Modelle in unserem Netzwerk ausführen Rechenleistung Observability Protokolle, Metriken und Traces Workers Serverlose Apps erstellen/bereitstellen Medien Images Bilder transformieren & optimieren Realtime Echtzeit-Audio-/-Video-Apps entwickeln Speicher und Datenbank D1 Erstellen Sie serverlose SQL-Datenbanken R2 Daten ohne kostspielige Egress-Gebühren speichern Tarife und Preise Workers Serverlose Apps erstellen & bereitstellen Workers KV Serverloser Schlüssel-Werte-Speicher für Apps R2 Daten speichern ohne teure Egress-Gebühren Projekte entdecken Anwendungsbeispiele aus der Praxis KI-Demo in 30 Sekunden Schnellstart-Guide Erkunden Sie den Workers Playground Entwickeln, testen und bereitstellen Entwickler-Discord Werden Sie Teil der Community Jetzt entwickeln Partner Partner-Netzwerk Cloudflare hilft Ihnen zu wachsen, Innovationen voranzutreiben und Kundenbedürfnisse gezielt zu erfüllen. Partner-Portal Ressourcen finden und Angebote registrieren Arten von Partnerschaften PowerUP-Programm Unternehmenswachstum vorantreiben – während Kunden zuverlässig verbunden und geschützt bleiben Technologiepartner Entdecken Sie unser Ökosystem aus Technologie-Partnern und Integrationen Globale Systemintegratoren Unterstützen Sie eine nahtlose, groß angelegte digitale Transformation Service-Provider Entdecken Sie unser Netzwerk von geschätzten Service-Providern Self-Serve-Agenturprogramm Verwalten Sie Self-Serve-Konten für Ihre Kunden Peer-to-Peer-Portal Traffic-Einblicke für Ihr Netzwerk Einen Partner finden Steigern Sie Ihr Geschäft – vernetzen Sie sich mit Cloudflare Powered+ Partnern. Ressourcen Vertiefung Demos + Produktführungen On-Demand-Produktdemos Kundenreferenzen Mit Cloudflare zum Erfolg Webinare Aufschlussreiche Diskussionen Workshops Virtuelle Foren Bibliothek Hilfreiche Leitfäden, Roadmaps und mehr Berichte Erkenntnisse aus der Forschung von Cloudflare Blog Technische Vertiefungen und Produktneuigkeiten Learning Center Lerntools und praktische Ratgeber Erstellen Referenz-Architektur Technische Leitfäden Lösungs- & Produktleitfäden Produktdokumentation Dokumentation Dokumentation für Entwickler Kennenlernen theNET Erkenntnisse für das digitale Unternehmen Cloudflare TV Innovative Reihen und Events Cloudforce One Bedrohungsforschung und -maßnahmen Radar Internet-Traffic und Sicherheitstrends Analyseberichte Berichte von Branchenanalysten Ereignisse Kommende regionale Events Vertrauen, Datenschutz und Compliance Compliance-Informationen und -Richtlinien Support Kontakt Community-Forum Kontozugang verloren? Entwickler-Discord Hilfe holen Unternehmen Unternehmensinfos Leadership Vorstellung unseres Führungsteams Anlegerbeziehungen Informationen für Anleger Presse Aktuelle Nachrichten entdecken Stellenausschreibungen Offene Stellen erkunden Vertrauen, Datenschutz und Sicherheit Datenschutz Richtlinien, Daten und Schutz Vertrauen Richtlinien, Prozess und Sicherheit Compliance Zertifizierung und Regulierung Transparenz Richtlinien und Hinweise Öffentliches Interesse Humanitäre Hilfe Projekt Galileo Behörden Projekt „Athenian“ Wahlen Cloudflare for Campaigns Gesundheit Project Fair Shot Globales Netzwerk Globale Standorte und Status Anmelden Vertrieb kontaktieren Sichere digitale Modernisierung für globale Banken Cloudflare ermöglicht es Banken, nahtlose, sichere digitale Erlebnisse zu bieten und gleichzeitig die Anforderungen an Datensouveränität und Ausfallsicherheit sowie gesetzliche Vorschriften zu erfüllen – und damit Innovation und betriebliche Effizienz zu fördern. Jetzt für Demo anmelden Kurzbeschreibung jetzt anfordern Verbesserte Sicherheit in einer immer größeren Bedrohungslandschaft Cloudflare bietet robusten Schutz vor neuen Bedrohungen, einschließlich Web-, API- und Netzwerkschwachstellen – mit modernster Verschlüsselung sowie KI-gesteuerter Bedrohungserkennung und entsprechenden Reaktionsmöglichkeiten. Moderne App-Entwicklung und Innovation in der Cloud Treiben Sie die digitale Modernisierung voran, indem Sie die sichere Entwicklung von Cloud-Anwendungen ermöglichen und dabei fortschrittliche KI und Machine Learning für ein verbessertes Kundenerlebnis einbeziehen. Ausfallsicherheit und Performance nach Maß Sorgen Sie für eine hohe Ausfallsicherheit und Performance Ihres Netzwerks mit globaler Reichweite – und erfüllen Sie gleichzeitig die Anforderungen an die Datensouveränität, um ein besseres Kundenerlebnis zu gewährleisten. Vereinfachte Einhaltung von Vorschriften Erfüllen Sie die Anforderungen globaler Vorschriften, einschließlich PCI, DSGVO, DORA und NIS2, um die Compliance zu gewährleisten und gleichzeitig sensible Daten zu schützen und die betriebliche Effizienz sicherzustellen. Gestalten Sie das Banking-Erlebnis neu – mit sicheren, skalierbaren und gesetzeskonformen digitalen Lösungen Schutz vor neuen Cyberbedrohungen Banken sind mit einer sich verändernden Bedrohungslandschaft und strengeren regulatorischen Anforderungen konfrontiert. Fortschrittliche Bedrohungsdaten und Erkenntnisse in Echtzeit helfen Banken, digitale Assets proaktiv zu schützen. Wir haben einen unvergleichlichen Überblick, da wir 20 % des weltweiten Traffics analysieren. So können wir täglich Hunderte Milliarden von Bedrohungen blockieren und Ihre Umgebungen schützen. Darüber hinaus helfen wir Ihnen, sich vor den am häufigsten für Datenverstöße genutzten Vektoren zu schützen, indem wir Ransomware, Phishing und Schatten-IT mit unserer Zero-Trust-Sicherheit sowie Angriffe auf Webanwendungen oder die Lieferkette mit modernster Verschlüsselung, DDoS und clientseitigem Schutz stoppen. Mehr dazu Innovationen fördern – mit moderner Cloud-Anwendungsentwicklung Beschleunigen Sie die digitale Zukunft und Innovation mit moderner Anwendungsentwicklung in der Cloud. Integrieren Sie KI, Machine Learning und Big Data-Analysen sicher in ihre Abläufe und sorgen Sie so für personalisierte Dienstleistungen und optimierte Prozesse. Modernisieren Sie Ihre Kernsysteme und führen Sie neue Finanzprodukte wie digitale Wallets ein, um die Kundenbindung über alle Berührungspunkte hinweg zu verbessern. Mehr dazu Unerreichte Performance, Ausfallsicherheit und globale Reichweite Stellen Sie sicher, dass Ihr Betrieb mit einer Netzwerkkapazität von 280 Tbit/s und Verbindungen mit geringer Latenz (~50 ms von 95 % der Nutzer) stabil und hochperformant bleibt. Bieten Sie globale Redundanz mit unserem Anycast-Netzwerk-Routing, das es mehreren Servern ermöglicht, alle unsere Dienste auszuführen, während sie sich dieselbe IP-Adresse teilen und Anfragen an den nächstgelegenen Server weiterleiten. Unterstützen Sie die Anforderungen von zwei Anbietern mit unserem Multi-Vendor Active/Standby für den Schutz des L3-Netzwerk-Traffics. Diese Netzwerkstärke garantiert einen einheitlichen, zuverlässigen Service – selbst bei Traffic-Spitzen –, sodass Ihre Kunden ununterbrochene Erlebnisse genießen können. Mehr dazu Globale Vorschriften wirksam einhalten Erfüllen Sie wichtige Vorschriften wie PCI DSS 4.0, DSGVO, DORA und NIS2. Ein Zero-Trust-Sicherheitskonzept gewährleistet eine kontinuierliche Identitätsprüfung und strenge Zugriffskontrollen, während Anwendungssicherheit, robuste Verschlüsselung und Datenmaskierung sensible Informationen schützen. Wir helfen Ihnen, für Audits gewappnet zu sein, Risiken zu minimieren und eine reibungslose Einhaltung der regulatorischen Vorschriften zu gewährleisten. Mehr dazu Höhere Kundenbindung, geringeres Risiko und bessere Reaktionszeiten – mit der Connectivity Cloud von Cloudflare 49 % Steigern Sie die Kundenbindung aufgrund der Anwendungsperformance um bis zu 49 % 1 50 % Senken Sie die Wahrscheinlichkeit von Verstößen gegen Richtlinien und Vorschriften um bis zu 50 % 2 75 % Verkürzen Sie die Reaktionszeit bei DDoS-Angriffen um bis zu 75 % 3 Anerkennung durch Analysten Cloudflare wurde in den Gartner® Magic Quadrant™ für SSE aufgenommen Wir fühlen uns durch diese Anerkennung in unserer „Light Branch, Heavy Cloud“-Architektur bei Cloudflare bestätigt und in unserer Fähigkeit, globale, cloud-orientierte Unternehmen bei der Beschleunigung ihrer Netzwerkmodernisierung zu unterstützen. Bericht lesen Cloudflare wurde in „The Forrester Wave™: Edge Development Platforms, Q4 2023“ als Leader eingestuft Die Forrester Research Inc. bewertete die wichtigsten Anbieter auf dem Markt für Edge-Entwicklungsplattformen anhand von 33 Kategorien, darunter Entwicklererfahrung, Sicherheit sowie Preisflexibilität und Transparenz. Bericht lesen Cloudflare ist „Leader" im GigaOm-Bericht „Radar for CDN“ 2024 Cloudflare wurde im GigaOm-Bericht „Radar for CDN“ 2024 als Leader und Outperformer ausgezeichnet. Der GigaOm Radar-Bericht bewertete neunzehn Anbieterlösungen in einer Reihe von konzentrischen Ringen, wobei diejenigen, die näher an der Mitte liegen, als insgesamt wertvoller eingestuft wurden. Bericht lesen SoFi neutralisiert schädlichen Traffic mit Cloudflare Angesichts der ständigen Bedrohung durch Cyberangriffe hat sich das Sicherheitsteam von SoFi im Jahr 2018 auf die Suche nach einer Web Application Firewall (WAF) gemacht. Sie wollten eine einfach zu bedienende Lösung, die nicht nur schädlichen Traffic blockiert, sondern auch mit der Zeit intelligent wird, wenn neue Bedrohungen auftauchen. Mithilfe der Cloudflare-WAF konnten die SoFi-Ingenieure schnell granulare Regelsätze entwickeln und anwenden. Es gelang ihnen so, bösartigen Traffic um mehr als 60 % zu reduzieren, wobei die Zahl der Fehlalarme bemerkenswert niedrig war. „Besonders überrascht hat uns, wie einfach und intuitiv die Cloudflare WAF zu bedienen ist. Unsere Techniker wussten im Handumdrehen, wie alles funktioniert. Probleme, für die wir früher Tage brauchten, können wir mit Cloudflare in wenigen Stunden lösen. Wir haben die Nutzung der Cloudflare-Produktsuite jetzt noch erweitert. Die Integration jeder einzelnen Cloudflare-Lösung verlief reibungslos und ohne Probleme.“ 35 % der Fortune 500-Unternehmen vertrauen uns Alle Kundenreferenzen anzeigen Erste Schritte mit Cloudflare Unsere Experten helfen Ihnen, die richtige Lösung für Ihr Unternehmen zu finden. Einen Experten sprechen Jetzt für Demo anmelden Quellen: TechValidate by Survey Monkey, TechValidate-Studie zu Cloudflare Ibid Ibid ERSTE SCHRITTE Free-Tarife KMU-Tarife Für Unternehmen Empfehlung erhalten Demo anfragen Vertrieb kontaktieren LÖSUNGEN Connectivity Cloud Anwendungsdienste SASE- und Workspace-Sicherheit Netzwerkdienste Entwicklerplattform SUPPORT Hilfe-Center Kundensupport Community-Forum Entwickler-Discord Kein Kontozugang mehr? Cloudflare-Status COMPLIANCE Ressourcen rund um Compliance Vertrauen DSGVO Verantwortungsvolle KI Transparenz­bericht Regelverstoß melden ÖFFENTLICHES INTERESSE Projekt Galileo Projekt Athenian Cloudflare for Campaigns Projekt „Fair Shot“ UNTERNEHMEN Über Cloudflare Netzwerkkarte Unser Team Logos und Pressekit Diversität, Gleichberechtigung und Inklusion Impact/ESG © 2026 Cloudflare, Inc. Datenschutzrichtlinie Nutzungsbedingungen Sicherheitsprobleme berichten Vertrauen und Sicherheit Cookie-Einstellungen Markenzeichen Impressum
2026-01-13T09:29:32
https://cloudflare.com/es-la/zero-trust/solutions/multi-channel-phishing/
Phishing multicanal | Zero Trust | Cloudflare Me interesa Idiomas English English (United Kingdom) Deutsch Español (Latinoamérica) Español (España) Français Italiano 日本語 한국어 Polski Português (Brasil) Русский 繁體中文 简体中文 Plataforma Conectividad cloud La conectividad cloud de Cloudflare ofrece más de 60 servicios de red, seguridad y rendimiento. Enterprise Para organizaciones grandes y medianas Pequeña empresa Para organizaciones pequeñas Socio Ser socio de Cloudflare Casos de uso Moderniza tus aplicaciones Acelera el rendimiento Protege la disponibilidad de tus aplicaciones Optimiza tu experiencia en la web Moderniza tu seguridad Reemplaza tu VPN Protégete contra el phishing Protege tu aplicaciones web y tus API Moderniza tus redes Red de cafeterías Moderniza tu WAN Simplifica tu red corporativa Temas de CXO Adopta la IA Incorpora IA a los equipos de trabajo y a las experiencias digitales Seguridad de IA Protege las aplicaciones de IA generativa y agéntica Cumplimiento de los datos Optimiza el cumplimiento normativo y minimiza el riesgo Criptografía poscuántica Protege los datos y cumple con los estándares de cumplimiento normativo Industrias Atención médica Banca Minoristas Videojuegos Sector público Recursos Guías de producto Arquitecturas de referencia Informes de analistas Eventos Eventos Demostraciones Seminarios web Talleres Solicitar una demo Productos Productos Seguridad del espacio de trabajo Acceso a la red Zero Trust Puerta de enlace web segura Seguridad del correo electrónico Agente de seguridad de acceso a la nube Seguridad para aplicaciones Protección DDoS a la capa 7 Firewall de aplicaciones web Seguridad de la API Gestión de bots Rendimiento de aplicaciones CDN DNS Enrutamiento inteligente Load balancing Redes y SASE Protección DDoS a las capas 3 - 4 NaaS/SD- WAN Firewall como servicio Interconexión de red Planes y precios Planes Enterprise Planes para pequeñas empresas Planes individuales Compara planes Servicios globales Paquetes de soporte para un rendimiento exitoso Experiencia optimizada de Cloudflare Servicios profesionales Implementación guiada por expertos Gestión de cuentas técnicas Gestión técnica enfocada Servicio de operaciones de seguridad Supervisión y respuesta de Cloudflare Registro de dominios Compra y gestiona dominios 1.1.1.1 Resolución de DNS gratuita Recursos Guías de producto Arquitecturas de referencia Informes de analistas Demos de productos y recorridos Ayúdame a elegir Desarrolladores Documentación Biblioteca para desarrolladores Documentación y guías Demos de aplicaciones Explora lo que puedes crear Tutoriales Tutoriales de creación paso a paso Arquitectura de referencia Diagramas y patrones de diseño Productos Inteligencia artificial AI Gateway Observa y controla las aplicaciones de IA Workers AI Ejecuta modelos de aprendizaje automático en nuestra red Proceso Observability Registros, métricas y seguimientos Workers Crea e implementa aplicaciones sin servidor Multimedia Images Transforma y optimiza imágenes Realtime Crea aplicaciones de audio y video en tiempo real Almacenamiento y base de datos D1 Desarrolla bases de datos SQL sin servidor R2 Almacena datos sin costosas tarifas de salida Planes y precios Workers Crea e implementa aplicaciones sin servidor Workers KV Almacén de clave-valor sin servidor para aplicaciones R2 Almacena datos sin costosas tarifas de salida Descubre proyectos Historias de nuestros clientes Demo de IA en 30 segundos Guía rápida para empezar Descubre Workers Playground Crea, prueba e implementa Discord para desarrolladores Únete a la comunidad Comienza a crear Socios Red de socios Crece, innova y satisface las necesidades de los clientes con Cloudflare Portal de socios Encuentra recursos y registra acuerdos Tipos de asociación Programa PowerUP Impulsa el crecimiento de tu negocio mientras garantizas la conexión y la seguridad de tus usuarios Socios de tecnología Explora nuestro ecosistema de asociaciones e integraciones tecnológicas Integradores de sistemas globales Apoyar la transformación digital eficiente a gran escala Proveedores de servicios Descubre nuestra red de valiosos proveedores de servicios Programa de agencias de autoservicio Gestiona las cuentas de autoservicio de tus clientes Portal punto a punto Información sobre el tráfico de tu red Encuentra un socio Impulsa tu negocio - conéctate con los socios de Cloudflare Powered+. Recursos Eventos Demos y recorridos por los productos Demostraciones de productos a pedido Casos prácticos Cloudflare, la clave del éxito Seminarios web Debates interesantes Talleres Foros virtuales Biblioteca Guías útiles, planes de desarrollo y mucho más Informes Información sobre investigaciones de Cloudflare Blog Análisis técnicos y novedades de productos Centro de aprendizaje Herramientas educativas y contenido práctico Desarrollar Arquitectura de referencia Guías técnicas Guías de soluciones y productos Documentación del producto Documentación Documentación para desarrolladores Explorar theNET Información estratégica para empresas digitales Cloudflare TV Series y eventos innovadores Cloudforce One Investigaciones y operaciones sobre amenazas Radar Tendencias del tráfico y la seguridad en Internet Informes de analistas Informes de investigación del sector Eventos Próximos eventos regionales Confianza, privacidad y cumplimiento normativo Información y políticas de cumplimiento normativo Soporte Te ayudamos Foro de la comunidad ¿Has perdido el acceso a tu cuenta? Discord para desarrolladores Te ayudamos Empresa información de la empresa Liderazgo Conoce a nuestros líderes Relaciones con inversores Información para inversores Prensa Consulta noticias recientes Empleo Explora las posiciones disponibles confianza, privacidad y seguridad Privacidad Política, datos y protección Confianza Política, proceso y seguridad Cumplimiento normativo Certificación y regulación Transparencia Política y divulgaciones INTERÉS PÚBLICO Asistencia humanitaria Proyecto Galileo Sector público Proyecto Athenian Elecciones Cloudflare para campañas Salud Project Fair Shot Red global Ubicaciones globales y estado Iniciar sesión Contacta con Ventas Resúmenes de Cloudy LLM de detecciones de correo electrónico | Leer el blog > SASE y seguridad del espacio de trabajo Descripción general Soluciones Productos Recursos Precios Protégete contra el phishing multicanal con Cloudflare Implementa una protección por capas que no se limite solo a tu bandeja de entrada La conectividad cloud de Cloudflare ofrece un enfoque automatizado y multicapa para detener las amenazas de phishing a través del correo electrónico, SMS, redes sociales, mensajería instantánea y otras aplicaciones de colaboración. Te ayudamos LA DIFERENCIA DE CLOUDFLARE Protección casi sin configuración y muy eficaz Minimiza el riesgo de phishing con capacidades de detección líderes en el sector que requieren un ajuste mínimo. Mayor consolidación, menor costo Reduce el gasto con una única plataforma totalmente integrada que aborda todos los casos de uso de phishing. Fácil de implementar y gestionar Benefíciate de una protección inmediata a la vez que reduces el tiempo y el esfuerzo necesarios para la gestión continua. CÓMO FUNCIONA Implementa una protección multicanal completa con una única plataforma Utiliza la plataforma de seguridad unificada de Cloudflare para proteger primero el correo electrónico y, a continuación, habilita servicios adicionales de Zero Trust para ampliar la protección contra el phishing a todos los canales. Leer el resumen de solución Implementa y escala con facilidad Incorpora rápidamente la seguridad del correo electrónico para proteger el canal más importante, y luego activa con facilidad las funciones multicanal a tu propio ritmo. Detén las amenazas al correo electrónico Bloquea automáticamente los ataques al correo electrónico corporativo (BEC), los archivos adjuntos maliciosos y otras amenazas por correo electrónico mediante el análisis contextual basado en el aprendizaje automático. Evita las fugas por robo de credenciales Implementa el acceso condicional y las claves de seguridad FIDO2 resistentes al phishing que actúan como última línea de defensa en caso de que se vulneren o roben las credenciales. Bloquea los ataques basados en enlaces engañosos Aísla a los usuarios de ataques selectivos que utilizan varias aplicaciones de colaboración para incitar a los usuarios a hacer clic en enlaces ofuscados. Werner Enterprises detiene los intentos de phishing y consolida la seguridad con Cloudflare Werner Enterprises, uno de los mayores transportistas de carga de camiones de Estados Unidos, está en el centro de una alianza de soluciones para cadenas de suministro de categoría mundial. La empresa necesitaba aumentar la protección contra el phishing para su numerosa y dispersa plantilla a medida que los ataques aumentaban en términos de frecuencia y sofisticación. Werner implementó la solución Cloudflare Email Security para proteger las bandejas de entrada de Microsoft 365, mejorar la protección de los usuarios móviles e itinerantes y adoptar un enfoque más proactivo para detener el phishing. La empresa logró reducir la entrada de correos electrónicos maliciosos y la complejidad de la gestión. "Desde que lo implementamos, hemos observado una reducción del 50 % en el número de correos electrónicos maliciosos o sospechosos que nuestros usuarios reciben cada día". ¿Estás listo para detener el phishing multicanal? Te ayudamos Reconocimientos de analistas Cloudflare se ubicó entre los 3 primeros en la categoría "Oferta actual" en este informe de analistas de seguridad del correo electrónico Cloudflare ha sido reconocido como "competidor sólido" en el informe The Forrester Wave™: Email, Messaging, And Collaboration Security Solutions, 2.° trimestre de 2025. Recibimos las mayores puntuaciones posibles, 5.0/5.0 en 9 criterios, que incluyen antimalware y aislamiento de entornos, detección de URL maliciosas y seguridad web, información sobre amenazas y análisis y procesamiento de contenido. Según el informe, "Cloudflare es una opción sólida para las organizaciones que buscan mejorar las herramientas actuales de seguridad de correo electrónico, mensajería y colaboración con análisis y procesamiento de contenido detallados y capacidades de detección de malware. Leer informe ¿Por qué Cloudflare? La conectividad cloud de Cloudflare simplifica la protección contra el phishing multicanal La plataforma unificada de Cloudflare de servicios de seguridad y conectividad nativos de la nube aborda el phishing en el correo electrónico, la mensajería instantánea, los SMS, las redes sociales y otras aplicaciones de colaboración. Arquitectura modular Aborda la totalidad de los requisitos relacionados con la seguridad y la red, y aprovecha las ventajas de una amplia interoperabilidad y servicios personalizables. Rendimiento Protege y brinda a todos tus usuarios las herramientas que necesitan con una red global que está aproximadamente a 50 m/s del 95 % de los usuarios de Internet. Información sobre amenazas Evita una amplia gama de ciberataques con la información obtenida del redireccionamiento mediante proxy de aproximadamente el 20 % de la web y del bloqueo de miles de millones de amenazas diarias. Interfaz unificada Consolida tus herramientas y flujos de trabajo. Recursos Slide 1 of 6 RESUMEN DE SOLUCIONES Descubre cómo Cloudflare ofrece una protección completa contra el phishing a todos los usuarios y aplicaciones con la seguridad del correo electrónico y los servicios Zero Trust. Obtener el resumen de la solución Análisis Descubre cómo proteger preventivamente a los usuarios de los intentos de phishing, los ataques BEC y los ataques a través de enlaces de correos electrónicos con Cloudflare Email Security. Visita la página web Análisis Descubre qué ataques de phishing pasan por alto tus sistemas de seguridad del correo electrónico, sin coste y sin impacto en tus usuarios finales. Solicita una evaluación gratuita RESUMEN DE SOLUCIONES Descubre cómo Cloudflare puede reducir los riesgos de hacer clic en enlaces de phishing mediante la aplicación de protecciones y controles de aislamiento del navegador. Descargar informe Caso práctico Descubre cómo Cloudflare bloqueó un sofisticado ataque de phishing basado en texto con autenticación multifactor (MFA) que utiliza claves duras. Leer caso práctico Informe Analiza las principales tendencias de los ataques sobre la base de aproximadamente 13 000 millones de correos electrónicos procesados por Cloudflare durante un año. Descargar informe RESUMEN DE SOLUCIONES Descubre cómo Cloudflare ofrece una protección completa contra el phishing a todos los usuarios y aplicaciones con la seguridad del correo electrónico y los servicios Zero Trust. Obtener el resumen de la solución Análisis Descubre cómo proteger preventivamente a los usuarios de los intentos de phishing, los ataques BEC y los ataques a través de enlaces de correos electrónicos con Cloudflare Email Security. Visita la página web Análisis Descubre qué ataques de phishing pasan por alto tus sistemas de seguridad del correo electrónico, sin coste y sin impacto en tus usuarios finales. Solicita una evaluación gratuita RESUMEN DE SOLUCIONES Descubre cómo Cloudflare puede reducir los riesgos de hacer clic en enlaces de phishing mediante la aplicación de protecciones y controles de aislamiento del navegador. Descargar informe Caso práctico Descubre cómo Cloudflare bloqueó un sofisticado ataque de phishing basado en texto con autenticación multifactor (MFA) que utiliza claves duras. Leer caso práctico Informe Analiza las principales tendencias de los ataques sobre la base de aproximadamente 13 000 millones de correos electrónicos procesados por Cloudflare durante un año. Descargar informe RESUMEN DE SOLUCIONES Descubre cómo Cloudflare ofrece una protección completa contra el phishing a todos los usuarios y aplicaciones con la seguridad del correo electrónico y los servicios Zero Trust. Obtener el resumen de la solución Análisis Descubre cómo proteger preventivamente a los usuarios de los intentos de phishing, los ataques BEC y los ataques a través de enlaces de correos electrónicos con Cloudflare Email Security. Visita la página web Análisis Descubre qué ataques de phishing pasan por alto tus sistemas de seguridad del correo electrónico, sin coste y sin impacto en tus usuarios finales. Solicita una evaluación gratuita RESUMEN DE SOLUCIONES Descubre cómo Cloudflare puede reducir los riesgos de hacer clic en enlaces de phishing mediante la aplicación de protecciones y controles de aislamiento del navegador. Descargar informe Caso práctico Descubre cómo Cloudflare bloqueó un sofisticado ataque de phishing basado en texto con autenticación multifactor (MFA) que utiliza claves duras. Leer caso práctico Informe Analiza las principales tendencias de los ataques sobre la base de aproximadamente 13 000 millones de correos electrónicos procesados por Cloudflare durante un año. Descargar informe PRIMEROS PASOS Planes gratuitos Planes para pequeñas empresas Para empresas Sugerencias Solicitar demostración Contacta con Ventas SOLUCIONES Conectividad cloud Servicios de aplicación SASE y seguridad del espacio de trabajo Servicios de red Plataforma para desarrolladores SOPORTE Centro de ayuda Atención al cliente Foro de la comunidad Discord para desarrolladores ¿Has perdido el acceso a tu cuenta? Estado de Cloudflare CUMPLIMIENTO NORMATIVO Recursos de conformidad Confianza GDPR IA responsable Informe de transparencia Notificar abuso INTERÉS PÚBLICO Proyecto Galileo Proyecto Athenian Cloudflare para campañas Proyecto Fairshot EMPRESA Acerca de Cloudflare Mapa de red Nuestro equipo Logotipos y dossier de prensa Diversidad, equidad e inclusión Impact/ESG © 2026 Cloudflare, Inc. Política de privacidad Términos de uso Informar sobre problemas de seguridad Confianza y seguridad Preferencias de cookies Marca comercial
2026-01-13T09:29:32
http://global.chinadaily.com.cn/business/5c233896a310d912140510a6
Video - Chinadaily.com.cn Global Edition China Edition ASIA 中文 双语 Français Global Edition HOME OPINION VIDEO WORLD TECH CHINA BUSINESS CULTURE TRAVEL SPORTS HOME OPINION VIDEO WORLD CHINA TECHNOLOGY BUSINESS CULTURE TRAVEL SPORTS SERVICE NEWSPAPER China Daily PDF China Daily E-paper Subscribe Home | Video Petting wolves in China? No kidding! 2026-01-09 10:07 Eyeing China's high-tech vision 2026-01-07 11:06 New Year holiday sees strong growth in travel, consumption 2026-01-06 13:32 ADB: Reform drive keeps China's growth outlook encouraging 2026-01-06 12:06 Cool dancing robots bust a move in Guangxi 2026-01-06 09:37 Ice and snow as a bridge to common prosperity 2026-01-05 17:14 ADB: China's market offers ample opportunities for foreign companies 2026-01-05 14:58 Expert: Less items of action plan means improvement of business environmen 2026-01-05 13:03 China holds clear advantages in the Fourth Industrial Revolution 2026-01-05 11:40 Why Shanghai is CEOs' top choice? 2026-01-04 12:48 China Daily launches 'Shopping in China' platform 2026-01-03 21:52 China's new domestic demand engine 2026-01-02 16:15 Ice and snow tourism: one industry boosting many 2025-12-31 13:20 CAITEC expert: China not just world's factory but key global market 2025-12-31 13:01 CAITEC expert: China's consumption potential remains vast, hinges on environment and incomes 2025-12-31 11:09 China opens wider, the world gains greater 2025-12-31 09:56 Expert suggests letting individuals decide on holiday shifts 2025-12-30 17:58 China's innovation: Breaking through barriers 2025-12-30 11:27 'My life has always been linked to skiing' 2025-12-29 15:37 China-ASEAN AI gala leaves audience mesmerized 2025-12-29 15:26 1 2 3 4 5 6 7 8 9 10 Next    >>| 1/80 Next Most Popular Columnists World should condemn naked US imperialism FTP has given Sanya a complete makeover A plea for the sake of left-behind kids Editor's Pick Women seen at forefront of AI adoption Foreign firms bullish on China opportunities Special 2025 'Charming Beijing' GMD SCO Summit Cities Tianjin Grow with SCO Russia-Ukraine conflict: Three years on Global Edition Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. 中文 Desktop BACK TO THE TOP China Edition 中文 HOME OPINION VIDEO WORLD CHINA TECHNOLOGY BUSINESS CULTURE TRAVEL SPORTS SERVICE NEWSPAPER China Daily PDF China Daily E-paper Subscribe Copyright 1995 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment -->
2026-01-13T09:29:32
https://english.shanghai.gov.cn/
SHANGHAI CHINA-International Services Shanghai Easier Entry Shanghai unveils measures to streamline immigration procedures Graphic Shanghai 2026 action plan to develop world-class business environment All the Fun in Town Exhibitions & performances in January Maritime Link Shanghai-Chancay route boosts China-Peru trade Blueprint Shanghai's new five-year plan charts course for 2026-2030 I Want To Do Business Work in Shanghai Travel in Shanghai Study in Shanghai Shop in Shanghai In Focus A list of animal adoption communities in Shanghai Raising a Pet Global Taste in Shanghai: A year-long celebration of international cuisine Food New Shanghai action plan targets stronger tech and startup ecosystem Policy Insights Can I handle departure tax refund after leaving Shanghai? FAQ A guide to getting an electronic vaccination certificate Medical Services Expats' favorite place for a new outfit Expat Services Latest Shanghai unveils plan to boost advanced manufacturing by 2028 Shanghai sci-tech museum eyes reopening during Chinese New Year Shanghai comedy festival wraps up with record-breaking shows January 12, 2026 Recap: Intl exchange activities of Shanghai leadership (Jan 5-11) January 12, 2026 Shanghai's Global Taste festival opens with European season January 12, 2026 Shanghai releases 26 measures to support foreign-funded R&D centers Read More Read More Living in Shanghai Anxiety-free guide for living in the city Useful Apps Pets Hotel Booking Transportation Mobile Services Visas Consulates Emergency Numbers Work Permit Waste Classification Housekeeping Become a Volunteer Marriage & Divorce Rent in Shanghai Utility Bills Healthcare Public Holidays Shopping Centers Must-Visit Attractions Museums Nightlife Bars & Pubs Cafes Specialty Food ··· Read More Online Services Visa Application Visa Extension, Renewal and Replacement Online Arrival Card Individual Port Visa Electronic Port Visa Health Declaration --> Accommodation Registration Residence Permit (foreigners) Residence Permit (foreign talent) Stay Permit Exit-Entry Permit Permanent Residence Temporary Driving Permit Heath Check Reservation Applying for Scholarship Fast Pass for Foreign Talent Salary Exchange and Remittance Online Business Registration Tax Assistance Tying the Knot Getting Divorced Expat Stories Gain insights into expats' unique experiences, challenges, and unforgettable moments in Shanghai. Syrian entrepreneur calls Shanghai home Why a global citizen chooses Shanghai Expat blogger spends a day as a food delivery rider in Shanghai Through the shotgun seat: Shanghai's ride-hailing under a blogger's legal lens My 2025 Shanghai Marathon Mexican chef turns smoked BBQ into Shanghai success Frequently Asked Questions Prompt assistance and comprehensive support for a diverse range of common queries and questions you may come across. Can I extend my S2 visa? Do I need to store my luggage during my layover in Shanghai? How to submit a supplementary declaration for a package to Shanghai Customs? Can I apply for government scholarship for a language training program? Shanghai 12345 A guide to Shanghai for Expats Shanghai Weekly Bulletin
2026-01-13T09:29:32
https://www.ecns.cn/hd/2026-01-07/detail-iheyrzrv3836999.shtml
Indonesia welcomes its first locally born giant panda cub --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo Indonesia welcomes its first locally born giant panda cub ( 1 /5) 2026-01-07 10:27:52 Ecns.cn Editor :Gong Weiwei Taman Safari Indonesia (TSI) in Bogor, West Java, Indonesia, holds a media briefing on a newly born giant panda cub on Jan. 6, 2026, with video footage of the cub played on a large screen at the venue. (Photo: China News Service/Li Zhiquan) Indonesia announced the birth of a giant panda cub at TSI, marking a major milestone in the country's efforts to protect endangered species. The cub was born on Nov. 27, 2025 to two pandas Cai Tao and Hu Chun sent to Indonesia in 2017 under a 10-year conservation cooperation program with China. Taman Safari Indonesia (TSI) in Bogor, West Java, Indonesia, holds a media briefing on a newly born giant panda cub on Jan. 6, 2026, with video footage of the cub played on a large screen at the venue. (Photo: China News Service/Li Zhiquan) Giant panda Cai Tao attracts visitors at Taman Safari Indonesia (TSI) in Bogor, West Java, Indonesia on Jan. 6, 2026. (Photo: China News Service/Li Zhiquan) Taman Safari Indonesia (TSI) in Bogor, West Java, Indonesia, holds a media briefing on a newly born giant panda cub on Jan. 6, 2026, with video footage of the cub played on a large screen at the venue. (Photo: China News Service/Li Zhiquan) Taman Safari Indonesia (TSI) in Bogor, West Java, Indonesia, holds a media briefing on a newly born giant panda cub on Jan. 6, 2026, with video footage of the cub played on a large screen at the venue. (Photo: China News Service/Li Zhiquan) Previous Indonesia announced the birth of a giant panda cub at TSI, marking a major milestone in the country's efforts to protect endangered species. The cub was born on Nov. 27, 2025 to two pandas Cai Tao and Hu Chun sent to Indonesia in 2017 under a 10-year conservation cooperation program with China.--> Next (1) (2) (3) (4) (5) LINE More Photo Chinese FM on Venezuela situation: China always opposes imposing one country's will on another Maduro pleads not guilty in N.Y. court UN Security Council holds emergency meeting on Venezuela Harbin opens its 42nd Ice and Snow Festival China's Yangtze River remains world's busiest inland waterway by cargo throughput Protest held in New York against U.S. military strikes on Venezuela ${visuals_2} ${visuals_3} More Video Insights丨From energy cooperation to industrial co-building: New momentum in Europe-China ties Insights丨China’s economy in UN official’s eyes: Resilience, exports, and high-tech transition Insights丨Portuguese economist sees stability and opportunity in China’s long-term planning (W.E. Talk) Experts on 2026: China's 15th Five-Year Plan significant for the World (W.E. Talk) Experts look to 2026: Seizing opportunities amid crises, forging ahead after breakthroughs The Awkward Chronicles of Uncle Sam: Claimed Glory, Met Chaos ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://docs.aws.amazon.com/cost-management/latest/userguide/duplicate-dashboards.html
Duplicating dashboards - AWS Cost Management Duplicating dashboards - AWS Cost Management Documentation AWS Billing and Cost Management User Guide Duplicating dashboards You might want to duplicate a dashboard when you need to create variations of existing dashboards. For example, you could duplicate a dashboard that tracks costs by service, then modify the copy to track costs by a different dimension like Region or cost allocation tag. This saves time compared to creating a new dashboard from scratch. When you duplicate a dashboard, you create an independent copy with the same widget configurations as the original. The new dashboard appears with "duplicate" added to the original name, which you can modify at any time. Any subsequent changes to the original dashboard won't affect your duplicate, and vice versa. To duplicate a dashboard Open the Billing and Cost Management console at https://console.aws.amazon.com/costmanagement/ . In the navigation pane, choose Dashboards . Select the dashboard you want to duplicate. Choose Actions , and then choose Duplicate dashboard from the dropdown list. In the dialog box that appears, you can modify the name and description for your new dashboard. Choose Duplicate . You can duplicate dashboards that have been shared with you. The duplicated dashboard belongs to your account and you have full edit permissions for it, regardless of the permissions you had on the original dashboard. Javascript is disabled or is unavailable in your browser. To use the Amazon Web Services Documentation, Javascript must be enabled. Please refer to your browser's Help pages for instructions. Document Conventions Deleting dashboards Adding tags to dashboards Did this page help you? - Yes Thanks for letting us know we're doing a good job! If you've got a moment, please tell us what we did right so we can do more of it. Did this page help you? - No Thanks for letting us know this page needs work. We're sorry we let you down. If you've got a moment, please tell us how we can make the documentation better.
2026-01-13T09:29:32
https://www.ecns.cn/hd/2026-01-05/detail-iheymvap1614268.shtml
Venezuelan President Nicolás Maduro transported to Brooklyn detention center --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo Venezuelan President Nicolás Maduro transported to Brooklyn detention center ( 1 /3) 2026-01-05 13:48:20 Ecns.cn Editor :Gong Weiwei Media personnel gather outside the Metropolitan Detention Center in Brooklyn, New York City, Jan. 3, 2026. (Photo provided to China News Service) According to U.S. media reports, Venezuelan President Nicolás Maduro, who was taken into custody by the U.S. military, arrived in New York Saturday evening and was escorted by U.S. Drug Enforcement Administration (DEA) agents to the Metropolitan Detention Center in Brooklyn. The U.S. federal law enforcement officers patrol outside the Metropolitan Detention Center in Brooklyn, New York City, Jan. 3, 2026. (Photo provided to China News Service) The U.S. federal law enforcement officers patrol outside the Metropolitan Detention Center in Brooklyn, New York City, Jan. 3, 2026. (Photo provided to China News Service) Previous According to U.S. media reports, Venezuelan President Nicolás Maduro, who was taken into custody by the U.S. military, arrived in New York Saturday evening and was escorted by U.S. Drug Enforcement Administration (DEA) agents to the Metropolitan Detention Center in Brooklyn.--> Next (1) (2) (3) LINE More Photo In Numbers: China sees 595 million inter-regional trips during New Year holiday In Numbers: China's railway mileage tops 165,000 km International ice sculpture competition heats up in Harbin Mourners pay tribute to Crans-Montana bar fire victims Venezuelan leader Maduro brought to New York Highlights of Chinese President Xi Jinping's 2026 New Year message ${visuals_2} ${visuals_3} More Video (W.E. Talk) Experts on 2026: China's 15th Five-Year Plan significant for the World (W.E. Talk) Experts look to 2026: Seizing opportunities amid crises, forging ahead after breakthroughs The Awkward Chronicles of Uncle Sam: Claimed Glory, Met Chaos The Dunhuang Flying Dancers in the 1,360°C kiln fire The Awkward Chronicles of Uncle Sam: Tariff Bullying and Backfire (W.E. Talk) Experts' review on 2025: China serves as a stabilizing force in a world of turmoil and chaos ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://wordpress.com/de/support/auf-wordpress-com-mit-ssh-verbinden/
Auf WordPress.com mit SSH verbinden – Support Produkte Funktionen Ressourcen Tarife Anmelden Jetzt starten Menü WordPress-Hosting WordPress für Agenturen Werde Partner Domainnamen KI-Website-Builder Website-Baukasten Erstelle ein Blog Newsletter Professional E-Mail Webdesign-Service Commerce WordPress Studio WordPress für Unternehmen   Übersicht WordPress Themes WordPress-Plugins WordPress-Vorlagen Google Apps Support-Center WordPress News Firmennamen-Generator Logo Maker Neue Beiträge entdecken Beliebte Schlagwörter Blog-Suche Navigationsmenü schließen Jetzt starten Registrieren Anmelden Über Tarife Produkte WordPress-Hosting WordPress für Agenturen Werde Partner Domainnamen KI-Website-Builder Website-Baukasten Erstelle ein Blog Newsletter Professional E-Mail Webdesign-Service Commerce WordPress Studio WordPress für Unternehmen   Funktionen Übersicht WordPress Themes WordPress-Plugins WordPress-Vorlagen Google Apps Ressourcen Support-Center WordPress News Firmennamen-Generator Logo Maker Neue Beiträge entdecken Beliebte Schlagwörter Blog-Suche Jetpack-App Weitere Informationen Support-Center Anleitungen Kurse Foren Kontakt Suche Support-Center / Anleitungen Support-Center Anleitungen Kurse Foren Kontakt Anleitungen / Konto verwalten / Hosting / Auf WordPress.com mit SSH verbinden Auf WordPress.com mit SSH verbinden SSH oder Secure Shell ist ein Protokoll, mit dem man eine Verbindung zu Diensten wie Webservern herstellen kann. Damit kannst du dich mit unseren Servern verbinden und deine WordPress.com-Website über Befehlszeilen-Tools wie WP-CLI verwalten. Diese Funktion ist auf Websites mit dem WordPress.com Business- oder dem E-Commerce-Tarif verfügbar. In diesem Ratgeber WordPress.com SSH-Anmeldedaten erhalten und SSH aktivieren Ein SSH-Passwort zurücksetzen Mit SSH verbinden Verbinden mit SSH unter MacOS und Linux Verbinden von SSH unter Windows SSH-Schlüssel Hinzufügen eines SSH-Schlüssels zu deinem Konto Verbinden eines bestehenden SSH-Schlüssels mit einer Website Trennen der Verbindung eines Schlüssels mit einer Website Aktualisieren eines bestehenden SSH-Schlüssels Entfernen eines bestehenden SSH-Schlüssels Verwenden von Shell-Befehlen Verwenden der WP-CLI Verwalten von Themes und Plugins mit WP-CLI Überspringen von Themes und Plugins mit WP-CLI Weitere WP-CLI-Ressourcen Was ist, wenn etwas schiefläuft? Häufig gestellte Fragen Kann ich Support für die Verwendung von Befehlszeilentools erhalten? Sind alle Befehle verfügbar? Kann ich mein eigenes SSH-Passwort festlegen? Hast du Fragen? Unseren AI Assistant fragen Zurück nach oben WordPress.com SSH-Anmeldedaten erhalten und SSH aktivieren Wenn du zum ersten Mal auf SSH zugreifst, musst du deine Anmeldedaten erstellen und SSH-Zugriff aktivieren: Navigiere im WordPress.com- Dashboard deiner Website zu Einstellungen → Hosting-Konfiguration , um die SSH-Optionen deiner Website aufzurufen. Klicke bei Aufforderung auf Anmeldedaten erstellen . Durch diesen einmaligen Vorgang werden der SSH-Benutzername und das Passwort für die ausgewählte Website generiert. Die Anmeldedaten werden sowohl für SFTP- als auch für SSH-Verbindungen verwendet. Bewahre das Passwort an einem sicheren Ort auf. Solltest du es verlieren oder vergessen, kannst du mit dem Button Passwort zurücksetzen ein neues generieren. Suche den Abschnitt SSH Access (SSH-Zugriff) und aktiviere die Option Aktiviere SSH-Zugriff für diese Website . SSH-Zugriff ist standardmäßig deaktiviert. Sobald SSH-Zugriff aktiviert wurde, wird ein Verbindungsbefehl angezeigt. Dieser kann kopiert und in eine Terminalanwendung eingefügt werden. Weitere Informationen dazu, wie du über SSH auf deine Website zugreifen kannst, findest du in unserer Anleitung Mit SSH verbinden . Ein SSH-Passwort zurücksetzen Wenn du dein SFTP/SSH-Passwort vergisst oder verlierst, kannst du es unter Einstellungen → Hosting-Konfiguration zurücksetzen. Klicke im Abschnitt mit den SFTP-/SSH-Anmeldedaten auf Passwort zurücksetzen . Mit SSH verbinden Für den Zugriff auf deine Website über SSH benötigst du deinen SSH-Benutzernamen, dein Passwort und ein Terminalprogramm. Es folgt eine Anleitung, wie du über einige der gängigsten Programme eine Verbindung herstellen kannst. Verbinden mit SSH unter MacOS und Linux Öffne das Terminalprogramm deines Computers. Rufe unter MacOS auf deinem Computer Programme → Dienstprogramme auf und öffne die Terminalanwendung. Für Linux findest du in der Dokumentation zu deiner Distribution weitere Informationen zum Öffnen eines Terminalfensters. In einigen Versionen wird das Terminalprogramm auch als Shell, Konsole oder Eingabeaufforderung bezeichnet. Navigiere im WordPress.com- Dashboard deiner Website zu Einstellungen → Hosting-Konfiguration , um die SSH-Optionen deiner Website aufzurufen. Achte darauf, dass auf der Seite Hosting-Konfiguration SSH-Zugriff aktiviert ist, und kopiere den SSH -Befehl, der für deine Website angegeben ist, z. B. ssh example.wordpress.com@sftp.wp.com . Füge den SSH -Befehl in deine Terminalanwendung ein oder gib diesen ein und drücke die EINGABETASTE. Wenn du zum ersten Mal eine Verbindung herstellst, wird möglicherweise angezeigt, dass dein Terminal die Authentizität des Hosts nicht feststellen kann. Gib „Yes“ (Ja) ein und drücke die EINGABETASTE, um fortzufahren. Du solltest nun von deinem Terminal zur Eingabe eines Passworts aufgefordert werden. Füge das SSH-Passwort ein, das du bei der Erstellung deiner SSH-Anmeldedaten angegeben hast, oder gib es ein und drücke die EINGABETASTE. Beachte, dass bei der Eingabe deines Passworts in deine Terminalanwendung die Zeichen bei der Eingabe nicht angezeigt werden. Das ist normal. Wenn du dein SSH-Passwort vergessen oder verloren hast, kannst du es zurücksetzen . War der Vorgang erfolgreich, solltest du nun mit SSH verbunden sein und Shell- und WP-CLI-Befehle ausführen können. Verbinden von SSH unter Windows Neuere Windows-Versionen, beginnend mit 10, verfügen über SSH-Unterstützung über das Windows-Subsystem für Linux sowie den OpenSSH-Client. Informationen zur Verwendung dieser Methoden findest du in der offiziellen Dokumentation von Microsoft. Eine weitere Option, die sowohl mit aktuellen als auch mit älteren Windows-Versionen genutzt werden kann, ist PuTTY. Lade den kostenlosen PuTTY-Client herunter und installiere diesen. Starte PuTTY, konfiguriere die Einstellungen für Hostname und Port und klicke auf Open (Öffnen). Der Hostname sollte sftp.wp.com lauten. Der Port sollte auf 22 festgelegt sein. PuTTY-SSH-Client für Windows Wenn du zum ersten Mal eine Verbindung herstellst, wirst du möglicherweise aufgefordert, dem RSA2-Fingerabdruck und dem Host zu vertrauen. Klicke auf Yes (Ja). PuTTY öffnet daraufhin einen Terminal-Bildschirm. Gib deinen SSH-Benutzernamen ein und drücke die EINGABETASTE. Gib bei Aufforderung dein SSH-Passwort ein. War der Vorgang erfolgreich, solltest du nun mit SSH verbunden sein und Shell- und WP-CLI-Befehle ausführen können. SSH-Schlüssel Die folgende Anleitung zeigt dir, wie du einen SSH-Schlüssel zu deinem WordPress.com-Konto hinzufügst. Wichtig ist, dass du zuerst den SSH-Schlüssel zu deinem Konto hinzufügst und dann den SSH-Schlüssel mit allen Websites verbindest, für die du ihn verwenden möchtest. Wenn du keinen SSH-Schlüssel auf deinem Computer hast, kannst du die Verbindung zu SSH auch über die Passwortauthentifizierung herstellen. Hinzufügen eines SSH-Schlüssels zu deinem Konto Bevor du deinen SSH-Schlüssel zu deinem WordPress.com-Konto hinzufügst, musst du ihn in deine Zwischenablage kopieren. Dazu hast du mit deinem Computerterminal zwei Möglichkeiten: Mac pbcopy < ~/.ssh/id_rsa.pub Windows clip < ~/.ssh/id_rsa.pub Linux cat ~/.ssh/id_rsa.pub Wenn deine öffentliche SSH-Schlüsseldatei einen anderen Namen als den oben genannten hat, bearbeite den Code so, dass er mit dem Dateinamen auf deinem Computer übereinstimmt. Nachdem du deinen öffentlichen SSH-Schlüssel in deine Zwischenablage kopiert hast, kannst du ihn mit diesen Schritten zu deinem Konto hinzufügen: Navigiere in deinem WordPress.com- Dashboard zu Mein Profil . Klicke auf der Seite „Mein Profil“ auf Sicherheit . Klicke in der Sicherheits-Checkliste auf die Option SSH-Schlüssel . Füge deinen SSH-Schlüssel in das Feld Public SSH Key (Öffentlicher SSH-Schlüssel) ein. Klicke auf den Button SSH-Schlüssel speichern . Sobald du deinen SSH-Schlüssel zu deinem WordPress.com-Konto hinzugefügt hast, musst du ihn an jede Website anhängen, auf der du ihn verwenden möchtest. Verbinden eines bestehenden SSH-Schlüssels mit einer Website Nachdem du einen SSH-Schlüssel zu deinem Konto hinzugefügt hast, musst du ihn an die Website anhängen, mit der du dich über SSH verbinden möchtest. Gehe folgendermaßen vor, um deinen SSH-Schlüssel an eine Website anzuhängen: Navigiere im WordPress.com- Dashboard zu Einstellungen → Hosting-Konfiguration . Verwende im Abschnitt SSH-Zugriff das Feld SSH-Schlüssel , um den gewünschten Schlüssel auszuwählen. Klicke auf den Button SSH-Schlüssel mit der Website verbinden . Sobald dein SSH-Schlüssel mit der Website verbunden ist, kannst du den SSH-Schlüssel bei der Authentifizierung über SSH verwenden. Trennen der Verbindung eines Schlüssels mit einer Website Wenn du dich nicht länger mit deinem SSH-Schlüssel mit einer Website verbinden möchtest, kannst du den Schlüssel folgendermaßen von der Website trennen: Navigiere im WordPress.com- Dashboard zu Einstellungen → Hosting-Konfiguration . Suche im Abschnitt SSH-Zugriff nach dem SSH-Schlüssel, den du entfernen möchtest. Klicke auf den Button Loslösen , um den Schlüssel von der Website zu entfernen. Der SSH-Schlüssel ist so lange mit deinem WordPress.com-Konto verbunden, bis du ihn entfernst. Aktualisieren eines bestehenden SSH-Schlüssels So kannst du deinen öffentlichen SSH-Schlüssel aktualisieren: Navigiere in deinem WordPress.com- Dashboard zu Mein Profil . Klicke auf der Seite „Mein Profil“ auf Sicherheit . Klicke in der Sicherheits-Checkliste auf die Option SSH-Schlüssel . Klicke neben dem Schlüssel, den du aktualisieren möchtest, auf den Button SSH-Schlüssel aktualisieren . Füge deinen aktualisierten SSH-Schlüssel in das Feld Neuer öffentlicher SSH-Schlüssel ein. Klicke auf den Button SSH-Schlüssel aktualisieren , um die Änderungen zu speichern. Entfernen eines bestehenden SSH-Schlüssels Wenn du einen SSH-Schlüssel von deinem WordPress.com-Konto entfernst, wird er auch von jeder Website getrennt, mit der er verbunden ist. Gehe folgendermaßen vor, um einen vorhandenen SSH-Schlüssel von deinem WordPress.com-Konto zu entfernen: Navigiere in deinem WordPress.com-Dashboard zu Mein Profil . Klicke auf der Seite „Mein Profil“ auf Sicherheit . Klicke in der Sicherheits-Checkliste auf die Option SSH-Schlüssel . Klicke auf den Button „SSH-Schlüssel entfernen“, der neben dem vorhandenen Schlüssel angezeigt wird. Eine Bestätigungsmeldung wird angezeigt. Bestätige durch einen Klick auf den OK-Button, dass du den Schlüssel entfernen möchtest. Verwenden von Shell-Befehlen ⚠️ Du solltest bei der Ausführung von Befehlen vorsichtig sein, um Datenverlust oder Schäden an deiner Website zu vermeiden. Führe Befehle nur dann aus, wenn du ihre Funktion genau kennst. Zur Verwendung der Linux-Befehlszeile gibt es zahlreiche Ressourcen. Bekannte Beispiele dafür sind die folgenden Drittanbieter-Quellen: Ubuntu’s Command Line for Beginners Tutorial (Ubuntu-Tutorial – Befehlszeile für Anfänger) freeCodeCamp’s Linux Commands Handbook (freeCodeCamp-Handbuch zu Linux-Befehlen) LinuxCommand.org Microsoft’s Shell Course (Shell-Kurs von Microsoft) Es folgen einige gängige Befehle. Befehl Beschreibung ls Eine Liste des Inhalts des aktuellen Verzeichnisses anzeigen. cd Verzeichnis wechseln. mkdir Einen neuen Ordner/ein neues Verzeichnis erstellen. touch Eine Datei erstellen. rm Eine Datei entfernen. cat Den Inhalt einer Datei anzeigen. cp Kopieren. mv Verschieben. pwd Aktuelles Verzeichnis anzeigen. grep In einer Datei/Zeilen nach einem bestimmten Ausdruck suchen. find Dateien und Verzeichnisse durchsuchen. nano Texteditor. history Die 50 zuletzt verwendeten Befehle anzeigen. Löschen Den Terminal-Bildschirm löschen. du Dateigröße anzeigen. rsync Dateien zum und vom Server kopieren. Verwenden der WP-CLI WP-CLI ist auf WordPress.com vorinstalliert und erweitert die Shell um WordPress-spezifische Kommandozeilentools. Du kannst mit der Ausführung von WP-CLI-Befehlen beginnen, sobald du eine Verbindung zu SSH hergestellt hast. Es gibt viele Befehle und Unterbefehle, die dir bei der Verwaltung und Problembehandlung deiner Website helfen können. Weitere Informationen zu den verfügbaren Befehlen und ihrer Verwendung findest du in unserem WP-CLI-Ratgeber oder in der WP-CLI-Dokumentation von WordPress.org . Verwalten von Themes und Plugins mit WP-CLI WP-CLI kann zur Verwaltung und Problembehandlung von Plugins und Themes verwendet werden. WP-CLI-Befehl Beschreibung wp plugin list Installierte Plugins und deren Status und Version auflisten. wp theme list Installierte Themes auflisten. wp plugin deactivate plugin-name Plugin wird deaktiviert. Ersetze plugin-name durch einen name -Wert, den du über wp plugin list findest. Es können mehrere Plugin-Namen eingegeben werden, um mehr als eines zu deaktivieren. wp plugin activate plugin-name Ein Plugin wird aktiviert. Ersetze plugin-name durch einen name -Wert, den du über wp plugin list findest. Es können mehrere Plugin-Namen eingegeben werden, um mehr als eines zu aktivieren. wp theme activate theme-name Ein Theme aktivieren. Ersetze theme-name durch einen name -Wert, den du über wp theme list findest. wp php-errors Die letzten protokollierten PHP-Fehler auflisten. Das ist nützlich, um problematische Plugins und Themes zu identifizieren, die möglicherweise aktualisiert oder deaktiviert werden müssen. Überspringen von Themes und Plugins mit WP-CLI Wenn auf deiner Website Fehler auftreten und Befehle nicht ausgeführt werden können, ist es gegebenenfalls notwendig, den aktiven Theme- und Plugin-Code der Website zu überspringen. Um dies zu tun, füge --skip-themes und --skip-plugins zu einem WP-CLI-Befehl hinzu. WP-CLI-Befehl Beschreibung wp --skip-plugins --skip-themes plugin deactivate plugin-name Theme- und Plugin-Code überspringen und dann ein Plugin deaktivieren. Ersetze plugin-name durch einen name -Wert, den du über wp plugin list findest. wp --skip-plugins --skip-themes theme activate theme-name Theme- und Plugin-Code überspringen und dann ein Plugin aktivieren. Ersetze theme-name durch einen name -Wert, den du über wp theme list findest. wp --skip-plugins --skip-themes php-errors Theme- und Plugin-Code überspringen und dann die zuletzt protokollierten PHP-Fehler auflisten. Das ist nützlich, um problematische Plugins und Themes zu identifizieren, die möglicherweise aktualisiert oder deaktiviert werden müssen. Weitere WP-CLI-Ressourcen Verwendung der WP-CLI WP-CLI-Dokumentation von WordPress.org WP-CLI-Dokumentation von WooCommerce WP-CLI.org Was ist, wenn etwas schiefläuft? Wenn auf deiner Website Problem auftreten, nachdem du Änderungen über SSH vorgenommen hast, kannst du deine Website von einem Jetpack-Backup wiederherstellen . Wenn du einen Befehl ausführst und etwas Unerwartetes geschieht, können wir dir dabei helfen, deine Website auf eine frühere Version wiederherzustellen. Wir können dir nicht dabei helfen, die Fehler in deinem Befehl zu finden und diese zu korrigieren. Häufig gestellte Fragen Kann ich Support für die Verwendung von Befehlszeilentools erhalten? Aufgrund der Komplexität von SSH und WP-CLI sind wir nicht in der Lage, umfassenden Support für die Verwendung dieser Tools anzubieten. Support-Mitarbeiter helfen dir bei Problemen mit der Verbindung über SSH, können dich aber nicht durch die Verwendung von Befehlen führen. Sind alle Befehle verfügbar? Um eine sichere und leistungsfähige Umgebung bereitzustellen, kann WordPress.com bestimmte Shell- und WP-CLI-Befehle einschränken oder deaktivieren. Kann ich mein eigenes SSH-Passwort festlegen? Benutzername und Passwort werden vom System automatisch generiert und gelten immer nur für eine Website. Wenn du also mehrere Websites hast, musst du für jede Website einen eigenen Benutzernamen und ein eigenes Passwort verwenden. Bewerten: Verwandte Ratgeber Wechseln der PHP-Version 1 Min. Lesezeit Website-Cache löschen 3 Min. Lesezeit Wähle einen WordPress-Host 8 Min. Lesezeit Symlink-Dateien und -Ordner 2 Min. Lesezeit In diesem Ratgeber WordPress.com SSH-Anmeldedaten erhalten und SSH aktivieren Ein SSH-Passwort zurücksetzen Mit SSH verbinden Verbinden mit SSH unter MacOS und Linux Verbinden von SSH unter Windows SSH-Schlüssel Hinzufügen eines SSH-Schlüssels zu deinem Konto Verbinden eines bestehenden SSH-Schlüssels mit einer Website Trennen der Verbindung eines Schlüssels mit einer Website Aktualisieren eines bestehenden SSH-Schlüssels Entfernen eines bestehenden SSH-Schlüssels Verwenden von Shell-Befehlen Verwenden der WP-CLI Verwalten von Themes und Plugins mit WP-CLI Überspringen von Themes und Plugins mit WP-CLI Weitere WP-CLI-Ressourcen Was ist, wenn etwas schiefläuft? Häufig gestellte Fragen Kann ich Support für die Verwendung von Befehlszeilentools erhalten? Sind alle Befehle verfügbar? Kann ich mein eigenes SSH-Passwort festlegen? Hast du Fragen? Unseren AI Assistant fragen Zurück nach oben Du konntest nicht finden, was du brauchst? Kontaktiere uns Erhalte Antworten von unserem AI Assistant, der rund um die Uhr professionellen Support für kostenpflichtige Tarife bietet. Eine Frage in unserem Forum stellen Durchsuche Fragen und erhalte Antworten von anderen erfahrenen Benutzern. Copied to clipboard! WordPress.com Produkte WordPress-Hosting WordPress für Agenturen Werde Partner Domainnamen KI-Website-Builder Website-Baukasten Erstelle ein Blog Professional E-Mail Webdesign-Service WordPress Studio WordPress für Unternehmen Funktionen Übersicht WordPress Themes WordPress-Plugins WordPress-Vorlagen Google Apps Ressourcen WordPress.com-Blog Firmennamen-Generator Logo Maker WordPress.com-Reader Barrierefreiheit Abonnements kündigen Hilfe Support-Center Anleitungen Kurse Foren Kontakt Ressourcen für Entwickler Firma Über Presse Geschäftsbedingungen Datenschutzerklärung Meine persönlichen Informationen nicht verkaufen oder weitergeben Datenschutzhinweis für Benutzer in Kalifornien Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English Deutsch Español Français Bahasa Indonesia Italiano Nederlands Português do Brasil Svenska Türkçe Русский العربية עִבְרִית 日本語 한국어 简体中文 繁體中文 English Mobil-Apps Herunterladen im App Store Herunterladen im Google Play Social Media WordPress.com auf Facebook WordPress.com auf X (Twitter) WordPress.com auf Instagram WordPress.com auf YouTube Automattic Automattic Arbeite für uns   Kommentare werden geladen …   Verfasse einen Kommentar … E-Mail Name Website Support Registrieren Anmelden Kurzlink kopieren Melde diesen Inhalt Abonnements verwalten
2026-01-13T09:29:32
https://www.ecns.cn/hd/2026-01-04/detail-iheymvap1612420.shtml
Venezuelan leader Maduro brought to New York --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo Venezuelan leader Maduro brought to New York ( 1 /3) 2026-01-04 09:39:32 Reuters Editor :Zhao Li An airplane carrying Venezuela's President Nicolas Maduro and his wife Cilia Flores lands before their scheduled court appearance at Manhattan federal court, at Stewart Air National Guard Base in Newburgh, New York, U.S. January 3, 2026. (Photo: Reuters) An airplane carrying Venezuela's President Nicolas Maduro and his wife Cilia Flores lands before their scheduled court appearance at Manhattan federal court, at Stewart Air National Guard Base in Newburgh, New York, U.S. January 3, 2026. (Photo: Reuters) An airplane carrying Venezuela's President Nicolas Maduro and his wife Cilia Flores lands before their scheduled court appearance at Manhattan federal court, at Stewart Air National Guard Base in Newburgh, New York, U.S. January 3, 2026. (Photo: Reuters) Previous Next (1) (2) (3) LINE More Photo Highlights of Chinese President Xi Jinping's 2026 New Year message Beijing-Tangshan intercity railway starts full-line operation First 'Grassland curling' attracts 350 competitors China launches two new satellites for space target detection test People perform 'circle dance' to pray for a bountiful new year in Qingha First batch of China's emergency humanitarian aid arrives in Cambodia ${visuals_2} ${visuals_3} More Video (W.E. Talk) Experts on 2026: China's 15th Five-Year Plan significant for the World (W.E. Talk) Experts look to 2026: Seizing opportunities amid crises, forging ahead after breakthroughs The Awkward Chronicles of Uncle Sam: Claimed Glory, Met Chaos The Dunhuang Flying Dancers in the 1,360°C kiln fire The Awkward Chronicles of Uncle Sam: Tariff Bullying and Backfire (W.E. Talk) Experts' review on 2025: China serves as a stabilizing force in a world of turmoil and chaos ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://chromewebstore.google.com/detail/category/detail/volume-master/detail/jetwriter-ai-reply-emails/collection/detail/click-and-clean/mgngmngjioknlgjjaiiamcdbahombpfb
Chrome Web Store Skip to main content Chrome Web Store My extensions & themes Developer Dashboard Give feedback Sign in Discover Extensions Themes Welcome to Chrome Web Store Welcome to the Chrome Web Store Supercharge your browser with extensions and themes for Chrome See collection Favorites of 2025 Discover the standout AI extensions that made our year See collection Every day is Earth Day Plant trees, shop sustainably, and more See collection Adobe Photoshop Easily remove backgrounds, adjust colors and more. Plus, get 6 months free access to Photoshop web. 3.7 600K Users See details The future of writing Elevate your writing and create engaging and high-quality content effortlessly See collection 1 / 5 Top categories Shopping Entertainment Tools Art & Design Accessibility Top charts Trending Kami for Google Chrome™ Education 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. BetterCampus (prev. BetterCanvas) Education 4.9 Average rating 4.9 out of 5 stars. Learn more about results and reviews. Read&Write for Google Chrome™ Accessibility 3.4 Average rating 3.4 out of 5 stars. Learn more about results and reviews. See more Popular Volume Master Accessibility 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Free VPN for Chrome - VPN Proxy VeePN Workflow & Planning 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. AdBlock — block ads across the web Workflow & Planning 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. See more New and notable Ad Block Wonder Privacy & Security 4.3 Average rating 4.3 out of 5 stars. Learn more about results and reviews. Smart popup blocker Tools 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Manus AI Browser Operator Tools 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. See more Editors' Picks for you Handpicked by Chrome Editors See collection Extend your browser See more Discover a new level of convenience and customization with side panel extensions Chat with all AI models (Gemini, Claude, DeepSeek…) & AI Agents | AITOPIA 4.9 Average rating 4.9 out of 5 stars. Learn more about results and reviews. AI Agent Marketplace & AI Sidebar with all AI models (Gemini, Claude, DeepSeek & more) and hundreds of AI Agents Adobe Photoshop 3.7 Average rating 3.7 out of 5 stars. Learn more about results and reviews. Easily remove backgrounds, adjust colors and more. Plus, get 6 months free access to Photoshop web. BrowserGPT: ChatGPT Anywhere Powered by GPT 4 4.4 Average rating 4.4 out of 5 stars. Learn more about results and reviews. Write, reword, and translate 8x faster. Reply to emails in a click. Works on Google Docs, Gmail, YouTube, Twitter, Instagram, etc. Sidebar: ChatGPT, Bookmarks, GPT-4o | Meomni 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Ultimate Sidebar ChatGPT Assistant, Bookmarks with AI, Calendar and Tasks Fleeting Notes 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Quick notes from the browser to Obsidian Eclipse your screen Dim the lights with our dark mode selections See collection Chrome monthly spotlight Promising extensions to try out Web Highlights: PDF & Web Highlighter + Notes & AI Summary Productivity Highlighter & Annotation Tool for Websites & PDFs with AI Summary - free, easy to use, no sign-up required. Moonlight: AI Colleague for Research Papers Everything you need to read a paper: explanation, summary, translation, chat, and reference search. Reboost - Track Water Intake and Set Reminders Track your water intake and set custom reminders. Stay hydrated, stay on track, and never miss a break! ✨ YouTube Notes to Notion with Udemy, Coursera, BiliBili and more by Snipo Take YouTube notes directly to Notion, generate AI flashcards, capture screenshots, and sync learning courses with Notion Works with Gmail See more Boost your email productivity Boomerang for Gmail 4.2 Average rating 4.2 out of 5 stars. Learn more about results and reviews. Meeting scheduling and email management tool trusted by millions. Schedule meetings, track responses, send later, and more. Checker Plus for Gmail™ 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Get notifications, read, listen to or delete emails without opening Gmail and easily manage multiple accounts. Email Tracker by Mailtrack® 4.4 Average rating 4.4 out of 5 stars. Learn more about results and reviews. Free, unlimited email tracker for Gmail, trusted by millions. Accurate, reliable, GDPR-compliant, and Google-audited. Streak CRM for Gmail 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Manage sales and customer relationships directly inside Gmail. GMass: Powerful mail merge for Gmail 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. A powerful mass email and mail merge system for Gmail. Just for fun Bring some joy to your browser See collection Learn a new language See more Study while you browse Google Translate 4.2 Average rating 4.2 out of 5 stars. Learn more about results and reviews. View translations easily as you browse the web. By the Google Translate team. Rememberry - Translate and Memorize with Flashcards 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Translate words while browsing and turn them into spaced repetition flashcards to build foreign language vocabulary. DeepL: translate and write with AI 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Translate while you read and write with DeepL Translate, the world’s most accurate translator. Relingo - Master vocabulary while browsing websites and watching YouTube 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Relingo extract words, full-text immersive translation while browsing. Also supports bilingual subtitles for Youtube, Netflix, etc. Readlang Web Reader 4.3 Average rating 4.3 out of 5 stars. Learn more about results and reviews. Read websites in the language you're learning, translate words you don't know, and we'll create flashcards to help you remember. Game on See more Beat boredom with bite-sized games in your browser BattleTabs 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Multiplayer Battles in your New Tab Tiny Tycoon 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Build a tiny tycoon on a tiny planet. Boxel 3D 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Boxel 3D is a speedrunning game packed with challenging levels, custom skins, online multiplayer, and a creative level editor. Ice Dodo 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Play 3D game easily by clicking the little icon at the top right corner of your browser. Boxel Golf 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Boxel Golf is a multiplayer golf game packed with challenging courses, custom hats, and a powerful level builder. Work smarter, not harder with AI Automate tasks and stay focused and organized with AI-powered productivity extensions See collection For music lovers See more Equalizers, radios, playlists, and more Volume Master 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Up to 600% volume boost Music Mode for YouTube™ 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Hides the video and thumbnails on YouTube. Blocks the video keeping only the audio on YouTube Music. Smart Mute 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Listen to audio one tab at a time. Modest Guitar | Columns for Ultimate-Guitar 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Multiple columns and fullscreen for Ultimate-Guitar tabs Chrome Piano 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Play the piano in your browser Google apps About Chrome Web Store Developer Dashboard Privacy Policy Terms of Service Help
2026-01-13T09:29:32
http://www.ezhejiang.gov.cn/index.html
Zhejiang, China | Official site of Zhejiang province, China nav search facebook x | close Home + Fresh Sight + About Zhejiang + Overview The Garden Province Facts Sister Cities Zhejiang First Zhejiang Today + Latest Global Exchanges City Focus + Hangzhou Ningbo Wenzhou Huzhou Jiaxing Shaoxing Jinhua Quzhou Zhoushan Taizhou Lishui Business in Zhejiang + Biz Updates Guide Industries Industrial Parks Characteristic Towns Companies Entrepreneurs Living in Zhejiang + Visas Transportation Hotels Dining Healthcare Education Recreation Useful info Beautiful Zhejiang + What's On Cultural Heritages Scenic Spots Suggested Itineraries Museums and Theaters Arts Artists and Cultural Figures Dreams Come True in Zhejiang Videos Specials | search facebook x close Search Reusable rocket super factory breaks ground January 12, 2026 Latest Zhejiang FC signs South Korean midfielder Park Jin-seop January 9, 2026 Latest Yiwu winter sports goods sales surge January 9, 2026 Latest Huzhou childrenswear companies venture into new markets January 8, 2026 Latest Jinhua advances TCM industry standardization January 8, 2026 Latest Jiaxing hosts Chinese-Foreign Spring Festival celebration January 12, 2026 Global Exchanges South Korean artists explore culture in Ningbo January 7, 2026 Global Exchanges My year ahead in Ningbo January 4, 2026 Global Exchanges Former Florence councilor proposes establishment of annual Ningbo Day December 22, 2025 Global Exchanges Read More Videos > play Minor Cold: Winter digs in Let us brace the chill and wait for the song of spring. January 5, 2026 play My year ahead in Ningbo January 4, 2026 play Six biz events changed Chinese people's life in 2025 December 24, 2025 play Global content creators discover Hangzhou's tech magic December 3, 2025 play Future unboxed: Expats' tech dive in Hangzhou December 1, 2025 play Winter is here November 27, 2025 play Qingyuan's wild tea trees drive rural prosperity November 20, 2025 play Hangzhou's rural museums November 19, 2025 play Global influencers' wild day in Tianmu Mountain November 19, 2025 play Lost in Qingshan Lake November 19, 2025 prev next City Focus - Zhejiang province is one of China's most economically developed provinces and is located on the country's eastern coast. Hangzhou > Hangzhou Ningbo Wenzhou Huzhou Jiaxing Shaoxing Jinhua Quzhou Zhoushan Taizhou Lishui Hangzhou, capital of Zhejiang Reusable rocket super factory breaks ground in Qiantang Hangzhou airport handles over 5.3 million cross-border travelers Hangzhou official English website Ningbo, a major coastal city New year joy at Ningbo's Chenghuang Temple My year ahead in Ningbo Ningbo official English website Wenzhou, a business hotspot Swimming through life with vigor Zhejiang's youngest county-level city rises with industrial upgrade Wenzhou official English website Huzhou, an eco-friendly city Huzhou childrenswear companies venture into new markets Young entrepreneurs transform Huzhou's villages Huzhou official English website Jiaxing, the birthplace of the Communist Party of China Jiaxing black carp 'swims' to new shores Launch marks push toward reusable rocket recovery Jiaxing official English website Shaoxing, an elegant and peaceful historical city Shaoxing releases first provincial group standard for freshwater pearl industry Shaoxing promotes simplified traditional weddings Shaoxing official English website Jinhua, home to crafts Yiwu advances global brand expansion Jinhua farm products shine at Zhejiang Agricultural Fair Jinhua official English website Quzhou, a model city of virtue Quzhou to become eco-friendly garden city Quzhou steps up drive to build a modern city Quzhou official English website Zhoushan, a city of mountains and sea Zhoushan's economic achievements during 14th Five-Year Plan period First Ocean Tidal Current Energy Development Conference opens Zhoushan official English website Taizhou, a historical and innovative city Anji Mountain paragliding event gathers 71 pilots in Taizhou Taizhou turns marine waste into valuable products Taizhou official English website Lishui, an ecological city Lishui rings in 2026 with cultural tourism events Lishui promotes scenic charms in Greater Bay Area Lishui official English website Business in Zhejiang - Yiwu winter sports goods sales surge January 9, 2026 Biz Updates Zhejiang firms seek global markets with RCEP January 5, 2026 Biz Updates Zhejiang leads nation in cross-border e-commerce imports in first 11 months December 26, 2025 Biz Updates Beautiful Zhejiang First supermoon of 2026 lights up West Lake January 7, 2026 Whats On Wedding innovations December 29, 2025 Cultural Heritages Hangzhou's rural museums November 19, 2025 Museums and Theaters Chenghuang Temple January 12, 2026 Scenic Spots Artistic spirit December 18, 2025 Arts Living in Zhejiang - More than words: Structure is the key to learning a language January 12, 2026 Education China's public holidays for 2026 January 9, 2026 Useful Info Visa-free policy boosts China-ROK ties January 7, 2026 Visas About Overview The Garden Province Facts Sister Cities Zhejiang First Zhejiang Today Latest Global Exchanges City Focus Business in Zhejiang Biz Updates Guide Industries Industrial Parks Characteristic Towns Companies Entrepreneurs Living in Zhejiang Visas Transportation Hotels Dining Healthcare Education Recreation Useful info Beautiful Zhejiang What's On Cultural Heritages Scenic Spots Suggested Itineraries Museums and Theaters Arts Artists and Cultural Figures Dreams Come True in Zhejiang Videos Specials Copyright© The Information Office of Zhejiang Provincial People's Government. All rights reserved. Presented by China Daily. 京ICP备13028878号-26 Links > Beijing, China International Services Shanghai Zhejiang Government Official Web Portal Zhejiang Online(浙江在线) CZTV(新蓝网) Hangzhou Ningbo Wenzhou Huzhou Jiaxing Shaoxing Jinhua Quzhou Zhoushan Taizhou Lishui Yiwu Facebook X Copyright© The Information Office of Zhejiang Provincial People's Government. All rights reserved. Presented by China Daily. 京ICP备13028878号-26 BACK TO TOP
2026-01-13T09:29:32
https://docs.aws.amazon.com/it_it/cost-management/latest/userguide/ce-exploring-data.html
Esplorazione dei dati tramite Cost Explorer - AWS Gestione dei costi Esplorazione dei dati tramite Cost Explorer - AWS Gestione dei costi Documentazione AWS Billing and Cost Management Guida per l’utente Esplorazione di Cost Explorer Costi di Cost Explorer Tendenze di Cost Explorer Costi giornalieri non modulati Costi mensili non modulati Costi non modulati netti I report recenti di Cost Explorer Costi ammortizzati I tuoi costi netti ammortizzati Le traduzioni sono generate tramite traduzione automatica. In caso di conflitto tra il contenuto di una traduzione e la versione originale in Inglese, quest'ultima prevarrà. Esplorazione dei dati tramite Cost Explorer Sul pannello di controllo di Cost Explorer, Cost Explorer mostra i costi stimati aggiornati mensilmente, i costi previsti per il mese, un grafico dei costi giornalieri, le principali cinque tendenze dei costi e un elenco di report visualizzati di recente. Tutti i costi riflettono l'utilizzo fino al giorno precedente. Ad esempio, se oggi è il 2 Dicembre, i dati includono l'utilizzo fino al 1° dicembre. Nota Nel periodo di fatturazione corrente, i dati dipendono dai dati upstream provenienti dalle applicazioni di fatturazione e alcuni dati potrebbero essere aggiornati dopo le 24 ore. Costi di Cost Explorer Tendenze di Cost Explorer Costi giornalieri non modulati Costi mensili non modulati Costi non modulati netti I report recenti di Cost Explorer Costi ammortizzati I tuoi costi netti ammortizzati Esplorazione di Cost Explorer È possibile utilizzare le icone nel riquadro sinistro per svolgere le seguenti azioni: Pannello di controllo principale di Cost Explorer Visualizzare un elenco dei report di default di Cost Explorer Visualizzare un elenco dei report salvati Visualizzare le informazioni che riguardano le prenotazioni Visualizzare le raccomandazioni per le prenotazioni Costi di Cost Explorer Nella parte superiore della pagina Cost Explorer sono riportati i Month-to-date costi e i costi di fine mese previsti . I Month-to-date costi mostrano gli addebiti stimati sostenuti finora nel corso del mese e li confrontano con il periodo del mese scorso. Costi mensili previsti mostra la stima di Cost Explorer di quanto sarà necessario pagare alla fine del mese e confronta le stime dei costi con i costi effettivi del mese precedente. I onth-to-datecosti M e i costi di fine mese previsti non includono i rimborsi. I costi per Cost Explorer sono indicati solo in dollari USA. Tendenze di Cost Explorer Nella sezione this month tendenze , Cost Explorer mostra le principali tendenze dei costi. Ad esempio, i costi correlati a un determinato servizio sono aumentati o i costi di un determinato tipo di IR sono aumentati. È possibile visualizzare tutti i trend dei costi scegliendo View all trends (Visualizza tutti i trend) in alto a destra nella sezione dei trend. Per visualizzare maggiori dettagli su un trend, selezionarlo. Sarai reindirizzato a un grafico di Cost Explorer che mostra i costi considerati nel calcolo di tale tendenza. Costi giornalieri non modulati Nel centro del pannello di controllo di Cost Explorer, è riportato un grafico dei costi giornalieri correnti non modulati. È possibile accedere a filtri e parametri utilizzati per creare il grafico scegliendo Explore costs (Esplora costi) nell'angolo in alto a destra. Ciò consente di visitare la pagina dei report di Cost Explorer, in modo da poter accedere ai report di default di Cost Explorer e modificare i parametri utilizzati per creare il grafico. I report di Cost Explorer offrono funzionalità aggiuntive, ad esempio il download dei dati come file CSV e il salvataggio dei parametri specifici come report. Per ulteriori informazioni, consulta Comprendere i costi utilizzando i report Cost Explorer . I costi giornalieri non modulati non includono rimborsi. Costi mensili non modulati Granularità mensile È possibile vedere i costi non modulati con granularità mensile e gli sconti applicati alla fattura mensile. Nella previsione dei costi, gli sconti sono inclusi per impostazione predefinita. Per visualizzare i costi non combinati, apri la pagina Cost Explorer e scegli Cost Explorer dal riquadro di navigazione. Gli sconti appaiono sotto forma di Sconto volume RI nel grafico. L'importo dello sconto è in linea con l'importo dello sconto mostrato nella console di gestione fatturazione e costi. Come visualizzare i dettagli nella console di gestione fatturazione e costi Apri la console di Fatturazione e Gestione dei costi all'indirizzo https://console.aws.amazon.com/costmanagement/ . Nel riquadro di navigazione selezionare Bills (Fatture) . Per visualizzare lo sconto, selezionare la freccia accanto a Sconti totali , in Crediti, sconti totali e imposte . Addebiti lordi mensili È possibile consultare gli addebiti lordi mensili escludendo lo Sconto volume RI . Come escludere gli sconti dei volumi RI nel riepilogo mensile Apri la console di Fatturazione e Gestione dei costi all'indirizzo https://console.aws.amazon.com/costmanagement/ . Nel riquadro a sinistra, scegliere Cost Explorer . Selezionare Costi e utilizzo . Nel pannello Filtri , selezionare Tipo di addebito . Selezionare Sconto volume RI . Per aprire un elenco a discesa, selezionare Includere solo e selezionare Escludere solo . Seleziona Applica filtri . Costi non modulati netti Questo consente di visualizzare i costi netti dopo aver calcolato tutti gli sconti applicabili. È comunque necessario escludere qualsiasi adeguamento manuale, tipo rimborsi e crediti, come best practice. Gli Sconti volumi RI non sono più visibili perché si tratta di importi successivi all'applicazione degli sconti. I report recenti di Cost Explorer Nella parte inferiore del pannello di controllo di Cost Explorer si trovano un elenco di report che hai consultato di recente, il momento in cui lo hai fatto e un link per consultare nuovamente i report. In questo modo è possibile passare da un report all'altro o recuperare i report che trovi più utili. Per ulteriori informazioni sui report di Cost Explorer, consultare Comprendere i costi utilizzando i report Cost Explorer . Costi ammortizzati In questo modo puoi vedere il costo dei tuoi AWS impegni, come Amazon EC2 Reserved Instances o Savings Plans, ripartiti tra l'utilizzo del periodo di selezione. AWS stima i costi ammortizzati combinando le commissioni di prenotazione anticipate e ricorrenti non combinate e calcola la tariffa effettiva per il periodo di tempo in cui si applica la commissione anticipata o ricorrente. Nella visualizzazione giornaliera, Cost Explorer mostra la parte inutilizzata delle commissioni di impegno al primo giorno del mese o alla data di acquisto. I tuoi costi netti ammortizzati Ciò ti consente di visualizzare il costo dei tuoi AWS impegni, ad esempio Amazon EC2 Reserved Instances o Savings Plans, dopo gli sconti con la logica aggiuntiva che mostra come il costo effettivo si applica nel tempo. Poiché Savings Plans e Reserved Instances di solito prevedono commissioni mensili anticipate o ricorrenti, il set di dati sui costi ammortizzati netti rivela il costo reale mostrando come le commissioni post-sconto si ammortizzano nel periodo di tempo in cui si applica la commissione anticipata o ricorrente. JavaScript è disabilitato o non è disponibile nel tuo browser. Per usare la documentazione AWS, JavaScript deve essere abilitato. Consulta le pagine della guida del browser per le istruzioni. Convenzioni dei documenti Nozioni di base su Esploratore dei costi Uso del grafico Cost Explorer Questa pagina ti è stata utile? - Sì Grazie per averci comunicato che stiamo facendo un buon lavoro! Se hai un momento, ti invitiamo a dirci che cosa abbiamo fatto che ti è piaciuto così possiamo offrirti altri contenuti simili. Questa pagina ti è stata utile? - No Grazie per averci comunicato che questa pagina ha bisogno di essere modificata. Siamo spiacenti di non aver soddisfatto le tue esigenze. Se hai un momento, ti invitiamo a dirci come possiamo migliorare la documentazione.
2026-01-13T09:29:32
https://www.ecns.cn/photo/
Photo --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE CNS Photo Photo --> China's commercial recoverable spacecraft completes test flight 2026.01.13 11:34 South Korea's ex-President Yoon Suk Yeol faces sentencing in insurrection trial 2026.01.13 11:33 'Weepy horse' toy goes viral after sewing error 2026.01.12 14:12 New giant panda pair makes public debut in Malaysia 2026.01.12 10:07 Exploring world's largest island Greenland 2026.01.09 09:09 Venezuelan people call on U.S. to release Nicolás Maduro and his wife 2026.01.09 09:04 Heavey snow hits Paris 2026.01.08 13:44 'Southern Snow Town' draws tourists to Guizhou Province 2026.01.08 13:36 Global mayors attend dialogue in NE China on developing ice, snow economy 2026.01.07 10:38 Indonesia welcomes its first locally born giant panda cub 2026.01.07 10:36 Chinese FM on Venezuela situation: China always opposes imposing one country's will on another 2026.01.07 10:25 Maduro pleads not guilty in N.Y. court 2026.01.06 11:29 UN Security Council holds emergency meeting on Venezuela 2026.01.06 11:29 Harbin opens its 42nd Ice and Snow Festival 2026.01.06 10:18 China's Yangtze River remains world's busiest inland waterway by cargo throughput 2026.01.06 10:16 Bosideng 2026.01.06 09:45 Protest held in New York against U.S. military strikes on Venezuela 2026.01.05 14:41 Venezuelan President Nicolás Maduro transported to Brooklyn detention center 2026.01.05 13:52 International ice sculpture competition heats up in Harbin 2026.01.04 10:28 Mourners pay tribute to Crans-Montana bar fire victims 2026.01.04 09:59 Venezuelan leader Maduro brought to New York 2026.01.04 09:51 Beijing-Tangshan intercity railway starts full-line operation 2025.12.31 16:24 Passenger trips of 3 major Hainan airports exceed 50 million in 2025 2025.12.31 15:50 First 'Grassland curling' attracts 350 competitors 2025.12.31 10:40 China launches two new satellites for space target detection test 2025.12.31 10:11 People perform 'circle dance' to pray for a bountiful new year in Qingha 2025.12.31 09:50 In numbers: China's high-speed rail mileage exceeds 50,000 km 2025.12.29 16:50 First batch of China's emergency humanitarian aid arrives in Cambodia 2025.12.29 09:53 Central London illuminated to welcome 2026 2025.12.29 09:52 Chinese Foreign Minister meets Cambodian Deputy PM in Yunnan 2025.12.29 09:49 --> First Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 Next Last Most popular in 24h More Top news Greenland says U.S. takeover unacceptable 'under any circumstances' China files over 200,000 satellite frequency, orbit applications with ITU John Ross: China's 14th Five-Year Plan has enabled a qualitative breakthrough and reshaped its relationship with the world economy China's Tianma-1000 cargo drone able to deliver 1 metric ton of supplies to plateau  China bans medical institutions from offering funeral services in crackdown on sector abuses More Video The Source Keeper Season 3 | Episode 1: The Whispers of Mountains and Rivers Comicomment: Wings clipped, Latin America left to suffer LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://chromewebstore.google.com/detail/category/detail/volume-master/detail/jetwriter-ai-reply-emails/collection/detail/wordtune-ai-paraphrasing/nllcnknpjnininklegdoijpljgdjkijc
Chrome Web Store Skip to main content Chrome Web Store My extensions & themes Developer Dashboard Give feedback Sign in Discover Extensions Themes Welcome to Chrome Web Store Welcome to the Chrome Web Store Supercharge your browser with extensions and themes for Chrome See collection Favorites of 2025 Discover the standout AI extensions that made our year See collection Every day is Earth Day Plant trees, shop sustainably, and more See collection Adobe Photoshop Easily remove backgrounds, adjust colors and more. Plus, get 6 months free access to Photoshop web. 3.7 600K Users See details The future of writing Elevate your writing and create engaging and high-quality content effortlessly See collection 1 / 5 Top categories Shopping Entertainment Tools Art & Design Accessibility Top charts Trending Kami for Google Chrome™ Education 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. BetterCampus (prev. BetterCanvas) Education 4.9 Average rating 4.9 out of 5 stars. Learn more about results and reviews. Read&Write for Google Chrome™ Accessibility 3.4 Average rating 3.4 out of 5 stars. Learn more about results and reviews. See more Popular Volume Master Accessibility 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Free VPN for Chrome - VPN Proxy VeePN Workflow & Planning 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. AdBlock — block ads across the web Workflow & Planning 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. See more New and notable Ad Block Wonder Privacy & Security 4.3 Average rating 4.3 out of 5 stars. Learn more about results and reviews. Smart popup blocker Tools 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Manus AI Browser Operator Tools 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. See more Editors' Picks for you Handpicked by Chrome Editors See collection Extend your browser See more Discover a new level of convenience and customization with side panel extensions Chat with all AI models (Gemini, Claude, DeepSeek…) & AI Agents | AITOPIA 4.9 Average rating 4.9 out of 5 stars. Learn more about results and reviews. AI Agent Marketplace & AI Sidebar with all AI models (Gemini, Claude, DeepSeek & more) and hundreds of AI Agents Adobe Photoshop 3.7 Average rating 3.7 out of 5 stars. Learn more about results and reviews. Easily remove backgrounds, adjust colors and more. Plus, get 6 months free access to Photoshop web. BrowserGPT: ChatGPT Anywhere Powered by GPT 4 4.4 Average rating 4.4 out of 5 stars. Learn more about results and reviews. Write, reword, and translate 8x faster. Reply to emails in a click. Works on Google Docs, Gmail, YouTube, Twitter, Instagram, etc. Sidebar: ChatGPT, Bookmarks, GPT-4o | Meomni 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Ultimate Sidebar ChatGPT Assistant, Bookmarks with AI, Calendar and Tasks Fleeting Notes 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Quick notes from the browser to Obsidian Eclipse your screen Dim the lights with our dark mode selections See collection Chrome monthly spotlight Promising extensions to try out Web Highlights: PDF & Web Highlighter + Notes & AI Summary Productivity Highlighter & Annotation Tool for Websites & PDFs with AI Summary - free, easy to use, no sign-up required. Moonlight: AI Colleague for Research Papers Everything you need to read a paper: explanation, summary, translation, chat, and reference search. Reboost - Track Water Intake and Set Reminders Track your water intake and set custom reminders. Stay hydrated, stay on track, and never miss a break! ✨ YouTube Notes to Notion with Udemy, Coursera, BiliBili and more by Snipo Take YouTube notes directly to Notion, generate AI flashcards, capture screenshots, and sync learning courses with Notion Works with Gmail See more Boost your email productivity Boomerang for Gmail 4.2 Average rating 4.2 out of 5 stars. Learn more about results and reviews. Meeting scheduling and email management tool trusted by millions. Schedule meetings, track responses, send later, and more. Checker Plus for Gmail™ 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Get notifications, read, listen to or delete emails without opening Gmail and easily manage multiple accounts. Email Tracker by Mailtrack® 4.4 Average rating 4.4 out of 5 stars. Learn more about results and reviews. Free, unlimited email tracker for Gmail, trusted by millions. Accurate, reliable, GDPR-compliant, and Google-audited. Streak CRM for Gmail 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Manage sales and customer relationships directly inside Gmail. GMass: Powerful mail merge for Gmail 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. A powerful mass email and mail merge system for Gmail. Just for fun Bring some joy to your browser See collection Learn a new language See more Study while you browse Google Translate 4.2 Average rating 4.2 out of 5 stars. Learn more about results and reviews. View translations easily as you browse the web. By the Google Translate team. Rememberry - Translate and Memorize with Flashcards 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Translate words while browsing and turn them into spaced repetition flashcards to build foreign language vocabulary. DeepL: translate and write with AI 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Translate while you read and write with DeepL Translate, the world’s most accurate translator. Relingo - Master vocabulary while browsing websites and watching YouTube 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Relingo extract words, full-text immersive translation while browsing. Also supports bilingual subtitles for Youtube, Netflix, etc. Readlang Web Reader 4.3 Average rating 4.3 out of 5 stars. Learn more about results and reviews. Read websites in the language you're learning, translate words you don't know, and we'll create flashcards to help you remember. Game on See more Beat boredom with bite-sized games in your browser BattleTabs 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Multiplayer Battles in your New Tab Tiny Tycoon 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Build a tiny tycoon on a tiny planet. Boxel 3D 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Boxel 3D is a speedrunning game packed with challenging levels, custom skins, online multiplayer, and a creative level editor. Ice Dodo 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Play 3D game easily by clicking the little icon at the top right corner of your browser. Boxel Golf 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Boxel Golf is a multiplayer golf game packed with challenging courses, custom hats, and a powerful level builder. Work smarter, not harder with AI Automate tasks and stay focused and organized with AI-powered productivity extensions See collection For music lovers See more Equalizers, radios, playlists, and more Volume Master 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Up to 600% volume boost Music Mode for YouTube™ 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Hides the video and thumbnails on YouTube. Blocks the video keeping only the audio on YouTube Music. Smart Mute 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Listen to audio one tab at a time. Modest Guitar | Columns for Ultimate-Guitar 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Multiple columns and fullscreen for Ultimate-Guitar tabs Chrome Piano 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Play the piano in your browser Google apps About Chrome Web Store Developer Dashboard Privacy Policy Terms of Service Help
2026-01-13T09:29:32
https://docs.groovy-lang.org/latest/html/documentation/core-domain-specific-languages.html
Domain-Specific Languages Domain-Specific Languages version 5.0.3 Table of Contents 1. Command chains 2. Operator overloading 3. Script base classes 3.1. The Script class 3.2. The @BaseScript annotation 3.3. Alternate abstract method 4. Adding properties to numbers 5. @DelegatesTo 5.1. Explaining delegation strategy at compile time 5.2. @DelegatesTo 5.3. DelegatesTo modes 5.3.1. Simple delegation 5.3.2. Delegation strategy 5.3.3. Delegate to parameter 5.3.4. Multiple closures 5.3.5. Delegating to a generic type 5.3.6. Delegating to an arbitrary type 6. Compilation customizers 6.1. Introduction 6.2. Import customizer 6.3. AST transformation customizer 6.4. Secure AST customizer 6.5. Source aware customizer 6.6. Customizer builder 6.6.1. Import customizer 6.6.2. AST transformation customizer 6.6.3. Secure AST customizer 6.6.4. Source aware customizer 6.6.5. Inlining a customizer 6.6.6. Multiple customizers 6.7. The configscript commandline parameter 6.7.1. Configscript example: Static compilation by default 6.7.2. Configscript example: Setting system properties 6.8. AST transformations 7. Custom type checking extensions 8. Builders 8.1. Existing builders 8.1.1. MarkupBuilder 8.1.2. StreamingMarkupBuilder 8.1.3. SaxBuilder 8.1.4. StaxBuilder 8.1.5. DOMBuilder 8.1.6. NodeBuilder 8.1.7. JsonBuilder 8.1.8. StreamingJsonBuilder 8.1.9. SwingBuilder 8.1.10. AntBuilder 8.1.11. CliBuilder Using Annotations and an interface Using Annotations and an instance Using Annotations and a script Options with arguments Specifying a type Custom parsing of the argument String Options with multiple arguments Types and multiple arguments Setting a default value Use with TypeChecked Advanced CLI Usage Apache Commons CLI Picocli 8.1.12. ObjectGraphBuilder 8.1.13. JmxBuilder 8.1.14. FileTreeBuilder 8.2. Creating a builder 8.2.1. BuilderSupport 8.2.2. FactoryBuilderSupport 1. Command chains Groovy lets you omit parentheses around the arguments of a method call for top-level statements. "command chain" feature extends this by allowing us to chain such parentheses-free method calls, requiring neither parentheses around arguments, nor dots between the chained calls. The general idea is that a call like a b c d will actually be equivalent to a(b).c(d) . This also works with multiple arguments, closure arguments, and even named arguments. Furthermore, such command chains can also appear on the right-hand side of assignments. Let’s have a look at some examples supported by this new syntax: // equivalent to: turn(left).then(right) turn left then right // equivalent to: take(2.pills).of(chloroquinine).after(6.hours) take 2.pills of chloroquinine after 6.hours // equivalent to: paint(wall).with(red, green).and(yellow) paint wall with red, green and yellow // with named parameters too // equivalent to: check(that: margarita).tastes(good) check that: margarita tastes good // with closures as parameters // equivalent to: given({}).when({}).then({}) given { } when { } then { } It is also possible to use methods in the chain which take no arguments, but in that case, the parentheses are needed: // equivalent to: select(all).unique().from(names) select all unique() from names If your command chain contains an odd number of elements, the chain will be composed of method / arguments, and will finish by a final property access: // equivalent to: take(3).cookies // and also this: take(3).getCookies() take 3 cookies This command chain approach opens up interesting possibilities in terms of the much wider range of DSLs which can now be written in Groovy. The above examples illustrate using a command chain based DSL but not how to create one. There are various strategies that you can use, but to illustrate creating such a DSL, we will show a couple of examples - first using maps and Closures: show = { println it } square_root = { Math.sqrt(it) } def please(action) { [the: { what -> [of: { n -> action(what(n)) }] }] } // equivalent to: please(show).the(square_root).of(100) please show the square_root of 100 // ==> 10.0 As a second example, consider how you might write a DSL for simplifying one of your existing APIs. Maybe you need to put this code in front of customers, business analysts or testers who might be not hard-core Java developers. We’ll use the Splitter from the Google Guava libraries project as it already has a nice Fluent API. Here is how we might use it out of the box: @Grab('com.google.guava:guava:r09') import com.google.common.base.* def result = Splitter.on(',').trimResults(CharMatcher.is('_' as char)).split("_a ,_b_ ,c__").iterator().toList() It reads fairly well for a Java developer but if that is not your target audience or you have many such statements to write, it could be considered a little verbose. Again, there are many options for writing a DSL. We’ll keep it simple with Maps and Closures. We’ll first write a helper method: @Grab('com.google.guava:guava:r09') import com.google.common.base.* def split(string) { [on: { sep -> [trimming: { trimChar -> Splitter.on(sep).trimResults(CharMatcher.is(trimChar as char)).split(string).iterator().toList() }] }] } now instead of this line from our original example: def result = Splitter.on(',').trimResults(CharMatcher.is('_' as char)).split("_a ,_b_ ,c__").iterator().toList() we can write this: def result = split "_a ,_b_ ,c__" on ',' trimming '_\' 2. Operator overloading Various operators in Groovy are mapped onto regular method calls on objects. This allows you to provide your own Java or Groovy objects which can take advantage of operator overloading. The following table describes the operators supported in Groovy and the methods they map to. Operator Method a + b a.plus(b) a - b a.minus(b) a * b a.multiply(b) a ** b a.power(b) a / b a.div(b) a % b a.mod(b) a | b a.or(b) a & b a.and(b) a ^ b a.xor(b) a++ or ++a a.next() a-- or --a a.previous() a[b] a.getAt(b) a[b] = c a.putAt(b, c) a << b a.leftShift(b) a >> b a.rightShift(b) a >>> b a.rightShiftUnsigned(b) switch(a) { case(b) : } b.isCase(a) if(a) a.asBoolean() ~a a.bitwiseNegate() -a a.negative() +a a.positive() a as b a.asType(b) a == b a.equals(b) a != b ! a.equals(b) a <=> b a.compareTo(b) a > b a.compareTo(b) > 0 a >= b a.compareTo(b) >= 0 a \< b a.compareTo(b) < 0 a <= b a.compareTo(b) <= 0 3. Script base classes 3.1. The Script class Groovy scripts are always compiled to classes. For example, a script as simple as: println 'Hello from Groovy' is compiled to a class extending the abstract groovy.lang.Script class. This class contains a single abstract method called run . When a script is compiled, then its body will become the run method, while the other methods found in the script are found in the implementing class. The Script class provides base support for integration with your application through the Binding object, as illustrated in this example: def binding = new Binding() (1) def shell = new GroovyShell(binding) (2) binding.setVariable('x',1) (3) binding.setVariable('y',3) shell.evaluate 'z=2*x+y' (4) assert binding.getVariable('z') == 5 (5) 1 a binding is used to share data between the script and the calling class 2 a GroovyShell can be used with this binding 3 input variables are set from the calling class inside the binding 4 then the script is evaluated 5 and the z variable has been "exported" into the binding This is a very practical way to share data between the caller and the script, however it may be insufficient or not practical in some cases. For that purpose, Groovy allows you to set your own base script class. A base script class has to extend groovy.lang.Script and be a single abstract method type: abstract class MyBaseClass extends Script { String name public void greet() { println "Hello, $name!" } } Then the custom script base class can be declared in the compiler configuration, for example: def config = new CompilerConfiguration() (1) config.scriptBaseClass = 'MyBaseClass' (2) def shell = new GroovyShell(this.class.classLoader, config) (3) shell.evaluate """ setName 'Judith' (4) greet() """ 1 create a custom compiler configuration 2 set the base script class to our custom base script class 3 then create a GroovyShell using that configuration 4 the script will then extend the base script class, giving direct access to the name property and greet method 3.2. The @BaseScript annotation As an alternative, it is also possible to use the @BaseScript annotation directly into a script: import groovy.transform.BaseScript @BaseScript MyBaseClass baseScript setName 'Judith' greet() where @BaseScript should annotate a variable which type is the class of the base script. Alternatively, you can set the base script class as a member of the @BaseScript annotation itself: @BaseScript(MyBaseClass) import groovy.transform.BaseScript setName 'Judith' greet() When using the special no-args run method, you can even annotate that method as shown here: abstract class CustomScript extends Script { int getTheMeaningOfLife() { 42 } } @BaseScript(CustomScript) def run() { assert theMeaningOfLife == 42 } 3.3. Alternate abstract method We have seen that the base script class is a single abstract method type that needs to implement the run method. The run method is executed by the script engine automatically. In some circumstances it may be interesting to have a base class which implements the run method, but provides an alternative abstract method to be used for the script body. For example, the base script run method might perform some initialization before the run method is executed. This is possible by doing this: abstract class MyBaseClass extends Script { int count abstract void scriptBody() (1) def run() { count++ (2) scriptBody() (3) count (4) } } 1 the base script class should define one (and only one) abstract method 2 the run method can be overridden and perform a task before executing the script body 3 run calls the abstract scriptBody method which will delegate to the user script 4 then it can return something else than the value from the script If you execute this code: def result = shell.evaluate """ println 'Ok' """ assert result == 1 Then you will see that the script is executed, but the result of the evaluation is 1 as returned by the run method of the base class. It is even clearer if you use parse instead of evaluate , because it would allow you to execute the run method several times on the same script instance: def script = shell.parse("println 'Ok'") assert script.run() == 1 assert script.run() == 2 4. Adding properties to numbers In Groovy number types are considered equal to any other types. As such, it is possible to enhance numbers by adding properties or methods to them. This can be very handy when dealing with measurable quantities for example. Details about how existing classes can be enhanced in Groovy are found in the extension modules section or the categories section. An illustration of this can be found in Groovy using the TimeCategory : use(TimeCategory) { println 1.minute.from.now (1) println 10.hours.ago def someDate = new Date() (2) println someDate - 3.months } 1 using the TimeCategory , a property minute is added to the Integer class 2 similarly, the months method returns a groovy.time.DatumDependentDuration which can be used in calculus Categories are lexically bound, making them a great fit for internal DSLs. 5. @DelegatesTo 5.1. Explaining delegation strategy at compile time @groovy.lang.DelegatesTo is a documentation and compile-time annotation aimed at: documenting APIs that use closures as arguments providing type information for the static type checker and compiler The Groovy language is a platform of choice for building DSLs. Using closures, it’s quite easy to create custom control structures, as well as it is simple to create builders. Imagine that you have the following code: email { from 'dsl-guru@mycompany.com' to 'john.doe@waitaminute.com' subject 'The pope has resigned!' body { p 'Really, the pope has resigned!' } } One way of implementing this is using the builder strategy, which implies a method, named email  which accepts a closure as an argument. The method may delegate subsequent calls to an object that implements the  from ,  to ,  subject and  body methods. Again,  body is a method which accepts a closure as an argument and that uses the builder strategy. Implementing such a builder is usually done the following way: def email(Closure cl) { def email = new EmailSpec() def code = cl.rehydrate(email, this, this) code.resolveStrategy = Closure.DELEGATE_ONLY code() } the EmailSpec class implements the  from ,  to , … methods. By calling  rehydrate , we’re creating a copy of the closure for which we set the  delegate ,  owner and  thisObject values. Setting the owner and the this object is not very important here since we will use the DELEGATE_ONLY strategy which says that the method calls will be resolved only against the delegate of the closure. class EmailSpec { void from(String from) { println "From: $from"} void to(String... to) { println "To: $to"} void subject(String subject) { println "Subject: $subject"} void body(Closure body) { def bodySpec = new BodySpec() def code = body.rehydrate(bodySpec, this, this) code.resolveStrategy = Closure.DELEGATE_ONLY code() } } The EmailSpec class has itself a body method accepting a closure that is cloned and executed. This is what we call the builder pattern in Groovy. One of the problems with the code that we’ve shown is that the user of the email method doesn’t have any information about the methods that he’s allowed to call inside the closure. The only possible information is from the method documentation. There are two issues with this: first of all, documentation is not always written, and if it is, it’s not always available (javadoc not downloaded, for example). Second, it doesn’t help IDEs. What would be really interesting, here, is for IDEs to help the developer by suggesting, once they are in the closure body, methods that exist on the email class. Moreover, if the user calls a method in the closure which is not defined by the  EmailSpec class, the IDE should at least issue a warning (because it’s very likely that it will break at runtime). One more problem with the code above is that it is not compatible with static type checking. Type checking would let the user know if a method call is authorized at compile time instead of runtime, but if you try to perform type checking on this code: email { from 'dsl-guru@mycompany.com' to 'john.doe@waitaminute.com' subject 'The pope has resigned!' body { p 'Really, the pope has resigned!' } } Then the type checker will know that there’s an  email method accepting a  Closure , but it will complain about every method call  inside the closure, because  from , for example, is not a method which is defined in the class. Indeed, it’s defined in the  EmailSpec class and it has absolutely no hint to help it knowing that the closure delegate will, at runtime, be of type  EmailSpec : @groovy.transform.TypeChecked void sendEmail() { email { from 'dsl-guru@mycompany.com' to 'john.doe@waitaminute.com' subject 'The pope has resigned!' body { p 'Really, the pope has resigned!' } } } will fail compilation with errors like this one: [Static type checking] - Cannot find matching method MyScript#from(java.lang.String). Please check if the declared type is correct and if the method exists. @ line 31, column 21. from 'dsl-guru@mycompany.com' 5.2. @DelegatesTo For those reasons, Groovy 2.1 introduced a new annotation named  @DelegatesTo . The goal of this annotation is to solve both the documentation issue, that will let your IDE know about the expected methods in the closure body, and it will also solve the type checking issue, by giving hints to the compiler about what are the potential receivers of method calls in the closure body. The idea is to annotate the  Closure parameter of the  email method: def email(@DelegatesTo(EmailSpec) Closure cl) { def email = new EmailSpec() def code = cl.rehydrate(email, this, this) code.resolveStrategy = Closure.DELEGATE_ONLY code() } What we’ve done here is telling the compiler (or the IDE) that when the method will be called with a closure, the delegate of this closure will be set to an object of type  email . But there is still a problem: the default delegation strategy is not the one which is used in our method. So we will give more information and tell the compiler (or the IDE) that the delegation strategy is also changed: def email(@DelegatesTo(strategy=Closure.DELEGATE_ONLY, value=EmailSpec) Closure cl) { def email = new EmailSpec() def code = cl.rehydrate(email, this, this) code.resolveStrategy = Closure.DELEGATE_ONLY code() } Now, both the IDE and the type checker (if you are using @TypeChecked ) will be aware of the delegate and the delegation strategy. This is very nice because it will both allow the IDE to provide smart completion, but it will also remove errors at compile time that exist only because the behaviour of the program is normally only known at runtime! The following code will now pass compilation: @TypeChecked void doEmail() { email { from 'dsl-guru@mycompany.com' to 'john.doe@waitaminute.com' subject 'The pope has resigned!' body { p 'Really, the pope has resigned!' } } } 5.3. DelegatesTo modes @DelegatesTo supports multiple modes that we will describe with examples in this section. 5.3.1. Simple delegation In this mode, the only mandatory parameter is the  value which says to which class we delegate calls. Nothing more. We’re telling the compiler that the type of the delegate will  always be of the type documented by  @DelegatesTo (note that it can be a subclass, but if it is, the methods defined by the subclass will not be visible to the type checker). void body(@DelegatesTo(BodySpec) Closure cl) { // ... } 5.3.2. Delegation strategy In this mode, you must specify both the delegate class  and a delegation strategy. This must be used if the closure will not be called with the default delegation strategy, which is  Closure.OWNER_FIRST . void body(@DelegatesTo(strategy=Closure.DELEGATE_ONLY, value=BodySpec) Closure cl) { // ... } 5.3.3. Delegate to parameter In this variant, we will tell the compiler that we are delegating to another parameter of the method. Take the following code: def exec(Object target, Closure code) { def clone = code.rehydrate(target, this, this) clone() } Here, the delegate which will be used is  not created inside the  exec method. In fact, we take an argument of the method and delegate to it. Usage may look like this: def email = new Email() exec(email) { from '...' to '...' send() } Each of the method calls are delegated to the  email parameter. This is a widely used pattern which is also supported by  @DelegatesTo using a companion annotation: def exec(@DelegatesTo.Target Object target, @DelegatesTo Closure code) { def clone = code.rehydrate(target, this, this) clone() } A closure is annotated with  @DelegatesTo , but this time, without specifying any class. Instead, we’re annotating another parameter with  @DelegatesTo.Target . The type of the delegate is then determined at compile time. One could think that we are using the parameter type, which in this case is  Object but this is not true. Take this code: class Greeter { void sayHello() { println 'Hello' } } def greeter = new Greeter() exec(greeter) { sayHello() } Remember that this works out of the box  without having to annotate with  @DelegatesTo . However, to make the IDE aware of the delegate type, or the  type checker aware of it, we need to add  @DelegatesTo . And in this case, it will know that the  Greeter variable is of type  Greeter , so it will not report errors on the  sayHello method  even if the exec method doesn’t explicitly define the target as of type Greeter . This is a very powerful feature, because it prevents you from writing multiple versions of the same  exec method for different receiver types! In this mode, the  @DelegatesTo annotation also supports the  strategy parameter that we’ve described upper. 5.3.4. Multiple closures In the previous example, the  exec method accepted only one closure, but you may have methods that take multiple closures: void fooBarBaz(Closure foo, Closure bar, Closure baz) { ... } Then nothing prevents you from annotating each closure with  @DelegatesTo : class Foo { void foo(String msg) { println "Foo ${msg}!" } } class Bar { void bar(int x) { println "Bar ${x}!" } } class Baz { void baz(Date d) { println "Baz ${d}!" } } void fooBarBaz(@DelegatesTo(Foo) Closure foo, @DelegatesTo(Bar) Closure bar, @DelegatesTo(Baz) Closure baz) { ... } But more importantly, if you have multiple closures  and multiple arguments, you can use several targets: void fooBarBaz( @DelegatesTo.Target('foo') foo, @DelegatesTo.Target('bar') bar, @DelegatesTo.Target('baz') baz, @DelegatesTo(target='foo') Closure cl1, @DelegatesTo(target='bar') Closure cl2, @DelegatesTo(target='baz') Closure cl3) { cl1.rehydrate(foo, this, this).call() cl2.rehydrate(bar, this, this).call() cl3.rehydrate(baz, this, this).call() } def a = new Foo() def b = new Bar() def c = new Baz() fooBarBaz( a, b, c, { foo('Hello') }, { bar(123) }, { baz(new Date()) } ) At this point, you may wonder why we don’t use the parameter names as references. The reason is that the information (the parameter name) is not always available (it’s a debug-only information), so it’s a limitation of the JVM. 5.3.5. Delegating to a generic type In some situations, it is interesting to instruct the IDE or the compiler that the delegate type will not be a parameter but a generic type. Imagine a configurator that runs on a list of elements: public <T> void configure(List<T> elements, Closure configuration) { elements.each { e-> def clone = configuration.rehydrate(e, this, this) clone.resolveStrategy = Closure.DELEGATE_FIRST clone.call() } } Then this method can be called with any list like this: @groovy.transform.ToString class Realm { String name } List<Realm> list = [] 3.times { list << new Realm() } configure(list) { name = 'My Realm' } assert list.every { it.name == 'My Realm' } To let the type checker and the IDE know that the configure method calls the closure on each element of the list, you need to use @DelegatesTo differently: public <T> void configure( @DelegatesTo.Target List<T> elements, @DelegatesTo(strategy=Closure.DELEGATE_FIRST, genericTypeIndex=0) Closure configuration) { def clone = configuration.rehydrate(e, this, this) clone.resolveStrategy = Closure.DELEGATE_FIRST clone.call() } @DelegatesTo takes an optional genericTypeIndex argument that tells what is the index of the generic type that will be used as the delegate type. This must be used in conjunction with @DelegatesTo.Target and the index starts at 0. In the example above, that means that the delegate type is resolved against List<T> , and since the generic type at index 0 is T and inferred as a Realm , the type checker infers that the delegate type will be of type Realm . We’re using a genericTypeIndex instead of a placeholder ( T ) because of JVM limitations. 5.3.6. Delegating to an arbitrary type It is possible that none of the options above can represent the type you want to delegate to. For example, let’s define a mapper class which is parametrized with an object and defines a map method which returns an object of another type: class Mapper<T,U> { (1) final T value (2) Mapper(T value) { this.value = value } U map(Closure<U> producer) { (3) producer.delegate = value producer() } } 1 The mapper class takes two generic type arguments: the source type and the target type 2 The source object is stored in a final field 3 The map method asks to convert the source object to a target object As you can see, the method signature from map does not give any information about what object will be manipulated by the closure. Reading the method body, we know that it will be the value which is of type T , but T is not found in the method signature, so we are facing a case where none of the available options for @DelegatesTo is suitable. For example, if we try to statically compile this code: def mapper = new Mapper<String,Integer>('Hello') assert mapper.map { length() } == 5 Then the compiler will fail with: Static type checking] - Cannot find matching method TestScript0#length() In that case, you can use the type member of the @DelegatesTo annotation to reference T as a type token: class Mapper<T,U> { final T value Mapper(T value) { this.value = value } U map(@DelegatesTo(type="T") Closure<U> producer) { (1) producer.delegate = value producer() } } 1 The @DelegatesTo annotation references a generic type which is not found in the method signature Note that you are not limited to generic type tokens. The type member can be used to represent complex types, such as List<T> or Map<T,List<U>> . The reason why you should use that in last resort is that the type is only checked when the type checker finds usage of @DelegatesTo , not when the annotated method itself is compiled. This means that type safety is only ensured at the call site. Additionally, compilation will be slower (though probably unnoticeable for most cases). 6. Compilation customizers 6.1. Introduction Whether you are using  groovyc to compile classes or a  GroovyShell , for example, to execute scripts, under the hood, a compiler configuration is used. This configuration holds information like the source encoding or the classpath but it can also be used to perform more operations like adding imports by default, applying AST transformations transparently or disabling global AST transformations. The goal of compilation customizers is to make those common tasks easy to implement. For that, the  CompilerConfiguration class is the entry point. The general schema will always be based on the following code: import org.codehaus.groovy.control.CompilerConfiguration // create a configuration def config = new CompilerConfiguration() // tweak the configuration config.addCompilationCustomizers(...) // run your script def shell = new GroovyShell(config) shell.evaluate(script) Compilation customizers must extend the  org.codehaus.groovy.control.customizers.CompilationCustomizer class. A customizer works: on a specific compilation phase on  every class node being compiled You can implement your own compilation customizer but Groovy includes some of the most common operations. 6.2. Import customizer Using this compilation customizer, your code will have imports added transparently. This is in particular useful for scripts implementing a DSL where you want to avoid users from having to write imports. The import customizer will let you add all the variants of imports the Groovy language allows, that is: class imports, optionally aliased star imports static imports, optionally aliased static star imports import org.codehaus.groovy.control.customizers.ImportCustomizer def icz = new ImportCustomizer() // "normal" import icz.addImports('java.util.concurrent.atomic.AtomicInteger', 'java.util.concurrent.ConcurrentHashMap') // "aliases" import icz.addImport('CHM', 'java.util.concurrent.ConcurrentHashMap') // "static" import icz.addStaticImport('java.lang.Math', 'PI') // import static java.lang.Math.PI // "aliased static" import icz.addStaticImport('pi', 'java.lang.Math', 'PI') // import static java.lang.Math.PI as pi // "star" import icz.addStarImports 'java.util.concurrent' // import java.util.concurrent.* // "static star" import icz.addStaticStars 'java.lang.Math' // import static java.lang.Math.* A detailed description of all shortcuts can be found in org.codehaus.groovy.control.customizers.ImportCustomizer 6.3. AST transformation customizer The AST transformation customizer is meant to apply AST transformations transparently. Unlike global AST transformations that apply on every class being compiled as long as the transform is found on classpath (which has drawbacks like increasing the compilation time or side effects due to transformations applied where they should not), the customizer will allow you to selectively apply a transform only for specific scripts or classes. As an example, let’s say you want to be able to use  @Log in a script. The problem is that  @Log is normally applied on a class node and a script, by definition, doesn’t require one. But implementation wise, scripts are classes, it’s just that you cannot annotate this implicit class node with  @Log . Using the AST customizer, you have a workaround to do it: import org.codehaus.groovy.control.customizers.ASTTransformationCustomizer import groovy.util.logging.Log def acz = new ASTTransformationCustomizer(Log) config.addCompilationCustomizers(acz) That’s all! Internally, the  @Log AST transformation is applied to every class node in the compilation unit. This means that it will be applied to the script, but also to classes defined within the script. If the AST transformation that you are using accepts parameters, you can use parameters in the constructor too: def acz = new ASTTransformationCustomizer(Log, value: 'LOGGER') // use name 'LOGGER' instead of the default 'log' config.addCompilationCustomizers(acz) As the AST transformation customizers works with objects instead of AST nodes, not all values can be converted to AST transformation parameters. For example, primitive types are converted to  ConstantExpression (that is LOGGER is converted to  new ConstantExpression('LOGGER') , but if your AST transformation takes a closure as an argument, then you have to give it a  ClosureExpression , like in the following example: def configuration = new CompilerConfiguration() def expression = new AstBuilder().buildFromCode(CompilePhase.CONVERSION) { -> true }.expression[0] def customizer = new ASTTransformationCustomizer(ConditionalInterrupt, value: expression, thrown: SecurityException) configuration.addCompilationCustomizers(customizer) def shell = new GroovyShell(configuration) shouldFail(SecurityException) { shell.evaluate(""" // equivalent to adding @ConditionalInterrupt(value={true}, thrown: SecurityException) class MyClass { void doIt() { } } new MyClass().doIt() """) } For a complete list of options, please refer to org.codehaus.groovy.control.customizers.ASTTransformationCustomizer 6.4. Secure AST customizer This customizer will allow the developer of a DSL to restrict the grammar of the language, for example, to prevent users from using particular constructs. It is only ``secure'' in that one aspect, i.e. limiting the allowable constructs within a DSL. It does  not replace a security manager which might additionally be needed as an orthogonal aspect of overall security. The only reason for it to exist is to limit the expressiveness of the language. This customizer only works at the AST (abstract syntax tree) level, not at runtime! It can be strange at first glance, but it makes much more sense if you think of Groovy as a platform to build DSLs. You may not want a user to have a complete language at hand. In the example below, we will demonstrate it using an example of language that only allows arithmetic operations, but this customizer allows you to: allow/disallow creation of closures allow/disallow imports allow/disallow package definition allow/disallow definition of methods restrict the receivers of method calls restrict the kind of AST expressions a user can use restrict the tokens (grammar-wise) a user can use restrict the types of the constants that can be used in code For all those features, the secure AST customizer works using either an allowed list (list of elements that are permitted)  or a disallowed list (list of elements that are not permitted). For each type of feature (imports, tokens, …) you have the choice to use either an allowed or disallowed list, but you can mix dis/allowed lists for distinct features. Typically, you will choose allowed lists (which permits only the constructs listed and disallows all others). import org.codehaus.groovy.control.customizers.SecureASTCustomizer import static org.codehaus.groovy.syntax.Types.* (1) def scz = new SecureASTCustomizer() scz.with { closuresAllowed = false // user will not be able to write closures methodDefinitionAllowed = false // user will not be able to define methods allowedImports = [] // empty allowed list means imports are disallowed allowedStaticImports = [] // same for static imports allowedStaticStarImports = ['java.lang.Math'] // only java.lang.Math is allowed // the list of tokens the user can find // constants are defined in org.codehaus.groovy.syntax.Types allowedTokens = [ (1) PLUS, MINUS, MULTIPLY, DIVIDE, REMAINDER, POWER, PLUS_PLUS, MINUS_MINUS, COMPARE_EQUAL, COMPARE_NOT_EQUAL, COMPARE_LESS_THAN, COMPARE_LESS_THAN_EQUAL, COMPARE_GREATER_THAN, COMPARE_GREATER_THAN_EQUAL, ].asImmutable() // limit the types of constants that a user can define to number types only allowedConstantTypesClasses = [ (2) Integer, Float, Long, Double, BigDecimal, Integer.TYPE, Long.TYPE, Float.TYPE, Double.TYPE ].asImmutable() // method calls are only allowed if the receiver is of one of those types // be careful, it's not a runtime type! allowedReceiversClasses = [ (2) Math, Integer, Float, Double, Long, BigDecimal ].asImmutable() } 1 use for token types from org.codehaus.groovy.syntax.Types 2 you can use class literals here If what the secure AST customizer provides out of the box isn’t enough for your needs, before creating your own compilation customizer, you might be interested in the expression and statement checkers that the AST customizer supports. Basically, it allows you to add custom checks on the AST tree, on expressions (expression checkers) or statements (statement checkers). For this, you must implement  org.codehaus.groovy.control.customizers.SecureASTCustomizer.StatementChecker or  org.codehaus.groovy.control.customizers.SecureASTCustomizer.ExpressionChecker . Those interfaces define a single method called  isAuthorized , returning a boolean, and taking a  Statement (or  Expression ) as a parameter. It allows you to perform complex logic over expressions or statements to tell if a user is allowed to do it or not. For example, there’s no predefined configuration flag in the customizer which will let you prevent people from using an attribute expression. Using a custom checker, it is trivial: def scz = new SecureASTCustomizer() def checker = { expr -> !(expr instanceof AttributeExpression) } as SecureASTCustomizer.ExpressionChecker scz.addExpressionCheckers(checker) Then we can make sure that this works by evaluating a simple script: new GroovyShell(config).evaluate ''' class A { int val } def a = new A(val: 123) a.@val (1) ''' 1 will fail compilation Statements can be checked using org.codehaus.groovy.control.customizers.SecureASTCustomizer.StatementChecker Expressions can be checked using org.codehaus.groovy.control.customizers.SecureASTCustomizer.ExpressionChecker 6.5. Source aware customizer This customizer may be used as a filter on other customizers. The filter, in that case, is the  org.codehaus.groovy.control.SourceUnit . For this, the source aware customizer takes another customizer as a delegate, and it will apply customization of that delegate only and only if predicates on the source unit match. SourceUnit gives you access to multiple things but in particular the file being compiled (if compiling from a file, of course). It gives you the potential to perform operation based on the file name, for example. Here is how you would create a source aware customizer: import org.codehaus.groovy.control.customizers.SourceAwareCustomizer import org.codehaus.groovy.control.customizers.ImportCustomizer def delegate = new ImportCustomizer() def sac = new SourceAwareCustomizer(delegate) Then you can use predicates on the source aware customizer: // the customizer will only be applied to classes contained in a file name ending with 'Bean' sac.baseNameValidator = { baseName -> baseName.endsWith 'Bean' } // the customizer will only be applied to files which extension is '.spec' sac.extensionValidator = { ext -> ext == 'spec' } // source unit validation // allow compilation only if the file contains at most 1 class sac.sourceUnitValidator = { SourceUnit sourceUnit -> sourceUnit.AST.classes.size() == 1 } // class validation // the customizer will only be applied to classes ending with 'Bean' sac.classValidator = { ClassNode cn -> cn.endsWith('Bean') } 6.6. Customizer builder If you are using compilation customizers in Groovy code (like the examples above) then you can use an alternative syntax to customize compilation. A builder ( org.codehaus.groovy.control.customizers.builder.CompilerCustomizationBuilder ) simplifies the creation of customizers using a hierarchical DSL. import org.codehaus.groovy.control.CompilerConfiguration import static org.codehaus.groovy.control.customizers.builder.CompilerCustomizationBuilder.withConfig (1) def conf = new CompilerConfiguration() withConfig(conf) { // ... (2) } 1 static import of the builder method 2 configuration goes here The code sample above shows how to use the builder. A static method,  withConfig , takes a closure corresponding to the builder code, and automatically registers compilation customizers to the configuration. Every compilation customizer available in the distribution can be configured this way: 6.6.1. Import customizer withConfig(configuration) { imports { // imports customizer normal 'my.package.MyClass' // a normal import alias 'AI', 'java.util.concurrent.atomic.AtomicInteger' // an aliased import star 'java.util.concurrent' // star imports staticMember 'java.lang.Math', 'PI' // static import staticMember 'pi', 'java.lang.Math', 'PI' // aliased static import } } 6.6.2. AST transformation customizer withConfig(conf) { ast(Log) (1) } withConfig(conf) { ast(Log, value: 'LOGGER') (2) } 1 apply @Log transparently 2 apply @Log with a different name for the logger 6.6.3. Secure AST customizer withConfig(conf) { secureAst { closuresAllowed = false methodDefinitionAllowed = false } } 6.6.4. Source aware customizer withConfig(configuration){ source(extension: 'sgroovy') { ast(CompileStatic) (1) } } withConfig(configuration){ source(extensions: ['sgroovy','sg']) { ast(CompileStatic) (2) } } withConfig(configuration) { source(extensionValidator: { it.name in ['sgroovy','sg']}) { ast(CompileStatic) (2) } } withConfig(configuration) { source(basename: 'foo') { ast(CompileStatic) (3) } } withConfig(configuration) { source(basenames: ['foo', 'bar']) { ast(CompileStatic) (4) } } withConfig(configuration) { source(basenameValidator: { it in ['foo', 'bar'] }) { ast(CompileStatic) (4) } } withConfig(configuration) { source(unitValidator: { unit -> !unit.AST.classes.any { it.name == 'Baz' } }) { ast(CompileStatic) (5) } } 1 apply CompileStatic AST annotation on .sgroovy files 2 apply CompileStatic AST annotation on .sgroovy or .sg files 3 apply CompileStatic AST annotation on files whose name is 'foo' 4 apply CompileStatic AST annotation on files whose name is 'foo' or 'bar' 5 apply CompileStatic AST annotation on files that do not contain a class named 'Baz' 6.6.5. Inlining a customizer Inlined customizer allows you to write a compilation customizer directly, without having to create a class for it. withConfig(configuration) { inline(phase:'CONVERSION') { source, context, classNode -> (1) println "visiting $classNode" (2) } } 1 define an inlined customizer which will execute at the CONVERSION phase 2 prints the name of the class node being compiled 6.6.6. Multiple customizers Of course, the builder allows you to define multiple customizers at once: withConfig(configuration) { ast(ToString) ast(EqualsAndHashCode) } 6.7. The configscript commandline parameter So far, we have described how you can customize compilation using a  CompilationConfiguration class, but this is only possible if you embed Groovy and that you create your own instances of  CompilerConfiguration (then use it to create a GroovyShell , GroovyScriptEngine , …). If you want it to be applied on the classes you compile with the normal Groovy compiler (that is to say with groovyc , ant or gradle , for example), it is possible to use a commandline parameter named configscript that takes a Groovy configuration script as argument. This script gives you access to the CompilerConfiguration instance  before the files are compiled (exposed into the configuration script as a variable named configuration ), so that you can tweak it. It also transparently integrates the compiler configuration builder above. As an example, let’s see how you would activate static compilation by default on all classes. 6.7.1. Configscript example: Static compilation by default Normally, classes in Groovy are compiled with a dynamic runtime. You can activate static compilation by placing an annotation named @CompileStatic on any class. Some people would like to have this mode activated by default, that is to say not having to annotate (potentially many) classes. Using configscript , makes this possible. First of all, you need to create a file named config.groovy into say src/conf with the following contents: withConfig(configuration) { (1) ast(groovy.transform.CompileStatic) } 1 configuration references a CompilerConfiguration instance That is actually all you need. You don’t have to import the builder, it’s automatically exposed in the script. Then, compile your files using the following command line: groovyc -configscript src/conf/config.groovy src/main/groovy/MyClass.groovy We strongly recommend you to separate configuration files from classes, hence why we suggest using the src/main and src/conf directories above. 6.7.2. Configscript example: Setting system properties In a configuration script you can also set system properties, e.g.: System.setProperty('spock.iKnowWhatImDoing.disableGroovyVersionCheck', 'true') If you have numerous system properties to set, then using a configuration file will reduce the need to set a bunch of system properties with a long command line or appropriately defined environment variable. You can also share all the settings by simply sharing the config file. 6.8. AST transformations If: runtime metaprogramming doesn’t allow you to do what you want you need to improve the performance of the execution of your DSLs you want to leverage the same syntax as Groovy but with different semantics you want to improve support for type checking in your DSLs Then AST transformations are the way to go. Unlike the techniques used so far, AST transformations are meant to change or generate code before it is compiled to bytecode. AST transformations are capable of adding new methods at compile time for example, or totally changing the body of a method based on your needs. They are a very powerful tool but also come at the price of not being easy to write. For more information about AST transformations, please take a look at the compile-time metaprogramming section of this manual. 7. Custom type checking extensions It may be interesting, in some circumstances, to provide feedback about wrong code to the user as soon as possible, that is to say when the DSL script is compiled, rather than having to wait for the execution of the script. However, this is not often possible with dynamic code. Groovy actually provides a practical answer to this known as type checking extensions . 8. Builders Many tasks require building things and the builder pattern is one technique used by developers to make building things easier, especially building of structures which are hierarchical in nature. This pattern is so ubiquitous that Groovy has special built-in support. Firstly, there are many built-in builders. Secondly, there are classes which make it easier to write your own builders. 8.1. Existing builders Groovy comes with many built-in builders. Let’s look at some of them. 8.1.1. MarkupBuilder See Creating Xml - MarkupBuilder . 8.1.2. StreamingMarkupBuilder See Creating Xml - StreamingMarkupBuilder . 8.1.3. SaxBuilder A builder for generating Simple API for XML (SAX) events. If you have the following SAX handler: class LogHandler extends org.xml.sax.helpers.DefaultHandler { String log = '' void startElement(String uri, String localName, String qName, org.xml.sax.Attributes attributes) { log += "Start Element: $localName, " } void endElement(String uri, String localName, String qName) { log += "End Element: $localName, " } } You can use SaxBuilder to generate SAX events for the handler like this: def handler = new LogHandler() def builder = new groovy.xml.SAXBuilder(handler) builder.root() { helloWorld() } And then check that everything worked as expected: assert handler.log == 'Start Element: root, Start Element: helloWorld, End Element: helloWorld, End Element: root, ' 8.1.4. StaxBuilder A Groovy builder that works with Streaming API for XML (StAX) processors. Here is a simple example using the StAX implementation of Java to generate XML: def factory = javax.xml.stream.XMLOutputFactory.newInstance() def writer = new StringWriter() def builder = new groovy.xml.StaxBuilder(factory.createXMLStreamWriter(writer)) builder.root(attribute:1) { elem1('hello') elem2('world') } assert writer.toString() == '<?xml version="1.0" ?><root attribute="1"><elem1>hello</elem1><elem2>world</elem2></root>' An external library such as Jettison can be used as follows: @Grab('org.codehaus.jettison:jettison:1.3.3') @GrabExclude('stax:stax-api') // part of Java 6 and later import org.codehaus.jettison.mapped.* def writer = new StringWriter() def mappedWriter = new MappedXMLStreamWriter(new MappedNamespaceConvention(), writer) def builder = new groovy.xml.StaxBuilder(mappedWriter) builder.root(attribute:1) { elem1('hello') elem2('world') } assert writer.toString() == '{"root":{"@attribute":"1","elem1":"hello","elem2":"world"}}' 8.1.5. DOMBuilder A builder for parsing HTML, XHTML and XML into a W3C DOM tree. For example this XML String : String recordsXML = ''' <records> <car name='HSV Maloo' make='Holden' year='2006'> <country>Australia</country> <record type='speed'>Production Pickup Truck with speed of 271kph</record> </car> <car name='P50' make='Peel' year='1962'> <country>Isle of Man</country> <record type='size'>Smallest Street-Legal Car at 99cm wide and 59 kg in weight</record> </car> <car name='Royale' make='Bugatti' year='1931'> <country>France</country> <record type='price'>Most Valuable Car at $15 million</record> </car> </records>''' Can be parsed into a DOM tree with a DOMBuilder like this: def reader = new StringReader(recordsXML) def doc = groovy.xml.DOMBuilder.parse(reader) And then processed further e.g. by using DOMCategory : def records = doc.documentElement use(groovy.xml.dom.DOMCategory) { assert records.car.size() == 3 } 8.1.6. NodeBuilder NodeBuilder is used for creating nested trees of groovy.util.Node objects for handling arbitrary data. To create a simple user list you use a NodeBuilder like this: def nodeBuilder = new NodeBuilder() def userlist = nodeBuilder.userlist { user(id: '1', firstname: 'John', lastname: 'Smith') { address(type: 'home', street: '1 Main St.', city: 'Springfield', state: 'MA', zip: '12345') address(type: 'work', street: '2 South St.', city: 'Boston', state: 'MA', zip: '98765') } user(id: '2', firstname: 'Alice', lastname: 'Doe') } Now you can process the data further, e.g. by using GPath expressions : assert userlist.user.@firstname.join(', ') == 'John, Alice' assert userlist.user.find { it.@lastname == 'Smith' }.address.size() == 2 8.1.7. JsonBuilder Groovy’s JsonBuilder makes it easy to create Json. For example to create this Json string: String carRecords = ''' { "records": { "car": { "name": "HSV Maloo", "make": "Holden", "year": 2006, "country": "Australia", "record": { "type": "speed", "description": "production pickup truck with speed of 271kph" } } } } ''' you can use a JsonBuilder like this: JsonBuilder builder = new JsonBuilder() builder.records { car { name 'HSV Maloo' make 'Holden' year 2006 country 'Australia' record { type 'speed' description 'production pickup truck with speed of 271kph' } } } String json = JsonOutput.prettyPrint(builder.toString()) We use JsonUnit to check that the builder produced the expected result: JsonAssert.assertJsonEquals(json, carRecords) If you need to customize the generated output you can pass a JsonGenerator instance when creating a JsonBuilder : import groovy.json.* def generator = new JsonGenerator.Options() .excludeNulls() .excludeFieldsByName('make', 'country', 'record') .excludeFieldsByType(Number) .addConverter(URL) { url -> "http://groovy-lang.org" } .build() JsonBuilder builder = new JsonBuilder(generator) builder.records { car { name 'HSV Maloo' make 'Holden' year 2006 country 'Australia' homepage new URL('http://example.org') record { type 'speed' description 'production pickup truck with speed of 271kph' } } } assert builder.toString() == '{"records":{"car":{"name":"HSV Maloo","homepage":"http://groovy-lang.org"}}}' 8.1.8. StreamingJsonBuilder Unlike JsonBuilder which creates a data structure in memory, which is handy in those situations where you want to alter the structure programmatically before output, StreamingJsonBuilder directly streams to a writer without any intermediate memory data structure. If you do not need to modify the structure and want a more memory-efficient approach, use StreamingJsonBuilder . The usage of StreamingJsonBuilder is similar to JsonBuilder . In order to create this Json string: String carRe
2026-01-13T09:29:32
https://www.chinadaily.com.cn/a/202601/08/WS695f238fa310d6866eb32a82.html
Festive atmosphere, immersive cultural experience in North China ancient town - Chinadaily.com.cn Search HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL WATCHTHIS SPORTS OPINION REGIONAL FORUM NEWSPAPER MOBILE Home Culture Events and Festivals Home / Culture / Events and Festivals Festive atmosphere, immersive cultural experience in North China ancient town Xinhua | Updated: 2026-01-08 11:24 Share Share - WeChat --> CLOSE Long renowned for its vibrant woodblock paintings, a celebrated staple of New Year decor across China, Yangliuqing town is now turning itself into an immersive, interactive scene that visitors can step into and explore.[Photo/Xinhua] As dusk settled in, the ancient town of Yangliuqing in North China's Tianjin lit up with festive lights along the historic Beijing-Hangzhou Grand Canal. Even before reaching the main street, visitors were greeted by a joyful New Year's atmosphere -- colorful lanterns and red banners adorned the traditional town, while cheerful figurines inspired by Yangliuqing's renowned woodblock paintings stood at the entrance of the lane. Long renowned for its vibrant woodblock paintings, a celebrated staple of New Year decor across China, Yangliuqing town is now turning itself into an immersive, interactive scene that visitors can step into and explore. The Yangliuqing woodblock painting draws from the town's rich history along the Grand Canal, once a vital trade route that connected northern and southern China. During the Ming and Qing dynasties (1368-1911), the canal helped carry Yangliuqing's iconic, symbolic New Year paintings to all corners of the country, spreading art and tradition far and wide. For the new year, the town's historic buildings have become a luminous canvas of light, sound and digital art. Overhead, a swarm of drones lit up the night sky, creating a dazzling aerial display.   --> 1 2 3 4 Next    >>| --> 1/4 Next Photo Highs and lows mark China-US ties in 2025 Bringing care from afar Pursuit of 'silver dividends' redefines seniors' golden years What's next in AI development? A tech pro's lens What Chinese modernization means for the world Eyeing China's high-tech vision --> Related Stories Woodprint art bonds China and Vietnam Tianjin hosts Experience Tianjin international cultural exchange event Framing the future of an intricate and beloved craft Waterways flow steeped in heritage Ancient craft of New Year paintings thrives in Tianjin --> Top BACK TO THE TOP English 中文 HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment FOLLOW US Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. -->
2026-01-13T09:29:32
https://www.atlassian.com/project-management/templates
Free Project Management Templates | Atlassian Close View this page in your language ? All languages Choose your language 中文 Deutsch English Español Français Italiano 한국어 Nederlands 日本語 Português Pусский Polski Get it free Products Featured Developers Product Managers IT professionals Business Teams Leadership Teams Featured Developers Product Managers IT professionals Business Teams Leadership Teams See all apps Featured FEATURED APPS Jira Flexible project management Confluence Collaborative knowledge workspace Jira Service Management High-velocity service delivery ATLASSIAN COLLECTIONS Supercharge teamwork seamlessly Jira • Confluence • Loom • Rovo Optimize strategy and outcomes confidently Focus • Talent • Align Deliver service at high-velocity Jira Service Management • Customer Service Management • Assets • Rovo Ship high-quality software fast Rovo Dev • DX • Pipelines • Bitbucket • Compass POWERED BY Rovo AI-powered apps – driven by your team's knowledge. Developers Jira Flexible project management Compass Software catalog for teams Pipelines Scalable CI/CD automation Bitbucket Source code and CI/CD DX Measure productivity and AI impact Rovo Dev Agentic AI for developers Ship high-quality software fast Rovo Dev • DX • Pipelines • Bitbucket • Compass Rovo AI-powered apps – driven by your team's knowledge. Product Managers Jira Flexible project management Confluence Knowledge, all in one place Jira Product Discovery Capture & prioritize ideas Supercharge teamwork seamlessly Jira • Confluence • Loom • Rovo Rovo AI-powered apps – driven by your team's knowledge. IT professionals Jira Service Management High-velocity service delivery Guard Enhanced cloud security Rovo AI-powered apps – driven by your team's knowledge. Business Teams Jira Flexible project management Confluence Knowledge, all in one place Trello Organized & visualized work Loom Quick, async video updates Jira Service Management High-velocity service delivery Customer Service Management Customer experiences reimagined Supercharge teamwork seamlessly Jira • Confluence • Loom • Rovo Rovo AI-powered apps – driven by your team's knowledge. Leadership Teams Focus Enterprise-scale strategic planning Talent Knowledge workforce planning Jira Align Enterprise-wide work planning & value Optimize strategy and outcomes confidently Focus • Talent • Align Rovo AI-powered apps – driven by your team's knowledge. Back Solutions Solutions By use case Team collaboration Strategy and planning Service management Software development By team Software Marketing IT By size Enterprise Small business Startup Non-profit By industry Retail Telecommunications Professional services Government Rovo AI-powered apps – driven by your team's knowledge. Back Why Atlassian Why Atlassian System of Work New Atlassian's blueprint for how teams work together Integrations Connect thousands of apps to your Atlassian products Customers Case studies & stories powered by teamwork FedRAMP Compliant solutions for the public sector Resilience Enterprise-grade & highly performant infrastructure Platform Our deeply integrated, reliable & secure platform Trust center Ensure your data’s security, compliance & availability Back Resources Resources Customer Support Ask questions, report bugs & give us feedback Find Partners Consulting, training & product customization support Atlassian Ascend Resources and support for your transformation Community Learn, connect and grow with the Atlassian Community support General inquiries Product Advice Partner support Enterprise support Technical Support Pricing and Billing Developer support Purchasing & Licensing Resources Project Management Agile Atlassian Learning Get Started Project Collaboration Team Playbook Product Documentation Back Enterprise More + Less - Get it free Jira Flexible project management Jira Service Management High-velocity service delivery Confluence Knowledge, all in one place See all products Get it free Back Get it free Project Management Templates Project management hub Templates Project management hub Project management templates From software releases to marketing campaigns, projects come in all shapes and sizes. This collection of project management templates is here to keep projects on track and everyone on the same page. We’ve got templates for every phase of your project: from initiation and planning to execution, monitoring, and closure. With these templates, managing your project is not only easier but also more effective, no matter what kind of team you’re on. Try it free Project initiation templates This stage is all about stepping back and looking at the project from a broader perspective. Rather than diving headfirst into timelines and action items, the focus here is on evaluating the project's value and potential. Below, you’ll find a set of templates to help guide you through the initiation phase and set your project up for success. Roles and responsibilities template Clearly define team roles and responsibilities to enhance collaboration. Learn more Top-level planning template Oversee high-level project planning and management with this template. Learn more OKRs template Align teams and achieve goals with structured OKR templates. Learn more Annual Plan One-Pager Template Summarize your annual plan on a concise one-pager for easy reference. Learn more Prioritization matrix template Prioritize projects effectively with the prioritization matrix template. Learn more SMART goals template Craft specific, measurable goals with the SMART Goals template. Learn more Persona Template Create detailed personas to guide product development and marketing. Learn more Voting table template Make team decisions democratically with a structured voting table. Learn more Team Poster Template Introduce and showcase your team with a visually appealing poster. Learn more Goals, Signals, Measures Template Align team efforts with goals, signals, and measures for success. Learn more Competitive analysis template Gain market insights with this comprehensive competitive analysis template. Learn more Best Budget Template Create and manage project budgets effectively with this template. Learn more Strategic Plan Template Outline your strategic plan for your next project with this template. Learn more Disruptive Brainstorming Template Spark innovative ideas with a structured brainstorming process. Learn more Problem framing template Frame problems clearly to guide team discussions and solutions. Learn more MVP ideation template Brainstorm and plan your next MVP with this template. Learn more DACI: Decision documentation template Make informed decisions with structured decision-making templates. Learn more Working Agreements Enhance team efficiency with structured working agreements. Learn more SWOT Analysis Template Evaluate strengths, weaknesses, opportunities, and threats for a project. Learn more Vision to Values Template Align your team's work with company vision and core values. Learn more Premortem Template Plan for potential project risks and failures before they occur. Learn more Project Poster Template Summarize key project details for stakeholders with this template. Learn more Brainstorming template Streamline your brainstorming with this structured template. Learn more Elevator pitch template Craft a concise and compelling elevator pitch. Learn more Project execution templates The project execution phase is where all the detailed planning comes to life as your team starts implementing the project plan. This is the hands-on stage, where strategies are executed, resources are managed, and tasks are driven forward. Explore templates to help your team execute effectively and navigate any bumps along the way. Project Team Health Monitor Template Monitor and improve a project team's health with this template. Learn more Sprint Planning Meeting Template Plan successful sprints with comprehensive sprint planning templates. Learn more Kanban Board Template Manage projects and tasks effectively with the Kanban board template. Learn more Task Tracking Template Track and manage tasks effectively with Jira's task tracking templates. Learn more Master Project Documentation Template Organize and manage project docs with master documentation templates. Learn more Remote Team Meeting Template Facilitate productive remote team meetings with structured agendas. Learn more Design Review Template Conduct thorough design reviews with structured feedback templates. Learn more Free Workflow Template Create and manage workflows efficiently to optimize project processes. Learn more Project Board Template Track projects, tasks, and dependencies with the project board template. Learn more Meeting Notes Template Capture meeting details quickly with the structured meeting notes template. Learn more Project Roadmap Template Plan and track a project end to end with a clear project roadmap. Learn more Project Timeline Template Visualize project milestones and deadlines with a clear project timeline. Learn more Process Control Template Standardize and control processes effectively with this template. Learn more Daily stand up template Streamline stand-ups with Confluence templates for structured updates. Learn more Gantt Chart Template Visualize project schedules and dependencies with a Gantt chart. Learn more Work Breakdown Structure Template Decompose projects into manageable tasks with a structured WBS. Learn more Operations Templates | Jira Template Library Streamline operations management with tailored operations templates. Learn more 1-on-1 meeting template Have productive one-on-one meetings with a 1-on-1 meeting template Learn more Scrum Template Manage Agile projects effectively using the Scrum template. Learn more To-Do List Template Keep track of tasks with a simple and effective to-do list. Learn more Project Schedule Template Keep your project on track with a detailed project schedule. Learn more Issue Tracker Template Track issues and solutions throughout a project easily with this template. Learn more Project monitoring templates The project monitoring phase is all about keeping a close eye on your project as it progresses to ensure it stays on track. During this stage, teams continuously evaluate their performance to confirm deadlines are met, budgets are maintained, and goals remain aligned. Here, you’ll discover templates designed to help your team efficiently monitor your project's progress and keep everything running smoothly. Executive Business Review Template Summarize business performance in an executive business review template. Learn more Docs & Reports Templates Access a variety of templates focused on documentation and reporting. Learn more Project Status Template Maintain transparency with detailed project status templates. Learn more End of week status report template Summarize weekly progress with end-of-week status report templates. Learn more Month-End Close Process Template Streamline the month-end close process with a detailed template. Learn more Stakeholder Communications Template Engage stakeholders effectively with clear communication templates. Learn more Business Status Update Template Provide regular business updates to keep everyone informed. Learn more Best Project Report Template Simplify project reporting with comprehensive Jira templates. Learn more Sparring template Structured feedback sessions to improve work with a sparring template. Learn more Best Project Tracking Template Keep projects on track with Jira's project tracker templates. Learn more Project closure templates The project closure phase is the final step where the team ties up all loose ends after completing the project. While the project tasks may be done, this phase ensures the project ends on a high note and sets the foundation for future success. The following templates are crafted to help guide your team through the project closure phase. 4Ls retrospective template Reflect on projects with a 4Ls retrospective template. Learn more 5 Whys Analysis template Identify core problems quickly with the 5 Whys analysis template. Learn more Incident Postmortem Template Analyze incidents and implement improvements with postmortem reviews. Learn more Retrospective Template Conduct productive retrospectives with structured Confluence templates. Learn more Ritual reset template Reevaluate and adjust team rituals for better outcomes. Learn more Project management templates for teams These project management templates are tailored to meet the unique needs of specific teams. Whether you're launching a new marketing campaign, developing a product, managing IT infrastructure, driving sales initiatives, or optimizing HR processes, these project management templates provide a structured approach to help your team achieve their goals efficiently and effectively. Explore the templates below to find the best fit for your team's needs. Project management templates for product & software teams Software teams and product managers need robust tools to guide every stage of development, from initial ideation to post-launch analysis. Our collection of templates is designed to streamline product management and development processes, ensuring you can efficiently manage everything from customer impact assessments to complex software architecture reviews. Customer Impact Assessment Template Evaluate the impact of decisions on customers with this assessment template. Learn more SAFe lean business case template Present a lean business case effectively with this structured template. Learn more Product Launch Template Plan successful product launches with structured Confluence templates. Learn more Templates for Product Managers Access a suite of tools and templates tailored for product managers. Learn more Software architecture review template Evaluate and improve software architecture with this structured template. Learn more Confluence Product Launch Collection Access comprehensive templates for a successful product launch. Learn more AWS Architecture Diagram Template Visualize and document AWS architecture with this diagram template. Learn more Customer Interview Report Template Capture insights from customer interviews with a detailed report. Learn more DevOps Project Plan Template Manage DevOps workflows and tasks efficiently with this template. Learn more Experiment Plan and Results Template Plan and document experiments with clear objectives and results. Learn more DevOps Change Management Template Manage DevOps changes smoothly with this comprehensive template. Learn more Product Management Templates Optimize product management with a suite of tailored templates. Learn more DevOps Runbook Template Standardize operations with a detailed DevOps runbook template. Learn more Software Development Templates Collection Explore templates for software development processes. Learn more Customer journey mapping template Visualize the customer experience with a customer journey map. Learn more Product roadmap template Plan and communicate your product strategy with a product roadmap. Learn more Software Development Templates | Jira Template Library Tailored templates for software development teams and projects. Learn more Project management templates for marketing teams For marketing teams aiming to elevate their strategy and execution, our wide range of project management templates has everything you need. From crafting a go-to-market strategy to planning meaningful email campaigns, our customized templates are designed to help you streamline your creative processes, align cross-functional efforts, and drive results. Content Strategy Template Develop and execute a comprehensive content strategy with this template. Learn more Design Sprint Template Conduct effective design sprints with a structured template. Learn more Email Campaign Tracking Template Plan, execute, and track email campaigns with this template. Learn more Design Decision Template Document and communicate design decisions clearly with this template. Learn more Creative Brief Template Structure creative projects with a detailed and clear brief template. Learn more Go-To-Market Template Plan and execute your go-to-market strategy with a GTM template. Learn more Design Templates Enhance design projects with specialized templates for every phase. Learn more Campaign Management Template Plan and manage marketing campaigns with ease using this template. Learn more Workshop planner template Plan impactful workshops with this comprehensive template. Learn more Marketing Plan Template Create effective marketing plans with structured Confluence templates. Learn more Marketing Campaign Template Design and execute impactful marketing campaigns with Confluence templates. Learn more Design System Template Standardize design processes with a comprehensive design system. Learn more Marketing Templates | Jira Template Library Optimize marketing efforts with tailored marketing templates. Learn more Best Project Management Template Enhance project management with Jira’s templates. Learn more Message House Template Craft clear and consistent messages with a message house template. Learn more Design Component Template Organize and manage design components with this template. Learn more Writing Guidelines Template Establish consistent writing standards across content. Learn more Marketing Strategy Templates Collection Access a collection of marketing strategy templates. Learn more Marketing & Sales Templates Explore templates for marketing and sales teams. Learn more Marketing Blog Post Template Plan, draft, and publish marketing blog posts with this template. Learn more Email Drip Campaign Template Design and manage automated email drip campaigns effortlessly. Learn more Virtual Event Template Plan and execute successful virtual events. Learn more Free Event Planner Template Plan and manage events seamlessly with Jira's event planning templates. Learn more Designs at Scale Template Collection Explore scalable design templates. Learn more Project management templates for IT teams For IT teams focused on maintaining seamless operations and managing incidents effectively, our collection of templates is tailored to meet your needs. Whether you're reporting on major incidents, managing ITSM processes, or creating detailed runbooks, our specialized templates provide a structured approach to ensure that your team is always prepared for what comes next. ITSM Weekly Major Incident Report Template Track and review major IT incidents weekly to improve service management. Learn more Incident Communication Template Streamline incident communication with a clear and structured template. Learn more ITSM Post Incident Review Template Review IT service incidents to improve processes and prevent issues. Learn more ITSM Change Management Template Manage IT service changes efficiently with this comprehensive guide. Learn more Knowledge Base Template Collection Centralize and organize your team's knowledge with a robust base. Learn more ITSM Template Manage IT services with a structured and comprehensive template. Learn more ITSM Runbook Template Maintain IT service continuity with a comprehensive runbook. Learn more IT Project Poster Template Summarize IT project details in a concise, visual IT project poster. Learn more ITSM Known Errors Template Document and track known IT service management errors. Learn more Software Development & IT Templates Access a range of templates for software developers. Learn more Project management templates for HR teams For HR teams dedicated to building strong, supportive, and efficient workplaces, our collection of project management templates is designed to streamline your processes and enhance team collaboration. From crafting clear job descriptions and offer letters to managing the hiring process and gathering interview feedback, these templates offer a comprehensive toolkit for every stage of the employee lifecycle. Job offer letter template Streamline the hiring process with a structured job offer letter template. Learn more HR Knowledge Base Template Centralize HR knowledge for easy access and consistent communication. Learn more Employee handbook template Create and maintain a comprehensive employee handbook effortlessly. Learn more Hiring Process Template Streamline your hiring process with a detailed step-by-step template. Learn more Human Resources Templates Enhance HR processes with specialized templates for HR teams. Learn more Interview Feedback Template Find the right candidate fast with the interview feedback template. Learn more Job Description Template Create clear and comprehensive job descriptions to attract applicants. Learn more Project management templates for sales teams For sales teams aiming to close deals faster and foster strong customer relationships, our selection of templates is tailored to support every step of the sales process. Whether you're setting up a sales portal, planning accounts, or guiding customers through the quote-to-cash process, our project management templates for sales teams ensure you stay organized, informed, and ready to drive results. Sales Portal Template Centralize sales resources and strategies in one accessible portal. Learn more Mutual Action Plan Template Plan and track mutual actions with collaborative templates in Confluence. Learn more Sales Templates | Jira Template Library Boost sales team productivity with tailored sales templates. Learn more Sales Account Planning Template Enhance sales strategies with a sales account planning template. Learn more QTC acquisition template Outline the QTC acquisition process and details with this template. Learn more Project Management Templates: Frequently Asked Questions What are different types of project management templates?    Types of project management templates vary widely, as they span across the five key phases of project management. They include project initiation templates (project poster, project prioritzation), planning templates (SMART Goals, OKRs), execution templates (Kanban, roadmaps, or Gantt charts), monitoring templates (status reports), and closure templates (retrospectives).      What are key components of a project management template?    Key components of a project manement template should include clear objectives, task lists, timelines , roles, milestones, and reporting sections to ensure effective project planning and execution. Where can teams find project management templates?    Teams can find project management templates on Atlassian’s Project Management Templates  resource page, which covers every project phase and team type. Who offers project management tools with customizable templates and reports?    Atlassian provides project management tools like Jira and Confluence, offering a wide range of customizable templates and reporting options. Company Careers Events Blogs Investor Relations Atlassian Foundation Press kit Contact us products Rovo Jira Jira Align Jira Service Management Confluence Loom Trello Bitbucket See all products Resources Technical support Purchasing & licensing Atlassian Community Knowledge base Marketplace My account Create support ticket Learn Partners Training & certification Documentation Developer resources Enterprise services See all resources Copyright © 2025 Atlassian Privacy Policy Terms Impressum Choose language Deutsch English Español Français Italiano 한국어 Nederlands 日本語 Polski Português русский 中文
2026-01-13T09:29:32
https://cloudflare.com/ko-kr/events/
Cloudflare 이벤트 | Cloudflare 가입 언어 English English (United Kingdom) Deutsch Español (Latinoamérica) Español (España) Français Italiano 日本語 한국어 Polski Português (Brasil) Русский 繁體中文 简体中文 플랫폼 클라우드 연결성 Cloudflare의 클라우드 연결성은 60여 가지의 네트워킹, 보⁠안, 성능 서비스를 제공합니다. Enterprise 대규모 및 중간 규모 조직용 중소기업 소규모 조직용 파트너 Cloudflare 파트너 되기 사용 사례 애플리케이션 최신화 성능 가속화 애플리케이션 가용성 보장 웹 경험 최적화 보안 최신화 VPN 교체 피싱 방어 웹 애플리케이션 및 API 보호 네트워크 최신화 커피숍 네트워킹 WAN 최신화 기업 네트워크 간소화 CXO 주제 AI 도입 인력 및 디지털 경험에 AI 도입 AI 보안 에이전틱 AI 및 생성형 AI 애플리케이션 보안 강화 데이터 규제 준수 규제 준수를 간소화하고 위험을 최소화 포스트 퀀텀 암호화 데이터 보호 및 규제 준수 표준 충족 산업 분야 의료 뱅킹 리테일 게임 공공 부문 리소스 제품 가이드 참조 아키텍처 분석 보고서 참여 이벤트 데모 웨비나 워크숍 데모 요청 제품 제품 워크스페이스 보안 Zero Trust 네트워크 액세스 보안 웹 게이트웨이 이메일 보안 클라우드 액세스 보안 브로커 애플리케이션 보안 L7 DDoS 방어 웹 애플리케이션 방화벽 API 보안 봇 관리 애플리케이션 성능 CDN DNS 스마트 라우팅 Load balancing 네트워킹 및 SASE L3/4 DDoS 방어 NaaS / SD-WAN 서비스형 방화벽 네트워크 상호 연결 요금제 및 가격 Enterprise 요금제 중소기업 요금제 개별 요금제 요금제 비교 글로벌 서비스 지원 및 성공 번들 최적화된 Cloudflare 경험 전문 서비스 전문가 주도 구현 기술 계정 관리 집중적인 기술 관리 보안 운영 서비스 Cloudflare 모니터링 및 대응 도메인 등록 도메인 구매 및 관리 1.1.1.1 무료 DNS 확인자 리소스 제품 가이드 참조 아키텍처 분석 보고서 제품 데모 및 투어 제품 추천받기 개발자 문서 개발자 라이브러리 문서 및 가이드 애플리케이션 데모 무엇을 구축할 수 있는지 알아보세요 튜토리얼 단계별 구축 튜토리얼 참조 아키텍처 다이어그램 및 디자인 패턴 제품 인공 지능 AI Gateway AI 애플리케이션 관찰 및 제어 Workers AI Cloudflare 네트워크에서 ML 모델 실행 컴퓨팅 Observability 로그, 메트릭, 추적 Workers 서버리스 애플리케이션 구축 및 배포 미디어 Images 이미지 변환, 최적화 Realtime 실시간 오디오/비디오 애플리케이션 구축 스토리지 및 데이터베이스 D1 서버리스 SQL 데이터베이스 생성 R2 값비싼 송신료 없이 데이터 저장 요금제 및 가격 Workers 서버리스 애플리케이션 구축 및 배포 Workers KV 애플리케이션용 서버리스 키-값 저장소 R2 값비싼 송신료 없이 데이터 저장 프로젝트 살펴보기 고객 사례 30초 이내의 AI 데모 시작을 위한 빠른 가이드 Workers Playground 탐색 빌드, 테스트, 배포 개발자 Discord 커뮤니티 가입 구축 시작하기 파트너 파트너 네트워크 Cloudflare로 성장, 혁신, 고객 요구 충족 파트너 포털 리소스 찾기 및 거래 등록 파트너십 유형 PowerUP 프로그램 고객 연결성과 보안을 유지하면서 비즈니스 성장시키기 기술 파트너 Cloudflare의 기술 파트너십과 통합 생태계 살펴보기 글로벌 시스템 통합업체 대규모 디지털 변환을 원활하게 지원 서비스 공급자 Cloudflare의 주요 서비스 공급자 네트워크 알아보기 셀프 서비스 에이전시 프로그램 귀사 고객을 위한 셀프서비스 계정 관리 피어 투 피어 포털 네트워크 트래픽 인사이트 파트너 검색 Cloudflare Powered+ 파트너와 협력하여 비즈니스 역량을 강화하세요. 자료 참여 데모 + 제품 투어 온디맨드 제품 데모 사례 연구 Cloudflare로 성공 추진하기 웨비나 유익한 논의 워크숍 가상 포럼 라이브러리 유용한 가이드, 로드맵 등 보고서 Cloudflare 연구의 인사이트 블로그 기술 심층 탐구 및 제품 뉴스 학습 센터 교육 도구 및 실전 활용 콘텐츠 구축 참조 아키텍처 기술 가이드 솔루션 + 제품 안내서 제품 문서 문서 개발자 문서 탐색 theNet 디지털 기업을 위한 경영진 인⁠사이트 Cloudflare TV 혁신적인 시리즈 및 이벤트 Cloudforce One 위협 연구 및 운영 Radar 인터넷 트래픽 및 보안 동향 분석 보고서 업계 연구 보고서 이벤트 예정된 지역 이벤트 신뢰, 개인정보 보호, 규제 준수 규제 준수 정보 및 정책 지원 문의 커뮤니티 포럼 계정에 접근할 수 없으신가요? 개발자 Discord 지원받기 회사 회사 정보 리더십 Cloudflare 리더 만나보기 투자자 관계 투자자 정보 언론 최근 뉴스 살펴보기 채용 정보 진행 중인 역할 살펴보기 신뢰, 개인정보 보호, 안전 개인정보 보호 정책, 데이터, 보호 신뢰하지 않음 정책, 프로세스, 안전 규정 준수 인증 및 규제 투명성 정책 및 공개 공익 인도주의 Galileo 프로젝트 정부 기관 Athenian 프로젝트 선거 Cloudflare for Campaigns 건강 Project Fair Shot 전역 네트워크 글로벌 위치 및 상태 로그인 영업팀에 문의 Cloudflare Connect San Francisco 2026 개최 날짜를 잊지 마세요 2026년 10월 19~22일 Cloudflare Connect 2025에서 업계 리더 수천 명과 함께 혁신과 협업을 주도할 수 있는 유례없는 기회를 잡으세요. 자세한 정보 예정된 모든 이벤트 미주 EMEA APJC Washington, DC GovCIO AI Summit • Jan 9 Coming soon San Diego, CA AFCEA West • Feb 10 - Feb 12 Coming soon Dallas, TX Immerse Dallas • Feb 12 Learn more Bogota, CO Immerse Bogota, Colombia • Feb 19 Coming soon New York, NY NASTD East-West • Mar 2 - Mar 5 Coming soon Washington, DC Billington State & Local • Mar 9 - Mar 11 Coming soon Mexico City, MX Immerse CDMX, Mexico • Mar 12 Coming soon San Jose, CA NVIDIA GTC • Mar 16 - Mar 17 Coming soon San Francisco, CA RSAC • Mar 23 - Mar 24 Coming soon Houston, TX Immerse Houston • Apr 2 Coming soon New York, NY Immerse New York • Apr 14 Coming soon São Paulo, BR Immerse Sao Paulo, Brazil • Apr 15 Coming soon Boston, MA Immerse Boston • Apr 16 Coming soon Montreal, CA Immerse Montreal • Apr 22 Coming soon Las Vegas, NV Google Cloud Next • Apr 22 - Apr 23 Coming soon Minneapolis, MN Immerse Minneapolis • Apr 23 Coming soon Philadelphia, PA NASCIO Midyear • Apr 28 - May 1 Coming soon Buenos Aires, AR Immerse Buenos Aires, Argentina • May Coming soon Kansas City, MO NLIT • May 4 - May 6 Coming soon Anaheim, CA Immerse Anaheim/SoCal • May 6 Coming soon Tampa, FL SOF Week • May 18 - May 21 Coming soon Toronto, CA Immerse Toronto • May 20 Coming soon Chicago, IL Immerse Chicago • May 28 Coming soon National Harbor, MD Gartner Security & Risk Management Summit (USA) • Jun 1 - Jun 2 Coming soon Baltimore, MD TechNet Cyber • Jun 2 - Jun 4 Coming soon Austin, TX NASTD Midwest-South • Jun 8 - Jun 11 Coming soon Vancouver, CA Immerse Vancouver • Jun 10 Coming soon Seattle, WA Immerse Seattle • Jun 18 Coming soon Las Vegas, NV Black Hat USA • Aug 3 - Aug 6 Coming soon Denver, CO NASTD Annual • Aug 23 - Aug 26 Coming soon Las Vegas, NV Crowdstrike fal.con • Aug 31 - Sept 1 Coming soon San Diego, CA NASCIO Annual • Sept 27 - Sept 30 Coming soon Denver, CO EDUCAUSE Annual • Sept 29 - Oct 2 Coming soon Santiago, CL Immerse Santiago, Chile • Oct Coming soon San Francisco, CA Cloudflare Global Connect 2026 • Oct 19 - Oct 20 Coming soon Orlando, FL Gartner IT Symposium • Oct 19 - Oct 20 Coming soon Atlanta, GA Immerse Atlanta • Nov 12 Coming soon Las Vegas, NV AWS re:Invent • Nov 30 - Dec 4 Coming soon 시작하기 Free 요금제 중소기업 요금제 기업용 추천받기 데모 요청 영업팀에 문의 솔루션 클라우드 연결성 애플리케이션 서비스 SASE 및 워크스페이스 보안 네트워크 서비스 개발자 플랫폼 지원 도움말 센터 고객 지원 커뮤니티 포럼 개발자 Discord 계정에 액세스할 수 없습니까? Cloudflare 상태 규제 준수 규제 준수 관련 자료 신뢰 GDPR 책임감 있는 AI 투명성 보고서 남용 신고하기 공공의 이익 Galileo 프로젝트 아테네 프로젝트 Cloudflare for Campaigns Fairshot 프로젝트 회사 Cloudflare 소개 네트워크 지도 Cloudflare 팀 로고 및 보도 자료 키트 다양성, 공정성, 포용성 영향/ESG © 2026 Cloudflare, Inc. 개인정보처리방침 사용 약관 보안 문제 보고 쿠키 기본 상표
2026-01-13T09:29:32
https://docs.aws.amazon.com/pt_br/cost-management/latest/userguide/ce-getting-started.html
Conceitos básicos do Explorador de Custos - AWS Gestão de custos Conceitos básicos do Explorador de Custos - AWS Gestão de custos Documentação AWS Billing and Cost Management Manual do usuário As traduções são geradas por tradução automática. Em caso de conflito entre o conteúdo da tradução e da versão original em inglês, a versão em inglês prevalecerá. Conceitos básicos do Explorador de Custos Depois de habilitar o Explorador de Custos, você pode executá-lo no console de Gerenciamento de Custos da AWS. Para abrir o Explorador de Custos Abra o console de Gerenciamento de Faturamento e Custos da em https://console.aws.amazon.com/costmanagement/ . Isso abre o painel de custo que mostra o seguinte: Seus custos estimados para o mês até o momento Seus custos previstos para o mês Um gráfico de seus custos diários Suas cinco principais tendências de custo Uma lista de relatórios que você visualizou recentemente O Javascript está desativado ou não está disponível no seu navegador. Para usar a documentação da AWS, o Javascript deve estar ativado. Consulte as páginas de Ajuda do navegador para obter instruções. Convenções do documento Controle de acesso ao Explorador de Custos Explorar seus dados usando o Explorador de Custos Essa página foi útil? - Sim Obrigado por nos informar que estamos fazendo um bom trabalho! Se tiver tempo, conte-nos sobre o que você gostou para que possamos melhorar ainda mais. Essa página foi útil? - Não Obrigado por nos informar que precisamos melhorar a página. Lamentamos ter decepcionado você. Se tiver tempo, conte-nos como podemos melhorar a documentação.
2026-01-13T09:29:32
https://cloudflare.com/de-de/events/
Cloudflare-Events | Cloudflare Registrieren Sprachen English English (United Kingdom) Deutsch Español (Latinoamérica) Español (España) Français Italiano 日本語 한국어 Polski Português (Brasil) Русский 繁體中文 简体中文 Plattform Connectivity Cloud Die Connectivity Cloud von Cloudflare bietet mehr als 60 Netzwerk-, Sicherheits- und Performance-Services. Enterprise Für große und mittelständische Unternehmen Kleinunternehmen Für kleine Organisationen Partner Werden Sie Cloudflare-Partner Anwendungsfälle Modernisierung von Anwendungen Höhere Performance App-Verfügbarkeit sicherstellen Web-Erfahrung optimieren Sicherheit modernisieren VPN-Ersatz Phishing-Schutz Schutz von Webanwendungen und APIs Netzwerkmodernisierung Coffee Shop-Networking WAN-Modernisierung Vereinfachung des Firmennetzwerks CXO-Themen KI einführen Die KI-Nutzung in der Belegschaft und digitalen Erlebnissen fördern. KI-Sicherheit Sichern Sie agentenbasierte KI- und GenAI-Anwendungen Datenkonformität Compliance optimieren und Risiken minimieren Post-Quanten-Kryptografie Daten schützen und Compliance-Standards erfüllen Branchen Gesundheitswesen Bankwesen Einzelhandel Gaming Öffentlicher Sektor Weitere Informationen Produktleitfaden Referenz-Architekturen Analyseberichte Vertiefung Ereignisse Demos Webinare Workshops Demo anfragen Produkte Produkte Workspace-Sicherheit Zero-Trust-Netzwerkzugriff Secure Web Gateway E-Mail-Sicherheit Cloud Access Security Broker Anwendungssicherheit DDoS-Schutz auf L7 Web Application Firewall API-Sicherheit Bot-Management Anwendungsperformance CDN DNS Smart Routing Load Balancing Netzwerke und SASE DDoS-Schutz auf L3/4 NaaS / SD- WAN Firewall as a Service Netzwerk-Interconnection Tarife und Preise Enterprise-Tarife KMU-Tarife Tarife für Privatanwender Zum Tarifvergleich Globale Dienste Support- und Success-Pakete Optimiertes Cloudflare-Erlebnis Professionelle Services Implementierung unter Leitung von Experten Technische Kundenbetreuung Fokussiertes technisches Management Security Operations-Dienst Cloudflare-Überwachung und -Vorfallsreaktion Domainregistrierung Domains kaufen und verwalten 1.1.1.1 Kostenlose DNS-Auflösung Weitere Informationen Produktleitfaden Referenz-Architekturen Analyseberichte Produktdemonstrationen und Rundgänge Entscheidungshilfe Entwickler Dokumentation Entwickler-Bibliothek Dokumentation und Leitfäden Anwendungsdemos Entwicklungsmöglichkeiten entdecken Tutorials Schritt-für-Schritt-Entwicklungsleitfäden Referenz-Architektur Diagramme und Designmuster Produkte Künstliche Intelligenz AI Gateway KI-Apps beobachten & steuern Workers AI ML-Modelle in unserem Netzwerk ausführen Rechenleistung Observability Protokolle, Metriken und Traces Workers Serverlose Apps erstellen/bereitstellen Medien Images Bilder transformieren & optimieren Realtime Echtzeit-Audio-/-Video-Apps entwickeln Speicher und Datenbank D1 Erstellen Sie serverlose SQL-Datenbanken R2 Daten ohne kostspielige Egress-Gebühren speichern Tarife und Preise Workers Serverlose Apps erstellen & bereitstellen Workers KV Serverloser Schlüssel-Werte-Speicher für Apps R2 Daten speichern ohne teure Egress-Gebühren Projekte entdecken Anwendungsbeispiele aus der Praxis KI-Demo in 30 Sekunden Schnellstart-Guide Erkunden Sie den Workers Playground Entwickeln, testen und bereitstellen Entwickler-Discord Werden Sie Teil der Community Jetzt entwickeln Partner Partner-Netzwerk Cloudflare hilft Ihnen zu wachsen, Innovationen voranzutreiben und Kundenbedürfnisse gezielt zu erfüllen. Partner-Portal Ressourcen finden und Angebote registrieren Arten von Partnerschaften PowerUP-Programm Unternehmenswachstum vorantreiben – während Kunden zuverlässig verbunden und geschützt bleiben Technologiepartner Entdecken Sie unser Ökosystem aus Technologie-Partnern und Integrationen Globale Systemintegratoren Unterstützen Sie eine nahtlose, groß angelegte digitale Transformation Service-Provider Entdecken Sie unser Netzwerk von geschätzten Service-Providern Self-Serve-Agenturprogramm Verwalten Sie Self-Serve-Konten für Ihre Kunden Peer-to-Peer-Portal Traffic-Einblicke für Ihr Netzwerk Einen Partner finden Steigern Sie Ihr Geschäft – vernetzen Sie sich mit Cloudflare Powered+ Partnern. Ressourcen Vertiefung Demos + Produktführungen On-Demand-Produktdemos Kundenreferenzen Mit Cloudflare zum Erfolg Webinare Aufschlussreiche Diskussionen Workshops Virtuelle Foren Bibliothek Hilfreiche Leitfäden, Roadmaps und mehr Berichte Erkenntnisse aus der Forschung von Cloudflare Blog Technische Vertiefungen und Produktneuigkeiten Learning Center Lerntools und praktische Ratgeber Erstellen Referenz-Architektur Technische Leitfäden Lösungs- & Produktleitfäden Produktdokumentation Dokumentation Dokumentation für Entwickler Kennenlernen theNET Erkenntnisse für das digitale Unternehmen Cloudflare TV Innovative Reihen und Events Cloudforce One Bedrohungsforschung und -maßnahmen Radar Internet-Traffic und Sicherheitstrends Analyseberichte Berichte von Branchenanalysten Ereignisse Kommende regionale Events Vertrauen, Datenschutz und Compliance Compliance-Informationen und -Richtlinien Support Kontakt Community-Forum Kontozugang verloren? Entwickler-Discord Hilfe holen Unternehmen Unternehmensinfos Leadership Vorstellung unseres Führungsteams Anlegerbeziehungen Informationen für Anleger Presse Aktuelle Nachrichten entdecken Stellenausschreibungen Offene Stellen erkunden Vertrauen, Datenschutz und Sicherheit Datenschutz Richtlinien, Daten und Schutz Vertrauen Richtlinien, Prozess und Sicherheit Compliance Zertifizierung und Regulierung Transparenz Richtlinien und Hinweise Öffentliches Interesse Humanitäre Hilfe Projekt Galileo Behörden Projekt „Athenian“ Wahlen Cloudflare for Campaigns Gesundheit Project Fair Shot Globales Netzwerk Globale Standorte und Status Anmelden Vertrieb kontaktieren Merken Sie sich den Termin für Cloudflare Connect San Francisco 2026 vor 19.–22. Oktober 2026 Gemeinsam mit tausenden Branchenexpertinnen und -experten die Zukunft gestalten – erleben Sie Innovation und Kooperation hautnah auf der Cloudflare Connect 2025. Mehr dazu Alle geplanten Events Nord- und Lateinamerika EMEA APJC Washington, DC GovCIO AI Summit • Jan 9 Coming soon San Diego, CA AFCEA West • Feb 10 - Feb 12 Coming soon Dallas, TX Immerse Dallas • Feb 12 Learn more Bogota, CO Immerse Bogota, Colombia • Feb 19 Coming soon New York, NY NASTD East-West • Mar 2 - Mar 5 Coming soon Washington, DC Billington State & Local • Mar 9 - Mar 11 Coming soon Mexico City, MX Immerse CDMX, Mexico • Mar 12 Coming soon San Jose, CA NVIDIA GTC • Mar 16 - Mar 17 Coming soon San Francisco, CA RSAC • Mar 23 - Mar 24 Coming soon Houston, TX Immerse Houston • Apr 2 Coming soon New York, NY Immerse New York • Apr 14 Coming soon São Paulo, BR Immerse Sao Paulo, Brazil • Apr 15 Coming soon Boston, MA Immerse Boston • Apr 16 Coming soon Montreal, CA Immerse Montreal • Apr 22 Coming soon Las Vegas, NV Google Cloud Next • Apr 22 - Apr 23 Coming soon Minneapolis, MN Immerse Minneapolis • Apr 23 Coming soon Philadelphia, PA NASCIO Midyear • Apr 28 - May 1 Coming soon Buenos Aires, AR Immerse Buenos Aires, Argentina • May Coming soon Kansas City, MO NLIT • May 4 - May 6 Coming soon Anaheim, CA Immerse Anaheim/SoCal • May 6 Coming soon Tampa, FL SOF Week • May 18 - May 21 Coming soon Toronto, CA Immerse Toronto • May 20 Coming soon Chicago, IL Immerse Chicago • May 28 Coming soon National Harbor, MD Gartner Security & Risk Management Summit (USA) • Jun 1 - Jun 2 Coming soon Baltimore, MD TechNet Cyber • Jun 2 - Jun 4 Coming soon Austin, TX NASTD Midwest-South • Jun 8 - Jun 11 Coming soon Vancouver, CA Immerse Vancouver • Jun 10 Coming soon Seattle, WA Immerse Seattle • Jun 18 Coming soon Las Vegas, NV Black Hat USA • Aug 3 - Aug 6 Coming soon Denver, CO NASTD Annual • Aug 23 - Aug 26 Coming soon Las Vegas, NV Crowdstrike fal.con • Aug 31 - Sept 1 Coming soon San Diego, CA NASCIO Annual • Sept 27 - Sept 30 Coming soon Denver, CO EDUCAUSE Annual • Sept 29 - Oct 2 Coming soon Santiago, CL Immerse Santiago, Chile • Oct Coming soon San Francisco, CA Cloudflare Global Connect 2026 • Oct 19 - Oct 20 Coming soon Orlando, FL Gartner IT Symposium • Oct 19 - Oct 20 Coming soon Atlanta, GA Immerse Atlanta • Nov 12 Coming soon Las Vegas, NV AWS re:Invent • Nov 30 - Dec 4 Coming soon ERSTE SCHRITTE Free-Tarife KMU-Tarife Für Unternehmen Empfehlung erhalten Demo anfragen Vertrieb kontaktieren LÖSUNGEN Connectivity Cloud Anwendungsdienste SASE- und Workspace-Sicherheit Netzwerkdienste Entwicklerplattform SUPPORT Hilfe-Center Kundensupport Community-Forum Entwickler-Discord Kein Kontozugang mehr? Cloudflare-Status COMPLIANCE Ressourcen rund um Compliance Vertrauen DSGVO Verantwortungsvolle KI Transparenz­bericht Regelverstoß melden ÖFFENTLICHES INTERESSE Projekt Galileo Projekt Athenian Cloudflare for Campaigns Projekt „Fair Shot“ UNTERNEHMEN Über Cloudflare Netzwerkkarte Unser Team Logos und Pressekit Diversität, Gleichberechtigung und Inklusion Impact/ESG © 2026 Cloudflare, Inc. Datenschutzrichtlinie Nutzungsbedingungen Sicherheitsprobleme berichten Vertrauen und Sicherheit Cookie-Einstellungen Markenzeichen Impressum
2026-01-13T09:29:32
https://cloudflare.com/plans/enterprise/externa/
Enterprise solutions packages | Cloudflare Sign up Languages English English (United Kingdom) Deutsch Español (Latinoamérica) Español (España) Français Italiano 日本語 한국어 Polski Português (Brasil) Русский 繁體中文 简体中文 Platform Connectivity cloud Cloudflare’s connectivity cloud delivers 60+ networking, security, and performance services. Enterprise For large and medium organizations Small business For small organizations Partner Become a Cloudflare partner use cases Modernize applications Accelerate performance Ensure app availability Optimize web experience Modernize security VPN replacement Phishing protection Secure web apps and APIs Modernize networks Coffee shop networking WAN modernization Simplify your corporate network CxO topics Adopt AI Bring AI into workforces and digital experiences AI security Secure agentic AI and GenAI applications Data compliance Streamline compliance and minimize risk Post-quantum cryptography Safeguard data and meet compliance standards Industries Healthcare Banking Retail Gaming Public sector Resources Product guides Reference architectures Analyst reports Engage Events Demos Webinars Workshops Request a demo Products products Workspace security Zero trust network access Secure web gateway Email security Cloud access security broker Application security L7 DDoS protection Web application firewall API security Bot management Application performance CDN DNS Smart routing Load balancing Networking and SASE L3/4 DDoS protection NaaS / SD-WAN Firewall-as-a-service Network Interconnect plans & pricing Enterprise plans Small business plans Individual plans Compare plans Global services Support and success bundles Optimized Cloudflare experience Professional services Expert-led implementation Technical account management Focused technical management Security operations service Cloudflare monitoring and response Domain registration Buy and manage domains 1.1.1.1 Free DNS resolver Resources Product guides Reference architectures Analyst reports Product demos and tours Help me choose Developers documentation Developer library Documentation and guides Application demos Explore what you can build Tutorials Step-by-step build tutorials Reference architecture Diagrams and design patterns Products Artificial Intelligence AI Gateway Observe, control AI apps Workers AI Run ML models on our network Compute Observability Logs, metrics, and traces Workers Build, deploy serverless apps Media Images Transform, optimize images Realtime Build real-time audio/video apps Storage & database D1 Create serverless SQL databases R2 Store data without costly egress fees Plans & Pricing Workers Build and deploy serverless apps Workers KV Serverless key-value store for apps R2 Store data without costly egrees fees Explore projects Customer stories AI Demo in 30 seconds Quick guide to get started Explore Workers Playground Build, test, and deploy Developers Discord Join the community Start building Partners Partner Network Grow, innovate and meet customer needs with Cloudflare Partner Portal Find resources and register deals Partnership Types PowerUP Program Grow your business while keeping your customers connected and secure Technology Partners Explore our ecosystem of technology partners and integrators Global System Integrators Support seamless large-scale digital transformation Service Providers Discover our network of valued service providers Self-serve agency program Manage Self-Serve Accounts for your clients Peer-to-peer portal Traffic insights for your network Find a partner PowerUP your business - connect with Cloudflare Powered+ partners. Resources Engage Demos + product tours On-demand product demos Case studies Driving success with Cloudflare Webinars Insightful discussions Workshops Virtual forums Library Helpful guides, roadmaps, and more Reports Insights from Cloudflare’s research Blog Technical deep dives and product news Learning center Educational tools and how-to content Build Reference architecture Technical guides Solution + product guides Product documentation Documentation Developer documentation Explore theNET Executive insights for the digital enterprise Cloudflare TV Innovative series and events Cloudforce One Threat research and operations Radar Internet traffic and security trends Analyst reports Industry research reports Events Upcoming regional events Trust, privacy, and compliance Compliance information and policies Support Contact us Community forum Lost account access? Developers Discord Get help Company Company info Leadership Meet our leaders Investor relations Investor information Press Explore recent news Careers Explore open roles Trust, Privacy, & Safety Privacy Policy, data, and protection Trust Policy, process, and safety Compliance Certification and regulation Transparency Policy and disclosures Public Interest Humanitarian Project Galileo Government Athenian Project Elections Cloudflare For Campaigns Health Project Fair Shot Global network Global locations and status Log in Contact sales Externa packages Protect your public-facing systems with Externa packages. These plans provide enterprise-grade reliability and security, backed by a 100% uptime guarantee and 24/7 support. With Externa, you get: No attack traffic tax Simple, value-driven pricing A seamless on-ramp to Interna (SASE) Explore the benefits Contact sales Externa packages Connect & protect public-facing systems Interna packages Connect & protect internal systems Externa packages Choose an option Externa packages Why Cloudflare Externa packages? No attack traffic tax You shouldn't be penalized for being attacked. Only pay for clean traffic, not the malicious requests we block. Cloudflare delivers predictable costs, even during a DDoS attack. Simple, value-driven price units Say goodbye to origin fetch fees, duplicate charges per request, and charges per WAF rule or ACL. Our pricing scales directly with the value you receive. Simplified connectivity costs Connect your architecture to Cloudflare and deploy private interconnects to your clouds and data centers at zero cost. Seamless architectural continuity Every Cloudflare data center runs all Externa services, ensuring a smooth, hassle-free progression as you add features — no need for architectural changes or traffic rerouting. On-ramp to SASE included Every Externa package includes 50 Interna Essentials seats, extending security to internal systems for 360-degree security across your organization. Quantum-safe encryption Cloudflare has deployed post-quantum hybrid key agreement to encrypt your traffic and data and protect against post-quantum cryptography (PQC) attacks. RECOMMENDED SERVICES Customer success and services Success packages Professional services Ongoing support services Success packages Professional services Ongoing support services Success packages Maximize your Cloudflare experience with expedited support SLAs, value optimization, and more Learn more Standard Premium Professional services Get expert advice and assistance to plan for and accelerate your Cloudflare deployment Learn more Quickstart Migration Expert Ongoing support services Choose from technical and security operations add-ons Technical account management SOC service Incident response OPTIONAL SERVICES Solution package add-ons Application performance Application security Application performance Application security Application performance Choose from several high-performance add-ons — designed for organizations that face application latency and uptime issues during high-traffic periods. Argo for Spectrum IPs: BYO or Static Cache Reserve Log Explorer China Network Advanced Waiting Room Application security Choose from several high-security add-ons — designed for organizations that need to protect critical web applications and APIs from threats. Cloudflare for Government Custom Domain Protection Custom SSL Data Localization Suite IPs for Magic Transit DNS Firewall SSL for SaaS Spectrum Log Explorer China Network Reliable, enterprise-grade services 24/7 email and phone support Award-winning, global, 24/7/365 email and emergency phone support (for Enterprise plans). Get on-demand resources, guides, and best-practice implementation tips. Massive network scale Our global network spans over 330 cities and 120 countries. Operating within approximately 50 milliseconds of about 95% of the Internet-connected population globally. Ease of use and guided setup The Cloudflare dashboard enables quick configuration — no code changes required. Enterprise plan holders get guided onboarding, training, and continued 24/7/365 support. 100% uptime Enterprise plan holders get exclusive network prioritization — backed by dependable SLAs, 100% uptime, and reliable service you can trust. Trusted by the world’s biggest brands ~35% of Fortune 1000 companies rely on Cloudflare Get started today Contact sales GETTING STARTED Free plans Small business plans For enterprises Get a recommendation Request a demo Contact sales SOLUTIONS Connectivity cloud Application services SASE and workspace security Network services Developer platform SUPPORT Help center Customer support Community forum Developers Discord Lost account access? Cloudflare status COMPLIANCE Compliance resources Trust GDPR Responsible AI Transparency report Report abuse PUBLIC INTEREST Project Galileo Athenian Project Cloudflare for Campaigns Project Fairshot COMPANY About Cloudflare Network map Our team Logos & press kit Diversity, equity, & inclusion Impact/ESG © 2026 Cloudflare, Inc. Privacy Policy Terms of Use Report Security Issues Cookie Preferences Trademark
2026-01-13T09:29:32
https://pix.webm.ink/site/kb/sharing-media#collapse11
Pixelfed Help Center minkpix Help Center — Sharing Photos & Videos Getting Started Sharing Media Profile Hashtags Discover Timelines Instagram Import Community Guidelines Safety Tips Sharing Photos & Videos How do I create a post? To create a post using a desktop web browser: Go to https://pix.webm.ink . Click on the link at the top of the page. Upload your photo(s) or video(s), add an optional caption and set other options. Click on the Create Post button. To create a post using a mobile web browser: Go to https://pix.webm.ink . Click on the button at the bottom of the page. Upload your photo(s) or video(s), add an optional caption and set other options. Click on the Create Post button. How do I share a post with multiple photos or videos? During the compose process, you can select multiple files at a single time, or add each photo/video individually. How do I add a caption before sharing my photos or videos on Pixelfed? During the compose process, you will see the Caption input. Captions are optional and limited to 500 characters. How do I add a filter to my photos? This is an experimental feature, filters are not federated yet! To add a filter to media during the compose post process: Click the Options button if media preview is not displayed. Select a filter from the Select Filter dropdown. How do I add a description to each photo or video for the visually impaired? This is an experimental feature! You need to use the experimental compose UI found here . Add media by clicking the Add Photo/Video button. Set a image description by clicking the Media Description button. Image descriptions are federated to instances where supported. What types of photos or videos can I upload? You can upload the following media types: image/jpeg image/png image/gif video/mp4 image/webp How can I disable comments/replies on my post? To enable or disable comments/replies using a desktop or mobile browser: Open the menu, click the button Click on Enable Comments or Disable Comments How many people can I tag or mention in my comments or posts? You can tag or mention up to 5 profiles per comment or post. What does archive mean? You can archive your posts which prevents anyone from interacting or viewing it. Archived posts cannot be deleted or otherwise interacted with. You may not recieve interactions (comments, likes, shares) from other servers while a post is archived. How can I archive my posts? To archive your posts: Navigate to the post Open the menu, click the or button Click on Archive How do I unarchive my posts? To unarchive your posts: Navigate to your profile Click on the ARCHIVES tab Scroll to the post you want to unarchive Open the menu, click the or button Click on Unarchive About Help Terms Privacy Language © 2026 pix.webm.ink · Powered by Pixelfed · v0.12.6
2026-01-13T09:29:32
https://www.ecns.cn/hd/2025-12-31/detail-iheymvap1608605.shtml
Passenger trips of 3 major Hainan airports exceed 50 million in 2025 --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo Passenger trips of 3 major Hainan airports exceed 50 million in 2025 ( 1 /12) 2025-12-31 13:33:17 Ecns.cn Editor :Mo Honge Passengers aboard a Hainan Airlines flight arrive in Haikou, Hainan Province, Dec. 30, 2025. (Photo: China News Service / Luo Yunfei) The combined passenger throughput of the three major airports in the Hainan Free Trade Port — Haikou Meilan International Airport, Sanya Phoenix International Airport and Qionghai Boao International Airport — has exceeded 50 million passenger trips in 2025 for the first time, setting a new annual record, as of Tuesday. At present, Meilan, Phoenix and Boao airports serve a total of 136 destinations. Passengers aboard a China Southern Airlines flight arrive in Haikou, Hainan Province, Dec. 30, 2025. (Photo: China News Service / Luo Yunfei) Passengers aboard a Hainan Airlines flight arrive in Haikou, Hainan Province, Dec. 30, 2025. (Photo: China (Photo: China News Service / Luo Yunfei) A China Southern Airlines plan arrive in Haikou, Hainan Province, Dec. 30, 2025. (Photo: China News Service / Luo Yunfei) Passengers aboard a China Southern Airlines flight arrive in Haikou, Hainan Province, Dec. 30, 2025. (Photo: China News Service / Luo Yunfei) Passengers aboard a Hainan Airlines flight arrive in Haikou, Hainan Province, Dec. 30, 2025.(Photo: China News Service / Luo Yunfei) Passengers aboard a Hainan Airlines flight arrive in Haikou, Hainan Province, Dec. 30, 2025.(Photo: China News Service / Luo Yunfei) Passengers aboard a Hainan Airlines flight arrive in Haikou, Hainan Province, Dec. 30, 2025. (Photo: China News Service / Luo Yunfei) Passengers aboard a China Southern Airlines flight arrive in Haikou, Hainan Province, Dec. 30, 2025. (Photo: China News Service / Luo Yunfei) Passengers aboard a China Southern Airlines flight arrive in Haikou, Hainan Province, Dec. 30, 2025. (Photo: China News Service / Luo Yunfei) Passengers aboard a China Southern Airlines flight arrive in Haikou, Hainan Province, Dec. 30, 2025. (Photo: China News Service / Luo Yunfei) Passengers aboard a China Southern Airlines flight arrive in Haikou, Hainan Province, Dec. 30, 2025. (Photo: China News Service / Luo Yunfei) Previous The combined passenger throughput of the three major airports in the Hainan Free Trade Port — Haikou Meilan International Airport, Sanya Phoenix International Airport and Qionghai Boao International Airport — has exceeded 50 million passenger trips in 2025 for the first time, setting a new annual record, as of Tuesday. At present, Meilan, Phoenix and Boao airports serve a total of 136 destinations.--> Next (1) (2) (3) (4) (5) (6) (7) (8) (9) (10) (11) (12) LINE More Photo First 'Grassland curling' attracts 350 competitors China launches two new satellites for space target detection test People perform 'circle dance' to pray for a bountiful new year in Qingha First batch of China's emergency humanitarian aid arrives in Cambodia Central London illuminated to welcome 2026 Chinese Foreign Minister meets Cambodian Deputy PM in Yunnan ${visuals_2} ${visuals_3} More Video China's 2025 New Frontiers in three minutes Insights | UN expert: China's AI factories showcase manufacturing strength Tech at Its Best! Yiwu's small commodities win over global merchants with real strength Insights | Russian scholar: Japan's rising militarism has deep roots for long time China Q&A | How will China advance people-centered sci-tech development during the 15th Five-Year Plan period? SCO Deputy Secretary-General:Tianjin Summit sets direction for next decade ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2025 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://docs.aws.amazon.com/pt_br/cost-management/latest/userguide/ce-exploring-data.html
Explorar seus dados usando o Explorador de Custos - AWS Gestão de custos Explorar seus dados usando o Explorador de Custos - AWS Gestão de custos Documentação AWS Billing and Cost Management Manual do usuário Navegar no Explorador de Custos Custos do Explorador de Custos Tendências do Explorador de Custos Custos diários não combinados Custos mensais não combinados Custos líquidos não combinados Relatórios recentes do Explorador de Custos Custos amortizados Custos líquidos amortizados As traduções são geradas por tradução automática. Em caso de conflito entre o conteúdo da tradução e da versão original em inglês, a versão em inglês prevalecerá. Explorar seus dados usando o Explorador de Custos No painel do Explorador de Custos, são mostrados seus custos estimados acumulados no mês, os custos previstos para o mês, um gráfico dos seus custos diários, as cinco principais tendências de custo e uma lista de relatórios exibidos recentemente. Todos os custos refletem sua utilização até o dia anterior. Por exemplo, se hoje é 2 de dezembro, os dados incluem seu uso até 1.º de dezembro. nota No período de faturamento atual, os dados dependem dos dados upstream das suas aplicações de cobrança, e alguns dados podem ser atualizados depois de 24 horas. Custos do Explorador de Custos Tendências do Explorador de Custos Custos diários não combinados Custos mensais não combinados Custos líquidos não combinados Relatórios recentes do Explorador de Custos Custos amortizados Custos líquidos amortizados Navegar no Explorador de Custos Você pode usar os ícones no painel esquerdo para fazer o seguinte: Ir para o painel principal do Explorador de Custos Exibir uma lista dos relatórios padrão do Explorador de Custos Exibir uma lista de seus relatórios salvos Exibir informações sobre suas reservas Exibir suas recomendações de reserva Custos do Explorador de Custos Na parte superior da página Explorador de Custos são mostrados os Custos acumulados no mês e os Custos previstos para o final do mês . Os Custos acumulados no mês mostram uma estimativa das cobranças até agora neste mês e a compara com esse mesmo período do último mês. Os Custos previstos para o final do mês mostram quanto o Explorador de Custos estima que você deverá no final do mês e compara suas estimativas de custos com seus custos reais do mês anterior. Os Custos acumulados até então no mês e os Custos previstos para o final do mês não incluem reembolsos. Os custos do Explorador de Custos são exibidos apenas em dólares americanos. Tendências do Explorador de Custos Na seção tendências deste mês , o Explorador de Custos mostra suas principais tendências de custo. Por exemplo, os custos relacionados a um serviço específico ou os custos de um tipo específico de IR subiram. Para ver todas as suas tendências de custos, selecione Exibir todas as tendências no canto superior direito da seção de tendências. Para entender uma tendência com mais profundidade, selecione-a. Você será levado a uma tabela do Explorador de Custos que mostra todos os custos que incidiram no cálculo da tendência. Custos diários não combinados No centro do painel do Explorador de Custos é mostrado um gráfico com seus custos diários não combinados atuais. Você pode acessar os filtros e os parâmetros usados para criar o gráfico escolhendo Explorar custos no canto superior direito. Isso leva você para a página de relatórios do Explorador de Custos, permitindo acessar os relatórios padrão do Explorador de Custos e modificar os parâmetros usados para criar o gráfico. Os relatórios do Explorador de Custos oferecem funcionalidade adicional, como o download dos seus dados como arquivo CSV e a possibilidade de salvar seus parâmetros específicos como um relatório. Para obter mais informações, consulte Noções básicas dos gastos com os relatórios do Explorador de Custos . Seus custos diários não combinados não incluem reembolsos. Custos mensais não combinados Granularidade mensal É possível ver seus custos não combinados em uma granularidade mensal e os descontos aplicados à sua fatura mensal. Ao prever custos, os descontos são incluídos por padrão. Para exibir seus custos não combinados, abra a página do Explorador de Custos e escolha Explorador de Custos no painel de navegação. Os descontos aparecerão como Desconto por volume de IR no gráfico. O valor do desconto é alinhado aos descontos exibidos no console de Gerenciamento de Faturamento e Custos. Para ver mais detalhes no console de Gerenciamento de Faturamento e Custos Abra o console de Gerenciamento de Faturamento e Custos da em https://console.aws.amazon.com/costmanagement/ . No painel de navegação, escolha Faturas . Para exibir o desconto, selecione a seta ao lado de Desconto total em Créditos, descontos totais e faturas fiscais . Cobranças mensais brutas É possível ver suas cobranças mensais brutas excluindo o Desconto por volume de IR . Para excluir os descontos de volume IR da visualização mensal Abra o console de Gerenciamento de Faturamento e Custos da em https://console.aws.amazon.com/costmanagement/ . No painel esquerdo, escolha Explorador de Custos . Escolha Custos e uso . No painel Filtros , escolha Tipo de cobrança . Selecione Desconto por volume de IR . Para abrir um menu suspenso, selecione Incluir somente e Excluir somente . Selecione Aplicar filtros . Custos líquidos não combinados Isso permite que você veja seus custos líquidos depois de todos os descontos aplicáveis serem calculados. Também sugerimos excluir qualquer ajuste manual, como reembolso ou crédito, de acordo com as práticas recomendadas. Descontos por volume de IR não está mais visível porque esses são valores após a aplicação de descontos. Relatórios recentes do Explorador de Custos Na parte inferior do painel do Explorador de Custos existe uma lista de relatórios que você acessou recentemente, quando você os acessou e um link que direciona você de volta ao relatório. Isso permite alternar entre relatórios ou lembrar dos relatórios que você acha mais úteis. Para obter mais informações, sobre o Explorador de Custos, consulte Noções básicas dos gastos com os relatórios do Explorador de Custos . Custos amortizados Isso permite que você veja o custo de seus compromissos com a AWS, como instâncias reservadas ou Savings Plans do Amazon EC2, distribuídos pelo uso do período de seleção. A AWS estima seus custos amortizados combinando as taxas de reserva antecipadas e recorrentes não combinadas e calcula a taxa efetiva durante o período em que a taxa inicial ou recorrente se aplica. Na visualização diária, o Explorador de Custos mostra a parte não usada das suas taxas de reserva no primeiro dia do mês ou na data de compra. Custos líquidos amortizados Isso permite que você veja o custo de seus compromissos com a AWS, como instâncias reservadas ou Savings Plans do Amazon EC2, após descontos com a lógica adicional que mostra como o custo real se aplica ao longo do tempo. Como os Savings Plans e as instâncias reservadas geralmente têm taxas mensais iniciais ou recorrentes associadas a elas, o conjunto de dados do custo líquido amortizado revela o custo real ao mostrar como as taxas pós-desconto são amortizadas durante o período em que a taxa inicial ou recorrente se aplica. O Javascript está desativado ou não está disponível no seu navegador. Para usar a documentação da AWS, o Javascript deve estar ativado. Consulte as páginas de Ajuda do navegador para obter instruções. Convenções do documento Conceitos básicos do Explorador de Custos Uso do gráfico do Explorador de Custos Essa página foi útil? - Sim Obrigado por nos informar que estamos fazendo um bom trabalho! Se tiver tempo, conte-nos sobre o que você gostou para que possamos melhorar ainda mais. Essa página foi útil? - Não Obrigado por nos informar que precisamos melhorar a página. Lamentamos ter decepcionado você. Se tiver tempo, conte-nos como podemos melhorar a documentação.
2026-01-13T09:29:32
https://pix.webm.ink/site/kb/import
Pixelfed Help Center minkpix Help Center — Import Getting Started Sharing Media Profile Hashtags Discover Timelines Instagram Import Community Guidelines Safety Tips Import With the Import from Instagram feature, you can seamlessly transfer your photos, captions, and even hashtags from your Instagram account to Pixelfed, ensuring a smooth transition without losing your cherished memories or creative expressions. How to get your export data from Instagram: Download your information in Instagram's Accounts Center on this page . Make sure you select the JSON format Wait for the email from Instagram with your download link Download your .zip export from Instagram Navigate to the Import settings page Follow the instructions and import your posts 🥳 Import Limits Max Posts The maximum imported posts allowed 1000 Max Attempts The maximum import attempts allowed (counted as total imports grouped by day) Unlimited Video Imports The server supports importing video posts ✅ Import Permissions Who is allowed to use the Import feature Only Admins Only admin accounts can import ❌ Only Admins + Following Only admin accounts, or accounts they follow, can import ❌ Minimum Account Age Only accounts with a minimum age in days can import 1 Minimum Follower Count Only accounts with a minimum follower count can import 0 About Help Terms Privacy Language © 2026 pix.webm.ink · Powered by Pixelfed · v0.12.6
2026-01-13T09:29:32
https://www.ecns.cn/hd/2025-12-29/detail-iheymvap1605246.shtml
In numbers: China's high-speed rail mileage exceeds 50,000 km --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo In numbers: China's high-speed rail mileage exceeds 50,000 km ( 1 /1) 2025-12-29 16:47:06 Ecns.cn Editor :Li Yongli Previous Next (1) LINE More Photo First batch of China's emergency humanitarian aid arrives in Cambodia Central London illuminated to welcome 2026 Chinese Foreign Minister meets Cambodian Deputy PM in Yunnan Exploring vivid sports competition throughout 2025 Exploring stunning winter scenery in Altay China's first L3 self-driving car debuts in Chongqin ${visuals_2} ${visuals_3} More Video Tech at Its Best! Yiwu's small commodities win over global merchants with real strength Insights | Russian scholar: Japan's rising militarism has deep roots for long time China Q&A | How will China advance people-centered sci-tech development during the 15th Five-Year Plan period? SCO Deputy Secretary-General:Tianjin Summit sets direction for next decade HKSAR security chief comments on conviction of Jimmy Lai Insights | Former Belarusian Deputy PM: China's development path ensures capital serves the people ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2025 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://www.ecns.cn/hd/2025-12-31/detail-iheymvap1608024.shtml
China launches two new satellites for space target detection test --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo China launches two new satellites for space target detection test ( 1 /6) 2025-12-31 10:02:42 Ecns.cn Editor :Mo Honge A Long March-7A carrier rocket carrying the Shijian-29A and Shijian-29B satellites blasts off from the Wenchang Space Launch Site in south China's Hainan Province, Dec. 31, 2025. (Photo: China News Service) China sent two new satellites into orbit on Wednesday from the Wenchang Space Launch Site on the coast of the southern island province of Hainan. The Shijian-29A and Shijian-29B satellites were launched at 6:40 a.m. (Beijing Time) aboard a Long March 7A carrier rocket. The satellites entered the preset orbit successfully. They will be mainly used for related new technology verification for space target detection. The launch marked the 623rd mission of the Long March series carrier rockets. A Long March-7A carrier rocket carrying the Shijian-29A and Shijian-29B satellites blasts off from the Wenchang Space Launch Site in south China's Hainan Province, Dec. 31, 2025. (Photo: China News Service) A Long March-7A carrier rocket carrying the Shijian-29A and Shijian-29B satellites blasts off from the Wenchang Space Launch Site in south China's Hainan Province, Dec. 31, 2025. (Photo: China News Service) A Long March-7A carrier rocket carrying the Shijian-29A and Shijian-29B satellites blasts off from the Wenchang Space Launch Site in south China's Hainan Province, Dec. 31, 2025. (Photo: China News Service) A Long March-7A carrier rocket carrying the Shijian-29A and Shijian-29B satellites blasts off from the Wenchang Space Launch Site in south China's Hainan Province, Dec. 31, 2025. (Photo: China News Service) A Long March-7A carrier rocket carrying the Shijian-29A and Shijian-29B satellites blasts off from the Wenchang Space Launch Site in south China's Hainan Province, Dec. 31, 2025. (Photo: China News Service) Previous China sent two new satellites into orbit on Wednesday from the Wenchang Space Launch Site on the coast of the southern island province of Hainan. The Shijian-29A and Shijian-29B satellites were launched at 6:40 a.m. (Beijing Time) aboard a Long March 7A carrier rocket. The satellites entered the preset orbit successfully. They will be mainly used for related new technology verification for space target detection. The launch marked the 623rd mission of the Long March series carrier rockets.--> Next (1) (2) (3) (4) (5) (6) LINE More Photo People perform 'circle dance' to pray for a bountiful new year in Qingha First batch of China's emergency humanitarian aid arrives in Cambodia Central London illuminated to welcome 2026 Chinese Foreign Minister meets Cambodian Deputy PM in Yunnan Exploring vivid sports competition throughout 2025 Exploring stunning winter scenery in Altay ${visuals_2} ${visuals_3} More Video China's 2025 New Frontiers in three minutes Insights | UN expert: China's AI factories showcase manufacturing strength Tech at Its Best! Yiwu's small commodities win over global merchants with real strength Insights | Russian scholar: Japan's rising militarism has deep roots for long time China Q&A | How will China advance people-centered sci-tech development during the 15th Five-Year Plan period? SCO Deputy Secretary-General:Tianjin Summit sets direction for next decade ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2025 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://www.ecns.cn/hd/2025-12-25/detail-iheyfqph6157661.shtml
Exploring vivid sports competition throughout 2025 --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo Exploring vivid sports competition throughout 2025 ( 1 /5) 2025-12-25 15:10:52 Ecns.cn Editor :Gong Weiwei Photo taken on Nov. 9, 2025 shows the opening ceremony of the 15th National Games held at the Guangdong Olympic Sports Center. (Photo: China News Service/Fu Tian) Photo taken on Feb. 7, 2025 shows the opening ceremony of the 9th Asian Winter Games held in Harbin, northeast China's Heilongjiang Province. (Photo: China News Service/Zhao Yuhang)? Photo taken on Feb. 7, 2025 shows the opening ceremony of the 9th Asian Winter Games held in Harbin, northeast China's Heilongjiang Province. (Photo: China News Service/Zhao Yuhang)? Members of Nanjing team acknowledge fans after the match during the third round of the 2025 Jiangsu Football City League in Nanjing City, Jiangsu Province on June 1, 2025. (Photo provided to China News Service) Photo shows a robot free-fighting match during the 2025 World Humanoid Robot Games, which held from Aug.14 to 17 at the National Speed Skating Oval in Beijing. (Photo: China News Service/Han Haidan) Previous Next (1) (2) (3) (4) (5) LINE More Photo China's first L3 self-driving car debuts in Chongqin Grand bridge ready for traffic operation in Guizhou Harbin's celebrity snowman lights up winter night Southbound Travel for Guangdong Vehicles scheme implemented for entry into urban Hong Kong China's Feng/Huang claim mixed doubles title at BWF World Tour Finals Exploring overwintering migratory birds in Poyang Lake ${visuals_2} ${visuals_3} More Video Tech at Its Best! Yiwu's small commodities win over global merchants with real strength Insights | Russian scholar: Japan's rising militarism has deep roots for long time China Q&A | How will China advance people-centered sci-tech development during the 15th Five-Year Plan period? SCO Deputy Secretary-General:Tianjin Summit sets direction for next decade HKSAR security chief comments on conviction of Jimmy Lai Insights | Former Belarusian Deputy PM: China's development path ensures capital serves the people ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2025 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://www.ecns.cn/hd/2025-12-29/detail-iheyfqph6162291.shtml
Central London illuminated to welcome 2026 --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo Central London illuminated to welcome 2026 ( 1 /6) 2025-12-29 09:45:02 Ecns.cn Editor :Zhao Li Colorful festive lights illuminate streets near Piccadilly Circus in central London on the evening of Dec. 27, 2025, as crowds of pedestrians gather to welcome the approaching New Year. (Photo: China News Service/Ouyang Kaiyu) Colorful festive lights illuminate streets near Piccadilly Circus in central London on the evening of Dec. 27, 2025, as crowds of pedestrians gather to welcome the approaching New Year. (Photo: China News Service/Ouyang Kaiyu) Colorful festive lights illuminate streets near Piccadilly Circus in central London on the evening of Dec. 27, 2025, as crowds of pedestrians gather to welcome the approaching New Year. (Photo: China News Service/Ouyang Kaiyu) Colorful festive lights illuminate streets near Piccadilly Circus in central London on the evening of Dec. 27, 2025, as crowds of pedestrians gather to welcome the approaching New Year. (Photo: China News Service/Ouyang Kaiyu) Colorful festive lights illuminate streets near Piccadilly Circus in central London on the evening of Dec. 27, 2025, as crowds of pedestrians gather to welcome the approaching New Year. (Photo: China News Service/Ouyang Kaiyu) Colorful festive lights illuminate streets near Piccadilly Circus in central London on the evening of Dec. 27, 2025, as crowds of pedestrians gather to welcome the approaching New Year. (Photo: China News Service/Ouyang Kaiyu) Previous Next (1) (2) (3) (4) (5) (6) LINE More Photo Exploring vivid sports competition throughout 2025 Exploring stunning winter scenery in Altay China's first L3 self-driving car debuts in Chongqin Grand bridge ready for traffic operation in Guizhou Harbin's celebrity snowman lights up winter night Southbound Travel for Guangdong Vehicles scheme implemented for entry into urban Hong Kong ${visuals_2} ${visuals_3} More Video Tech at Its Best! Yiwu's small commodities win over global merchants with real strength Insights | Russian scholar: Japan's rising militarism has deep roots for long time China Q&A | How will China advance people-centered sci-tech development during the 15th Five-Year Plan period? SCO Deputy Secretary-General:Tianjin Summit sets direction for next decade HKSAR security chief comments on conviction of Jimmy Lai Insights | Former Belarusian Deputy PM: China's development path ensures capital serves the people ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2025 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://pix.webm.ink/site/kb/safety-tips
Pixelfed Help Center minkpix Help Center — Safety Tips Getting Started Sharing Media Profile Hashtags Discover Timelines Instagram Import Community Guidelines Safety Tips Safety Tips We are committed to building a fun, easy to use photo sharing platform that is safe and secure for everyone. Know the rules To keep yourself safe, it is important to know the terms of service rules. Know the age guidelines Please keep in mind that Pixelfed is meant for people over the age of 16 or 13 depending on where you live. Report problematic content You can report content that you think is in violation of our policies. Understanding content visibility You can limit the visibility of your content to specific people, followers, public and more. Make your account or posts private You can make your account private and vet new follow requests to control who your posts are shared with. About Help Terms Privacy Language © 2026 pix.webm.ink · Powered by Pixelfed · v0.12.6
2026-01-13T09:29:32
https://www.ecns.cn/hd/2025-12-31/detail-iheymvap1607986.shtml
People perform 'circle dance' to pray for a bountiful new year in Qinghai --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo People perform 'circle dance' to pray for a bountiful new year in Qinghai ( 1 /4) 2025-12-31 09:45:09 Ecns.cn Editor :Mo Honge People dressed in their traditional attire perform the Anzhao dance in Huzhu Tuzu Autonomous County, Qinghai Province on December 30, 2025, to pray for a bountiful harvest and good fortune in the New Year. (Photo: China News Service) Anzhao dance, or circle dance of the Tu ethnic people, is a combination of singing and dancing without instrumental accompaniment. People dressed in their traditional attire perform the Anzhao dance in Huzhu Tuzu Autonomous County, Qinghai Province on December 30, 2025, to pray for a bountiful harvest and good fortune in the New Year. (Photo: China News Service) People dressed in their traditional attire perform the Anzhao dance in Huzhu Tuzu Autonomous County, Qinghai Province on December 30, 2025, to pray for a bountiful harvest and good fortune in the New Year. (Photo: China News Service) People dressed in their traditional attire perform the Anzhao dance in Huzhu Tuzu Autonomous County, Qinghai Province on December 30, 2025, to pray for a bountiful harvest and good fortune in the New Year. (Photo: China News Service) Previous Anzhao dance, or circle dance of the Tu ethnic people, is a combination of singing and dancing without instrumental accompaniment.--> Next (1) (2) (3) (4) LINE More Photo First batch of China's emergency humanitarian aid arrives in Cambodia Central London illuminated to welcome 2026 Chinese Foreign Minister meets Cambodian Deputy PM in Yunnan Exploring vivid sports competition throughout 2025 Exploring stunning winter scenery in Altay China's first L3 self-driving car debuts in Chongqin ${visuals_2} ${visuals_3} More Video China's 2025 New Frontiers in three minutes Insights | UN expert: China's AI factories showcase manufacturing strength Tech at Its Best! Yiwu's small commodities win over global merchants with real strength Insights | Russian scholar: Japan's rising militarism has deep roots for long time China Q&A | How will China advance people-centered sci-tech development during the 15th Five-Year Plan period? SCO Deputy Secretary-General:Tianjin Summit sets direction for next decade ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2025 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://docs.aws.amazon.com/pt_br/cost-management/latest/userguide/ce-advanced-cost-analysis.html
Explorar mais dados para análise avançada de custos - AWS Gestão de custos Explorar mais dados para análise avançada de custos - AWS Gestão de custos Documentação AWS Billing and Cost Management Manual do usuário As traduções são geradas por tradução automática. Em caso de conflito entre o conteúdo da tradução e da versão original em inglês, a versão em inglês prevalecerá. Explorar mais dados para análise avançada de custos O Explorador de Custos fornece à AWS dados de custo e uso do mês atual e dos 13 meses anteriores com granularidade diária e mensal. Você pode consultar esses dados no console ou usando a API do Explorador de Custos. Você pode habilitar dados plurianuais (com granularidade mensal) e dados mais granulares (com granularidade horária e diária) dos 14 dias anteriores. Depois de habilitados, você pode usar esses dados no console ou com a API do Explorador de Custos. Tópicos Dados plurianuais com granularidade mensal Dados granulares Noções básicas do resumo do uso mensal estimado Configuração de dados granulares e plurianuais O Javascript está desativado ou não está disponível no seu navegador. Para usar a documentação da AWS, o Javascript deve estar ativado. Consulte as páginas de Ajuda do navegador para obter instruções. Convenções do documento Realizar uma comparação de custos Dados plurianuais com granularidade mensal Essa página foi útil? - Sim Obrigado por nos informar que estamos fazendo um bom trabalho! Se tiver tempo, conte-nos sobre o que você gostou para que possamos melhorar ainda mais. Essa página foi útil? - Não Obrigado por nos informar que precisamos melhorar a página. Lamentamos ter decepcionado você. Se tiver tempo, conte-nos como podemos melhorar a documentação.
2026-01-13T09:29:32
https://www.ecns.cn/travel/
Travel --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Travel --> Ice dragon boat race aims to bolster Sino-UK bond Jan 12, 2026 The frozen Songhua River in Harbin, Heilongjiang province, came alive with the sound of drums and the rhythmic clanging of ice picks, as nearly 200 members of ice dragon boat teams vigorously struck the icy surface to move forward, drawing enthusiastic cheers from the spectators. Chinese visitors to South Korea soar, topping Japan Jan 11, 2026 One senior executive of a tourism platform based in South Korea told local media that Chinese tourists are indispensable and called for fostering a welcoming, understanding environment for them. Hong Kong high-speed rail to expand mainland links with 16 new destinations Jan 11, 2026 The Hong Kong section of the high-speed rail connecting the Chinese mainland and Hong Kong will introduce 16 new destinations starting from Jan. 26, railway operator MTR Corporation announced on Sunday. China expects huge surge in winter tourism Jan 8, 2026 China's ice and snow resources have turned into a robust economic driver, with experts noting the transformation of winter tourism and related leisure activities from a "niche experience" into a "popular trend" and predicting that the industry will continue to boom. International mayors given a taste of Harbin Jan 7, 2026 When mayors from around the world gathered in Harbin recently for the Global Mayors Dialogue, they didn't just talk urban governance — they also got their taste buds working. Shanghai supermarkets become must-visit stops for South Korean tourists Jan 7, 2026 Supermarkets in Shanghai have become must-visit stops on the itineraries of South Korean tourists. Tourists, athletes, sculptors flock to Harbin's famed ice and snow festival Jan 6, 2026 The banks of the Songhua River in Harbin, Heilongjiang province, were alive on Monday evening with the sound of fireworks and dazzling lights as the 42nd Harbin International Ice and Snow Festival kicked off. Yunnan charts a new course for tourism Jan 6, 2026 In the Old Town of Lijiang, Yunnan province, you can step into a world where culture and nature converge. Visitors can walk the cobblestone lanes alongside Naxi elders in traditional costume, and see the iconic waterwheel and ancient architecture, with snow-capped mountains standing guard in the distance. The Global Mayors Dialogue · Harbin opens Tuesday Jan 5, 2026 The Global Mayors Dialogue · Harbin opens tomorrow, where ice and friendship spark together. Chongqing trees get cozy in colorful sweaters Jan 5, 2026 A tree dressed in a colorful knitted sweater stands at Chongqing Rongchuang Resort, China, on January 3, 2026. New Year holiday drives travel peak Jan 5, 2026 China's tourism market hit its first travel peak of the year during the three-day New Year holiday period starting Thursday, with a strong festive demand drawing both domestic and international travelers to destinations across the country. Travel surge signals 'strong start' for tourism Jan 2, 2026 Domestic tourism has led the rebound. Bookings at leading online travel agencies have shown strong momentum. Data from Meituan Travel shows that bookings for the holiday period surged nearly fivefold from last year. Visits point way to better future for all Dec 31, 2025 On the cold afternoon of Jan 22, President Xi Jinping traveled for nearly an hour along mountain roads to reach a once flood-stricken village in Northeast China's Liaoning province, to offer support to residents who had been relocated to new homes. Frozen Yellow River waterfall captivates tourists Dec 26, 2025 Recently, due to continuous cold weather, the Yellow River's Hukou Waterfall, located at the border of Jixian county in Shanxi and Yichuan county in Shaanxi, has presented a breathtaking ice curtain landscape for tourists. The layered ice curtains, glistening in the sunlight, complemented by a vibrant rainbow arcing above the waterfall, create a stunning sight that has attracted numerous visitors. Hainan making a name for itself with Belarusian tourists Dec 23, 2025 China's tropical Hainan island has become a hit among Belarusian tourists according to one of the eastern European country's largest travel agencies. World's highest urban wetland a global model Dec 22, 2025 As the sun bathed the Potala Palace in golden light on Saturday morning in Lhasa, the capital of Southwest China's Xizang autonomous region, it also set the nearby Lhalu wetland shimmering, with the cold air giving way to the warmth of a new day. Visa-free measures spur surge in visitors Dec 19, 2025 China saw some 40.6 million foreign nationals enter through its ports over the past year, a 27.2 percent year-on-year increase, according to the latest statistics released by the National Immigration Administration on Thursday. 64 sculptors build 19-meter-tall snowman in Harbin Dec 18, 2025 China has once again urged certain individuals in Japan to stop peddling false narratives, retract erroneous remarks on the Taiwan question, and provide a responsible explanation to China and the international community. Tour gives China-Arab strategic trust a boost Dec 18, 2025 Foreign Minister Wang Yi's five-day tour of the United Arab Emirates, Saudi Arabia and Jordan has reinforced strategic trust between China and Arab countries and advanced cooperation across multiple fields, as China steps up preparations for hosting the second China-Arab States Summit next year. Thrills designed for 'wimps' make giant leap in tourism industry Dec 15, 2025 In the past, 26-year-old e-commerce professional Cao Peiqiang's idea of an adventurous travel thrill was a theme-park pirate ship or a cable car ride. "I'm a man who sought out fresh air and scenic views, not heart-stopping drops," said Cao from Hangzhou, Zhejiang province. Hubei's iconic Buddha's Hand draws international tourists Dec 11, 2025 Visitors are flocking to the famous Buddha's Hand, a striking cliffside landmark in Yangxin County, Hubei Province. New transport links to open remote Xinjiang village to tourism Dec 9, 2025 The secluded beauty of a remote village in Hejing county of the Bayingolin Mongolian autonomous prefecture, Xinjiang Uygur autonomous region, will become more accessible next year with the completion of a new highway and expressway. Tourists embrace new payment habits Dec 5, 2025 Spending patterns among China's inbound travelers are shifting toward card-based transactions, experiential and everyday scenarios, underscoring the nation's progress in improving bank card acceptance and payment convenience, said a recent report by the World Tourism Alliance. First visa-free entries recorded as Russia's visa-free policy for China takes effect Dec 3, 2025 The first cross-border coach carrying Chinese citizens entered the exit channel at Suifenhe Highway Port in Suifenhe City, located in northeast China’s Heilongjiang Province, marking the start of customs clearance after Russia’s visa-free policy for Chinese nationals took effect. Russia grants visa-free entry to Chinese citizens until 2026 Dec 1, 2025 Chinese citizens are permitted to travel to Russia for tourism or business for up to 30 days without a visa from now until Sept. 14, 2026, according to an order signed Monday by Russian President Vladimir Putin, CCTV News reported. Successive cold snaps to bring chills, wind and snow to China Nov 25, 2025 China will see frequent cold air activity this week, with three cold waves expected to hit back-to-back, bringing strong winds, sharp temperature drops, rain, and snow across much of the country, according to the China Meteorological Administration on Monday. China sees surge in flight bookings to Russia as visa-free policy nears implementation Nov 20, 2025 Flight enquiries from China to Russia have surged following President Vladimir Putin's announcement on Tuesday that a visa-free policy for Chinese citizens would take effect soon. Beijing cautions tourists over Japan travel risks Nov 17, 2025 China's Ministry of Culture and Tourism on Sunday urged Chinese tourists to avoid traveling to Japan for the time being and advised those already there to closely monitor local security conditions. More ports aid traveling Taiwan people Nov 4, 2025 Beginning Nov 20, the number of ports authorized to issue single-entry travel permits to Taiwan residents traveling to the Chinese mainland will increase from 58 to 100, the National Immigration Administration announced on Monday. China to extend visa-free access to France Nov 4, 2025 China will extend visa-free policy to France and other countries to December 31, 2026, Chinese foreign ministry spokesperson Mao Ning said on Monday. --> First Previous 1 2 3 4 Next Last Most popular in 24h More Top news Greenland says U.S. takeover unacceptable 'under any circumstances' China files over 200,000 satellite frequency, orbit applications with ITU John Ross: China's 14th Five-Year Plan has enabled a qualitative breakthrough and reshaped its relationship with the world economy China's Tianma-1000 cargo drone able to deliver 1 metric ton of supplies to plateau  China bans medical institutions from offering funeral services in crackdown on sector abuses More Video The Source Keeper Season 3 | Episode 1: The Whispers of Mountains and Rivers Comicomment: Wings clipped, Latin America left to suffer LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://docs.aws.amazon.com/it_it/cost-management/latest/userguide/what-is-costmanagement.html
Che cos'è Gestione dei costi e fatturazione AWS? - AWS Gestione dei costi Che cos'è Gestione dei costi e fatturazione AWS? - AWS Gestione dei costi Documentazione AWS Billing and Cost Management Guida per l’utente Caratteristiche di Gestione dei costi e fatturazione AWS Servizi correlati Le traduzioni sono generate tramite traduzione automatica. In caso di conflitto tra il contenuto di una traduzione e la versione originale in Inglese, quest'ultima prevarrà. Che cos'è Gestione dei costi e fatturazione AWS? Benvenuto nella Guida per l'utente di AWS Cost Management. Gestione dei costi e fatturazione AWS offre una suite di funzionalità per aiutarvi a configurare la fatturazione, recuperare e pagare le fatture e analizzare, organizzare, pianificare e ottimizzare i costi. Per iniziare, imposta la fatturazione in base alle tue esigenze. Per privati o piccole organizzazioni, AWS addebiterà automaticamente la carta di credito fornita. Per le organizzazioni più grandi, puoi utilizzarlo AWS Organizations per consolidare gli addebiti su più Account AWS piani. Puoi configurare la fatturazione, le imposte, gli ordini di acquisto e i metodi di pagamento in modo che corrispondano ai processi di approvvigionamento dell'organizzazione. Se ne hai più di una AWS Organizations, utilizza Billing Transfer per gestire e pagare centralmente tutte le tue organizzazioni da un unico account. Puoi allocare i costi a team, applicazioni o ambienti utilizzando categorie di costo o tag di allocazione dei costi oppure utilizzando AWS Cost Explorer. Puoi anche esportare i dati nel tuo data warehouse o strumento di business intelligence preferito. Di seguito una panoramica delle funzionalità che ti aiuteranno a gestire le finanze nel cloud. Caratteristiche di Gestione dei costi e fatturazione AWS Argomenti Fatturazione e pagamenti Analisi dei costi Organizzazione dei costi Pianificazione e definizione del budget Risparmi e impegni Fatturazione e pagamenti Scopri i tuoi addebiti mensili, visualizza e paga le fatture e gestisci le preferenze per fatturazione, fatture, imposte e pagamenti. Pagina delle fatture : scarica le fatture e visualizza i dati di fatturazione mensili dettagliati per capire come sono stati calcolati gli addebiti. Ordini di acquisto : crea e gestisci i tuoi ordini di acquisto per rispettare i processi di approvvigionamento unici della tua organizzazione. Pagamenti : consulta il saldo dei pagamenti in sospeso o scaduti e la cronologia dei pagamenti. Profili di pagamento : configura più metodi di pagamento per diversi Servizio AWS fornitori o parti dell'organizzazione. Crediti : rivedi i saldi di credito e scegli dove applicare i crediti. Preferenze di fatturazione : abilita l'invio delle fatture tramite e-mail e le tue preferenze per la condivisione del credito, gli avvisi e la condivisione degli sconti. Trasferimento della fatturazione : separa la fatturazione e la gestione finanziaria dalla gestione della sicurezza e della governance. Ciò consente a una singola AWS organizzazione di ottenere l'accesso centralizzato ai dati sui costi e alle AWS fatture di più organizzazioni. AWS Analisi dei costi Analizza i costi, esporta dati dettagliati su costi e utilizzo e prevedi le spese. AWS Cost Explorer : Analizza i dati sui costi e sull'utilizzo con elementi visivi, filtri e raggruppamenti. Puoi prevedere i costi e creare report personalizzati. Esportazioni di dati : crea esportazioni di dati personalizzate dai set di dati di Gestione fatturazione e costi. Rilevamento delle anomalie nei costi : imposta avvisi automatici quando AWS rileva un'anomalia dei costi per ridurre i costi imprevisti. Piano gratuito di AWS : Monitora l'utilizzo attuale e previsto dei servizi di livello gratuito per evitare costi imprevisti. Suddivisione dei dati di allocazione dei costi : abilita dati dettagliati su costi e utilizzo per le risorse condivise di Amazon Elastic Container Service (Amazon ECS). Preferenze di gestione dei costi : gestisci i dati che gli account dei membri possono visualizzare, modifica la granularità dei dati degli account e configura le preferenze di ottimizzazione dei costi. Organizzazione dei costi Organizza i costi tra team, applicazioni o clienti finali. Categorie di costo : mappa i costi per team, applicazioni o ambienti, quindi visualizza i costi in base a queste dimensioni in Esploratore dei costi ed esportazioni di dati. Utilizza le regole di suddivisione delle spese per assegnare i costi tra i valori della categoria di costo. Tag di allocazione dei costi : utilizza i tag delle risorse per organizzare e quindi visualizzare i costi per tag di allocazione dei costi in Esploratore dei costi ed esportazioni di dati. Pianificazione e definizione del budget Stima il costo di un carico di lavoro pianificato e crea budget per tenere traccia e controllare i costi. Budget : imposta budget personalizzati per costi e utilizzo, per gestire i costi all'interno dell'organizzazione e ricevi avvisi quando i costi superano le soglie definite. Calcolatore dei prezzi integrato nella console : utilizza questa funzionalità per stimare i costi cloud pianificati sulla base degli impegni di discount e acquisto. Sito Web dedicato al calcolo dei prezzi pubblici : crea stime dei costi per l'utilizzo di AWS servizi con tariffe On-Demand. Risparmi e impegni Ottimizza l'utilizzo delle risorse e usa modelli di prezzo flessibili per ridurre l'importo della fattura. Centrale ottimizzazione costi AWS : Identifica le opportunità di risparmio con suggerimenti personalizzati, tra cui l'eliminazione delle risorse inutilizzate, il ridimensionamento, i Savings Plans e le prenotazioni. Savings Plans : riduci la bolletta rispetto ai prezzi on demand con modelli di prezzo flessibili. Gestisci l'inventario dei Savings Plans, esamina i consigli di acquisto, esegui analisi di acquisto e analizza l'utilizzo e la copertura di Savings Plans. Prenotazioni : riserva capacità a tariffe scontate per Amazon Elastic Compute Cloud (Amazon EC2), Amazon Relational Database Service (Amazon RDS), Amazon Redshift, Amazon DynamoDB e altro ancora. Servizi correlati AWS Billing Conductor Billing Conductor è un servizio di fatturazione personalizzato che supporta i flussi di lavoro di showback e chargeback dei partner che rivendono soluzioni e clienti che acquistano servizi cloud direttamente tramite. AWS Servizi AWS AWS AWS Puoi personalizzare una seconda versione alternativa dei tuoi dati di fatturazione mensili. Il servizio modella la relazione di fatturazione tra te e i tuoi clienti o le tue unità aziendali. Billing Conductor non modifica la modalità di fatturazione mensile. AWS Puoi invece utilizzare il servizio per configurare, generare e mostrare tariffe a clienti specifici in un determinato periodo di fatturazione. Puoi anche utilizzarlo per analizzare la differenza tra le tariffe applicate ai tuoi raggruppamenti rispetto alle tariffe effettive per gli stessi account di. AWS Come risultato della configurazione di Billing Conductor, l'account di gestione può anche vedere la tariffa personalizzata applicata nella pagina dei dettagli di fatturazione della console.Gestione dei costi e fatturazione AWS L'account di gestione può anche configurare i report AWS sui costi e sull'utilizzo per gruppo di fatturazione. Quando gli utenti di Billing Transfer accedono all'account di trasferimento delle fatture, Billing Conductor consente all'account di gestione dell' AWS organizzazione che trasferisce le fatture (account di origine delle fatture) di visualizzare solo i prezzi di utilizzo calcolati con le tariffe dell'account di trasferimento delle fatture. Per ulteriori informazioni su Billing Conductor, consulta la Guida dell'utente AWS Billing Conductor . Per ulteriori informazioni sul trasferimento della fatturazione, consulta Trasferimento della gestione della fatturazione ad account esterni. IAM Puoi utilizzare AWS Identity and Access Management (IAM) per controllare chi nel tuo account o organizzazione ha accesso a pagine specifiche della console di Billing and Cost Management. Ad esempio, puoi controllare l'accesso alle fatture e alle informazioni dettagliate su addebiti e attività dell'account, budget, metodi di pagamento e crediti. IAM è una funzionalità di. Account AWS Non è necessario fare altro per iscriversi a IAM e l'utilizzo è gratuito. Quando crei un account, inizi con un'unica identità di accesso che ha accesso completo a tutte Servizi AWS le risorse dell'account. Questa identità è denominata Utente root dell'account AWS ed è accessibile effettuando l'accesso con l'indirizzo e-mail e la password utilizzati per creare l'account. Si consiglia vivamente di non utilizzare l’utente root per le attività quotidiane. Conserva le credenziali dell’utente root e utilizzale per eseguire le operazioni che solo l’utente root può eseguire. Per un elenco completo delle attività che richiedono l’accesso come utente root, consulta la sezione Attività che richiedono le credenziali dell’utente root nella Guida per l’utente IAM . Per impostazione predefinita, gli utenti e ruoli IAM del tuo account non possono accedere alle pagine della console Gestione fatturazione e costi. Per concedere l'accesso, abilita l'impostazione Attivazione dell'accesso IAM . Per ulteriori informazioni, consulta Informazioni sull'accesso IAM . Se Account AWS nell'organizzazione ne sono presenti più di uno, è possibile gestire l'accesso tramite account collegato ai dati di Cost Explorer utilizzando la pagina delle preferenze di Cost Management . Per ulteriori informazioni, consulta Controllo dell'accesso a Esploratore dei costi . Per ulteriori informazioni su IAM, consulta la Guida per l'utente di IAM . AWS Organizations Puoi utilizzare la funzionalità di fatturazione consolidata in Organizzazioni per consolidare la fatturazione e i pagamenti per molteplici Account AWS. Ogni organizzazione dispone di un account di gestione sul quale vengono addebitati i costi di tutti gli account membri . La fatturazione consolidata ha i seguenti vantaggi: Fattura unica : ricevi un'unica fattura per più account. Monitoraggio semplificato : puoi monitorare i costi di più account e scaricare i dati combinati di costo e utilizzo. Utilizzo combinato : puoi combinare i livelli di utilizzo in tutti gli account dell'organizzazione per condividere gli sconti sui prezzi per volume e quelli per le istanze riservate e Savings Plans. Questo può portare a una riduzione dell'addebito per il tuo progetto, reparto o azienda rispetto ai singoli account autonomi. Per ulteriori informazioni, consulta la sezione Tipi di volume . Nessuna commissione aggiuntiva – la fatturazione consolidata viene offerta senza costi aggiuntivi. Per ulteriori informazioni su Organizzazioni, consulta la Guida per l'utente AWS Organizations . Trasferimento della fatturazione Puoi utilizzare il trasferimento di fatturazione per gestire e pagare centralmente più prodotti AWS Organizations da un unico account. Il trasferimento della fatturazione consente a un account di gestione di designare un account di gestione esterno per gestire e pagare la fattura consolidata. Ciò centralizza la fatturazione mantenendo al contempo l'autonomia di gestione della sicurezza. Per configurare il trasferimento della fatturazione, un account esterno (account di trasferimento delle fatture) invia un invito al trasferimento della fatturazione a un account di gestione (account di origine della fattura). Se l'invito viene accettato, l'account esterno diventa l'account per il trasferimento delle fatture. L'account di trasferimento delle fatture gestisce quindi e paga la fattura consolidata del conto di origine della fattura, a partire dalla data specificata nell'invito. Per ulteriori informazioni, consulta Trasferire la gestione della fatturazione ad account esterni . AWS API del listino prezzi AWS L'API Price List è un catalogo centralizzato a cui è possibile richiedere AWS in modo programmatico servizi, prodotti e informazioni sui prezzi. Puoi utilizzare l'API bulk per recuperare informazioni di up-to-date AWS servizio in blocco, disponibile nei formati JSON e CSV. Per ulteriori informazioni, consulta Cos' è l'API Price List? AWS . JavaScript è disabilitato o non è disponibile nel tuo browser. Per usare la documentazione AWS, JavaScript deve essere abilitato. Consulta le pagine della guida del browser per le istruzioni. Convenzioni dei documenti Guida introduttiva alla gestione dei AWS costi Questa pagina ti è stata utile? - Sì Grazie per averci comunicato che stiamo facendo un buon lavoro! Se hai un momento, ti invitiamo a dirci che cosa abbiamo fatto che ti è piaciuto così possiamo offrirti altri contenuti simili. Questa pagina ti è stata utile? - No Grazie per averci comunicato che questa pagina ha bisogno di essere modificata. Siamo spiacenti di non aver soddisfatto le tue esigenze. Se hai un momento, ti invitiamo a dirci come possiamo migliorare la documentazione.
2026-01-13T09:29:32
https://www.ecns.cn/hd/2025-12-31/detail-iheymvap1608160.shtml
First 'Grassland curling' attracts 350 competitors --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo First 'Grassland curling' attracts 350 competitors ( 1 /6) 2025-12-31 10:33:24 Ecns.cn Editor :Mo Honge Contestants compete during a local game in Xilin Gol, in Inner Mongolia Autonomous Region. (Photo: China News Service) The first "Barigai & Tanshaga Competition" was held in Xilin Gol City recetnly, attracting 350 enthusiasts from seven leagues and cities in Inner Mongolia Autonomous Region: Hulunbuir, Tongliao, Chifeng, Xilin Gol, Ulanqab, Baotou, and Bayannur. Known as "grassland curling," Barigai follows similar rules to curling. Tanshaga involves flicking bone pieces placed on a wooden track with fingertips to hit the target for different point values. Contestants compete during a local game in Xilin Gol, in Inner Mongolia Autonomous Region. (Photo: China News Service) The first "Barigai & Tanshaga Competition" was held in Xilin Gol City recetnly, attracting 350 enthusiasts from seven leagues and cities in Inner Mongolia Autonomous Region: Hulunbuir, Tongliao, Chifeng, Xilin Gol, Ulanqab, Baotou, and Bayannur. Known as "grassland curling," Barigai follows similar rules to curling. Tanshaga involves flicking bone pieces placed on a wooden track with fingertips to hit the target for different point values. Contestants compete during a local game in Xilin Gol, in Inner Mongolia Autonomous Region. (Photo: China News Service) The first "Barigai & Tanshaga Competition" was held in Xilin Gol City recetnly, attracting 350 enthusiasts from seven leagues and cities in Inner Mongolia Autonomous Region: Hulunbuir, Tongliao, Chifeng, Xilin Gol, Ulanqab, Baotou, and Bayannur. Known as "grassland curling," Barigai follows similar rules to curling. Tanshaga involves flicking bone pieces placed on a wooden track with fingertips to hit the target for different point values. Contestants compete during a local game in Xilin Gol, in Inner Mongolia Autonomous Region. (Photo: China News Service) The first "Barigai & Tanshaga Competition" was held in Xilin Gol City recetnly, attracting 350 enthusiasts from seven leagues and cities in Inner Mongolia Autonomous Region: Hulunbuir, Tongliao, Chifeng, Xilin Gol, Ulanqab, Baotou, and Bayannur. Known as "grassland curling," Barigai follows similar rules to curling. Tanshaga involves flicking bone pieces placed on a wooden track with fingertips to hit the target for different point values. Contestants compete during a local game in Xilin Gol, in Inner Mongolia Autonomous Region. (Photo: China News Service) The first "Barigai & Tanshaga Competition" was held in Xilin Gol City recetnly, attracting 350 enthusiasts from seven leagues and cities in Inner Mongolia Autonomous Region: Hulunbuir, Tongliao, Chifeng, Xilin Gol, Ulanqab, Baotou, and Bayannur. Known as "grassland curling," Barigai follows similar rules to curling. Tanshaga involves flicking bone pieces placed on a wooden track with fingertips to hit the target for different point values. Contestants compete during a local game in Xilin Gol, in Inner Mongolia Autonomous Region. (Photo: China News Service) The first "Barigai & Tanshaga Competition" was held in Xilin Gol City recetnly, attracting 350 enthusiasts from seven leagues and cities in Inner Mongolia Autonomous Region: Hulunbuir, Tongliao, Chifeng, Xilin Gol, Ulanqab, Baotou, and Bayannur. Known as "grassland curling," Barigai follows similar rules to curling. Tanshaga involves flicking bone pieces placed on a wooden track with fingertips to hit the target for different point values. Previous The first "Barigai & Tanshaga Competition" was held in Xilin Gol City recetnly, attracting 350 enthusiasts from seven leagues and cities in Inner Mongolia Autonomous Region: Hulunbuir, Tongliao, Chifeng, Xilin Gol, Ulanqab, Baotou, and Bayannur. Known as "grassland curling," Barigai follows similar rules to curling. Tanshaga involves flicking bone pieces placed on a wooden track with fingertips to hit the target for different point values.--> The first "Barigai & Tanshaga Competition" was held in Xilin Gol City recetnly, attracting 350 enthusiasts from seven leagues and cities in Inner Mongolia Autonomous Region: Hulunbuir, Tongliao, Chifeng, Xilin Gol, Ulanqab, Baotou, and Bayannur. Known as "grassland curling," Barigai follows similar rules to curling. Tanshaga involves flicking bone pieces placed on a wooden track with fingertips to hit the target for different point values.--> The first "Barigai & Tanshaga Competition" was held in Xilin Gol City recetnly, attracting 350 enthusiasts from seven leagues and cities in Inner Mongolia Autonomous Region: Hulunbuir, Tongliao, Chifeng, Xilin Gol, Ulanqab, Baotou, and Bayannur. Known as "grassland curling," Barigai follows similar rules to curling. Tanshaga involves flicking bone pieces placed on a wooden track with fingertips to hit the target for different point values.--> The first "Barigai & Tanshaga Competition" was held in Xilin Gol City recetnly, attracting 350 enthusiasts from seven leagues and cities in Inner Mongolia Autonomous Region: Hulunbuir, Tongliao, Chifeng, Xilin Gol, Ulanqab, Baotou, and Bayannur. Known as "grassland curling," Barigai follows similar rules to curling. Tanshaga involves flicking bone pieces placed on a wooden track with fingertips to hit the target for different point values.--> The first "Barigai & Tanshaga Competition" was held in Xilin Gol City recetnly, attracting 350 enthusiasts from seven leagues and cities in Inner Mongolia Autonomous Region: Hulunbuir, Tongliao, Chifeng, Xilin Gol, Ulanqab, Baotou, and Bayannur. Known as "grassland curling," Barigai follows similar rules to curling. Tanshaga involves flicking bone pieces placed on a wooden track with fingertips to hit the target for different point values.--> The first "Barigai & Tanshaga Competition" was held in Xilin Gol City recetnly, attracting 350 enthusiasts from seven leagues and cities in Inner Mongolia Autonomous Region: Hulunbuir, Tongliao, Chifeng, Xilin Gol, Ulanqab, Baotou, and Bayannur. Known as "grassland curling," Barigai follows similar rules to curling. Tanshaga involves flicking bone pieces placed on a wooden track with fingertips to hit the target for different point values.--> Next (1) (2) (3) (4) (5) (6) LINE More Photo First 'Grassland curling' attracts 350 competitors China launches two new satellites for space target detection test People perform 'circle dance' to pray for a bountiful new year in Qingha First batch of China's emergency humanitarian aid arrives in Cambodia Central London illuminated to welcome 2026 Chinese Foreign Minister meets Cambodian Deputy PM in Yunnan ${visuals_2} ${visuals_3} More Video China's 2025 New Frontiers in three minutes Insights | UN expert: China's AI factories showcase manufacturing strength Tech at Its Best! Yiwu's small commodities win over global merchants with real strength Insights | Russian scholar: Japan's rising militarism has deep roots for long time China Q&A | How will China advance people-centered sci-tech development during the 15th Five-Year Plan period? SCO Deputy Secretary-General:Tianjin Summit sets direction for next decade ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2025 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://www.ecns.cn/
China News Service Website - Headlines, stories, photos and videos | Ecns.cn --> Tuesday Jan 13, 2026 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG China's commercial recoverable spacecraft completes test flight South Korea's ex-President Yoon Suk Yeol faces sentencing in insurrection trial 'Weepy horse' toy goes viral after sewing error New giant panda pair makes public debut in Malaysia Xi urges advancing Party self-governance with higher standards Xi emphasized that implementing the major decisions and plans of the CPC Central Committee is a fundamental requirement for upholding its authority and its centralized, unified leadership. Headlines Canadian PM to make official visit to China Shanghai eyes eVTOL dominance positioning UK consults NATO allies in Europe on Arctic defense Anti-corruption focuses more on work conduct issues British law to curb deepfakes linked to Musk's Grok Zootopia 2 hype fuels risky interest in blue snake Production mistake turns 'weepy horse' toy into viral hit LINE --> More Latest news China's Tianma-1000 cargo drone able to deliver 1 metric ton of supplies to plateau  Chinese FM urges Taiwan authorities to stop its poor political stunts on China-Africa relations City eyes eVTOL dominance positioning Xi: Advance rigorous Party self-governance Anti-corruption efforts focus more on work conduct issues Museums showcase Chinese New Year traditions Britain to implement law to curb deepfakes linked to Musk's Grok Drone strike on military base kills 27 in central Sudan: source Trump says countries doing business with Iran face 25 pct tariff London murder rate hits lowest level in 11 years UK consults NATO allies in Europe on Arctic defense More Ecns wire Greenland says U.S. takeover unacceptable 'under any circumstances' China files over 200,000 satellite frequency, orbit applications with ITU John Ross: China’s 14th Five-Year Plan has enabled a qualitative breakthrough and reshaped its relationship with the world economy China's Tianma-1000 cargo drone able to deliver 1 metric ton of supplies to plateau  China bans medical institutions from offering funeral services in crackdown on sector abuses Chinese FM urges Taiwan authorities to stop its poor political stunts on China-Africa relations More --> Editor's choice Chinese firms top global humanoid robot market in 2025: new report Chinese troops step up combat-focused drills Chinese e-platform pushing AI education globally Moscow denies Venezuelan VP is in Russia The Dunhuang Flying Dancers in the 1,360°C kiln fire U.S. actions fail to match its words on Taiwan question 1 2 3 More Gallery Harbin opens its 42nd Ice and Snow Festival Leonid meteor shower lights up night sky in China's Xizang International ice sculpture competition heats up in Harbin China's largest amphibious assault ship sets off on maiden sea trial Exhibition on atrocities of Japan's Unit 731 held in NE China's Harbin COP30: Numbers and highlights Team China claims gold for artistic swimming at World Aquatics Championships China launches Tianwen-2 mission China's foreign trade up 2.9 pct in H1 1-million-kilowatt photovoltaic, thermal project under construction in Qinghai Wang Chuqin wins men's singles gold at WTT U.S. Smash Jade-like water spotted on Loess plateau in NW China's Shaanxi More Business China to adjust or cancel export tax rebates for photovoltaic and battery products Hainan posts $170 million in duty-free sales in first seven days of 2026 AI-driven demand boosts memory stocks: report Production mistake turns 'weepy horse' toy into viral hit in China China unveils AI model integrating meteorology and finance Powell says Federal Reserve subpoenaed by Trump Justice Department More Feature AI has finger on pulse of healthcare advances Yang starts to scale steep learning curve History changing to 'her story' in local governance More Culture Production mistake turns 'weepy horse' toy into viral hit in China Museums showcase Chinese New Year traditions Production mistake turns 'weepy horse' toy into viral hit in China Ice dragon boat race aims to bolster Sino-UK bond Jilin documentary festival brings filmmakers to northeastern China Musical theater market hits new heights More Sci-tech China's Tianma-1000 cargo drone able to deliver 1 metric ton of supplies to plateau  China's Tianma-1000 cargo drone able to deliver 1 metric ton of supplies to plateau  City eyes eVTOL dominance positioning J-10CE fighter achieved first verified combat success: Chinese authorities China unveils AI model integrating meteorology and finance Unmanned transport plane makes maiden flight in Shaanxi More Video What's it like doing business in China? Check what foreign friends say More than a business hub: check how global merchants thrive in Yiwu Insights | Sanae Takaichi's erroneous remarks a grave 'diplomatic failure': Japanese scholar --> More Travel Shanghai supermarkets become must-visit stops for South Korean tourists Shanghai supermarkets become must-visit stops for South Korean tourists First visa-free entries recorded as Russia's visa-free policy for China takes effect Russia grants visa-free entry to Chinese citizens until 2026 China to extend visa-free access to France Chinese man walks 8,000 km from Xi'an to Rome, inspired by ancient Silk Road More Panda China's latest giant panda base opens to public New pair of giant pandas expected to arrive in France in 2027 Indonesian president names first panda cub born in the country France bids farewell to panda 'diplomats' Giant pandas celebrate 100 days at Harbin's Sun Island pavilion Last two giant pandas in Japan to return to China in February More Special coverage Unlocking Chinese Cities West - East Talk Deep China LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2026 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://cloudflare.com/pt-br/ai-solution/
Soluções de Inteligência Artificial (IA) | Cloudflare Inscreva-se Idiomas English English (United Kingdom) Deutsch Español (Latinoamérica) Español (España) Français Italiano 日本語 한국어 Polski Português (Brasil) Русский 繁體中文 简体中文 Plataforma Nuvem de conectividade A nuvem de conectividade da Cloudflare oferece mais de 60 serviços de rede, segurança e desempenho. Enterprise Para organizações de grande e médio porte Pequena empresa Para pequenas organizações Parceiro Torne-se um parceiro da Cloudflare! Casos de uso Modernizar aplicativos Desempenho acelerado Garantir a disponibilidade dos aplicativos Otimizar a experiência na web Modernizar a segurança Substituição da VPN Proteção contra phishing Proteger aplicativos web e APIs Modernizar as redes Rede de cafeterias Modernização de WAN Simplificação de sua rede corporativa Tópicos para CXOs Adotar IA Integrar a IA nas forças de trabalho e nas experiências digitais Segurança de IA Proteger aplicativos de IA agêntica e generativa Conformidade de dados Simplificar a conformidade e minimizar os riscos Criptografia pós-quântica Proteger dados e atender aos padrões de conformidade Setores Saúde Bancário Varejo Jogos Setor público Recursos Guias de produtos Arquiteturas de referência Relatórios de analistas Interagir Eventos Demonstrações Webinars Workshops Solicite uma demonstração Produtos Produtos Segurança do espaço de trabalho Acesso à rede Zero Trust Gateway seguro da web Email security Agente de segurança de acesso à nuvem Segurança de aplicativos Proteção contra DDoS na camada de aplicação Firewall de aplicativos web Segurança para APIs Bot Management Desempenho de aplicativos CDN DNS Roteamento inteligente Load balancing Rede e SASE Proteção contra DDoS nas camadas 3/4 NaaS / SD- WAN Firewall como serviço Network Interconnect Planos e preços Planos Enterprise Planos para pequenas empresas Planos individuais Compare planos Serviços globais Pacotes de suporte e sucesso Experiência otimizada com a Cloudflare Serviços profissionais Implementação liderada por especialistas Gerenciamento técnico de contas Gerenciamento técnico focado Serviço de operações de segurança Monitoramento e resposta da Cloudflare Registro de domínios Compre e gerencie domínios 1.1.1.1 Resolvedor de DNS gratuito Recursos Guias de produtos Arquiteturas de referência Relatórios de analistas Demonstrações de produtos e tour Me ajude a escolher Desenvolvedores Documentação Biblioteca para desenvolvedores Documentação e guias Demonstrações de aplicativos Explore o que você pode criar Tutoriais Tutoriais de criação passo a passo Arquitetura de referência Diagramas e padrões de design Produtos Inteligência artificial AI Gateway Observe e controle aplicativos de IA Workers AI Execute modelos de ML em nossa rede Computação Observability Logs, métricas e rastreamentos Workers Crie e implante aplicativos sem servidor Mídia Images Transforme e otimize imagens Realtime Crie aplicativos de áudio/vídeo em tempo real Armazenamento e banco de dados D1 Crie bancos de dados SQL sem servidor R2 Armazene dados sem taxas de saída caras Planos e preços Workers Crie e implante aplicativos sem servidor Workers KV Armazenamento de chave-valor sem servidor para aplicativos R2 Armazene dados sem taxas de saída caras Explore os projetos Histórias de clientes Demonstração de IA em 30 segundos Guia rápido para começar Explorar o Workers Playground Crie, teste e implante Discord para desenvolvedores Participe da comunidade Comece a desenvolver Parceiros Rede de parceiros Cresça, inove e atenda às necessidades do cliente com a Cloudflare Portal de parceiros Encontre recursos e registre ofertas Tipos de parceria Programa PowerUP Expanda seus negócios e mantenha seus clientes conectados e protegidos Parceiros de Tecnologia Explore nosso ecossistema de parceiros e integradores de tecnologia Integradores de sistema global Apoiar a transformação digital contínua e em grande escala Provedores de serviços Descubra nossa rede de provedores de serviços valiosos Programa de agências de autoatendimento Gerencie contas de autoatendimento para seus clientes Portal peer-to-peer Insights de tráfego para sua rede Localize um parceiro Impulsione seus negócios: conecte-se com os parceiros Cloudflare Powered+. Recursos Interagir Demonstrações e tour dos produtos Demonstrações de produtos sob demanda Estudos de caso Impulsione o sucesso com a Cloudflare Webinars Discussões esclarecedoras Workshops Fóruns virtuais Biblioteca Guias e roteiros úteis e muito mais Relatórios Insights da pesquisa da Cloudflare Blog Aprofundamentos técnicos e notícias sobre produtos Central de aprendizagem Ferramentas educacionais e conteúdo prático Criar Arquitetura de referência Guias técnicos Guias de soluções e produtos Documentação de produtos Documentação Documentação para desenvolvedores Explorar theNET Insights executivos para a empresa digital Cloudflare TV Séries e eventos inovadores Cloudforce One Pesquisa e operações de ameaças Radar Tráfego da internet e tendências de segurança Relatórios de analistas Relatórios de pesquisas do setor Eventos Próximos eventos regionais Confiança, privacidade e conformidade Informações e políticas de conformidade Suporte Fale conosco Fórum da comunidade Perdeu o acesso à conta? Discord para desenvolvedores Obter ajuda Empresa Informações da empresa Liderança Conheça nossos líderes Relações com investidores Informações para investidores Imprensa Explore as notícias recentes Carreiras Explore as funções em aberto confiança, privacidade e segurança Privacidade Política, dados e proteção Confiança Política, processo e segurança Conformidade Certificação e regulamentação Transparência Políticas e divulgações Interesse público Humanitário Projeto Galileo Governo Projeto Athenian Eleições Cloudflare para Campanhas Saúde Project Fair Shot Rede global Locais e status globais Entrar Entre em contato com vendas Acelere sua jornada de IA Você tem sua visão de IA. A plataforma unificada de segurança, conectividade e desenvolvimento da Cloudflare ajuda você a executar essa visão com maior velocidade e segurança. Solicite uma consulta PROBLEMA A complexidade diminui o impacto da IA. As organizações têm metas ambiciosas de IA. No entanto, muitos projetos são prejudicados pelo desenvolvimento lento, problemas de escalabilidade e novos tipos de risco. Desenvolvimento de IA lento Cadeias de ferramentas complexas e um cenário tecnológico em constante mudança dificultam a inovação de IA. Desafios para escalar a IA Bases de usuários globais, picos de uso e custos de computação inflexíveis desaceleram o crescimento da IA. Risco crescente de IA Visibilidade limitada, gerenciamento de riscos complexo e governança de dados inadequada limitam o impacto da IA, inclusive com código gerado por IA. SOLUÇÃO A Cloudflare é seu ponto único de controle de IA A nuvem de conectividade da Cloudflare permite que as organizações criem aplicativos de IA, conectem e dimensionem aplicativos de IA e protejam todo o seu ciclo de vida de IA a partir de uma única plataforma global. Criar IA Proteger a IA Principais necessidades de IA Crie uma estratégia de IA ou fique para trás Os avanços e casos de uso revelados pela IA no último ano mostram o vasto potencial que ela tem para transformar a forma como trabalhamos e consumimos informações. A pressão é alta para fornecer uma estratégia de IA que cubra como sua empresa consome IA, como você protege a propriedade intelectual e como adiciona componentes habilitados por IA a aplicativos internos e externos. Inovação mais rápida Crie aplicativos de IA com mais velocidade, custos mais baixos e maior agilidade, independentemente do modelo de IA. Escala global Ofereça experiências rápidas e confiáveis em pilhas complexas de IA e para bases de usuários globais. Segurança incorporada Entenda e gerencie o risco da IA sem se perder em painéis ou atualizações constantes de políticas. E-book: O guia empresarial para proteger e escalar a IA Descubra por que as empresas têm dificuldades em criar e proteger de forma eficaz a infraestrutura de IA em escala, por que a infraestrutura de IA dos hiperescaladores frequentemente não atende às expectativas e como superar esses desafios. Leia o e-book Líderes globais, incluindo 30% das empresas da Fortune 1000, confiam na Cloudflare Quer conversar com um especialista? Solicite uma consulta COMO FUNCIONA Uma plataforma unificada de segurança de IA, conectividade e serviços para desenvolvedores Os serviços de IA da Cloudflare são criados para serem executados em qualquer lugar de nossa rede global de mais de 330 cidades e já são usados por 80% das 50 maiores empresas de IA generativa. Desenvolva Crie aplicativos de IA full stack com acesso a mais de cinquenta modelos de IA em nossa rede global. Crie e execute agentes sem pagar pelo tempo de espera. Saiba mais Conecte-se Controle e observe aplicativos com tecnologia de IA, enquanto reduz os custos de inferência e roteamento de tráfego de forma dinâmica. Crie servidores MCP que são executados em toda a nossa rede global Saiba mais Proteger Amplie a visibilidade, mitigue os riscos e proteja os dados durante todo o ciclo de vida da IA. Controle como os crawlers de IA acessam seu conteúdo na web. Saiba mais A Cloudflare ajuda a Indeed a descobrir e gerenciar o uso de IA oculta A Indeed, um site de empregos líder, buscava mais insights e controle sobre os aplicativos de IA utilizados por sua força de trabalho. Eles recorreram ao pacote de segurança de IA da Cloudflare , que os ajuda a descobrir padrões de uso de IA e a aplicar políticas de uso de dados. Agora, a Indeed está no caminho para alcançar o equilíbrio ideal entre inovação e controle. "A Cloudflare nos ajuda a descobrir quais riscos de IA oculta existem e a bloquear aplicativos de IA e chatbots não autorizados.” COMECE A USAR Planos Gratuitos Planos para pequenas empresas Para empresas Obtenha uma recomendação Solicite uma demonstração Entre em contato com vendas SOLUÇÕES Nuvem de conectividade Serviços de aplicativos SASE e segurança do espaço de trabalho Serviços de rede Plataforma para desenvolvedores SUPORTE Central de Atendimento Suporte ao cliente Fórum da comunidade Discord para desenvolvedores Perdeu o acesso à conta? Status da Cloudflare CONFORMIDADE Recursos de conformidade Confiança RGPD IA responsável Relatório de transparência Notifique o abuso INTERESSE PÚBLICO Projeto Galileo Projeto Athenian Cloudflare para Campanhas Project Fairshot EMPRESA Sobre a Cloudflare Mapa de rede Nossa equipe Logotipos e kit para a imprensa Diversidade, equidade e inclusão Impacto/ESG © 2026 Cloudflare, Inc. Política de privacidade Termos de Uso Denuncie problemas de segurança Confiança e segurança Preferências de cookies Marca registrada Impressum
2026-01-13T09:29:32
https://pix.webm.ink/site/kb/sharing-media#collapse5
Pixelfed Help Center minkpix Help Center — Sharing Photos & Videos Getting Started Sharing Media Profile Hashtags Discover Timelines Instagram Import Community Guidelines Safety Tips Sharing Photos & Videos How do I create a post? To create a post using a desktop web browser: Go to https://pix.webm.ink . Click on the link at the top of the page. Upload your photo(s) or video(s), add an optional caption and set other options. Click on the Create Post button. To create a post using a mobile web browser: Go to https://pix.webm.ink . Click on the button at the bottom of the page. Upload your photo(s) or video(s), add an optional caption and set other options. Click on the Create Post button. How do I share a post with multiple photos or videos? During the compose process, you can select multiple files at a single time, or add each photo/video individually. How do I add a caption before sharing my photos or videos on Pixelfed? During the compose process, you will see the Caption input. Captions are optional and limited to 500 characters. How do I add a filter to my photos? This is an experimental feature, filters are not federated yet! To add a filter to media during the compose post process: Click the Options button if media preview is not displayed. Select a filter from the Select Filter dropdown. How do I add a description to each photo or video for the visually impaired? This is an experimental feature! You need to use the experimental compose UI found here . Add media by clicking the Add Photo/Video button. Set a image description by clicking the Media Description button. Image descriptions are federated to instances where supported. What types of photos or videos can I upload? You can upload the following media types: image/jpeg image/png image/gif video/mp4 image/webp How can I disable comments/replies on my post? To enable or disable comments/replies using a desktop or mobile browser: Open the menu, click the button Click on Enable Comments or Disable Comments How many people can I tag or mention in my comments or posts? You can tag or mention up to 5 profiles per comment or post. What does archive mean? You can archive your posts which prevents anyone from interacting or viewing it. Archived posts cannot be deleted or otherwise interacted with. You may not recieve interactions (comments, likes, shares) from other servers while a post is archived. How can I archive my posts? To archive your posts: Navigate to the post Open the menu, click the or button Click on Archive How do I unarchive my posts? To unarchive your posts: Navigate to your profile Click on the ARCHIVES tab Scroll to the post you want to unarchive Open the menu, click the or button Click on Unarchive About Help Terms Privacy Language © 2026 pix.webm.ink · Powered by Pixelfed · v0.12.6
2026-01-13T09:29:32
https://www.ecns.cn/hd/2025-12-29/detail-iheyfqph6162276.shtml
First batch of China's emergency humanitarian aid arrives in Cambodia --> 中文 Home News Ecns Wire Business Travel Photo Video Voices RIGHT BG LINE Text: A A A Print Photo First batch of China's emergency humanitarian aid arrives in Cambodia ( 1 /2) 2025-12-29 09:40:15 Ecns.cn Editor :Zhao Li The first batch of emergency humanitarian aid supplies provided by the Chinese government arrives at Techo International Airport in Phnom Penh, Cambodia, at noon local time on Dec. 28, 2025. The aid shipment includes tents, blankets and food supplies. (Photo: China News Service/Li Zhen) The first batch of emergency humanitarian aid supplies provided by the Chinese government arrives at Techo International Airport in Phnom Penh, Cambodia, at noon local time on Dec. 28, 2025. The aid shipment includes tents, blankets and food supplies. (Photo: China News Service/Li Zhen) Previous Next (1) (2) LINE More Photo Exploring vivid sports competition throughout 2025 Exploring stunning winter scenery in Altay China's first L3 self-driving car debuts in Chongqin Grand bridge ready for traffic operation in Guizhou Harbin's celebrity snowman lights up winter night Southbound Travel for Guangdong Vehicles scheme implemented for entry into urban Hong Kong ${visuals_2} ${visuals_3} More Video Tech at Its Best! Yiwu's small commodities win over global merchants with real strength Insights | Russian scholar: Japan's rising militarism has deep roots for long time China Q&A | How will China advance people-centered sci-tech development during the 15th Five-Year Plan period? SCO Deputy Secretary-General:Tianjin Summit sets direction for next decade HKSAR security chief comments on conviction of Jimmy Lai Insights | Former Belarusian Deputy PM: China's development path ensures capital serves the people ${new_video_hd2} ${new_video_hd3} LINE Media partners: People's Daily | Xinhua | CGTN | China Daily Back to top About Us | Jobs | Contact Us | Privacy Policy Copyright ©1999-2025 Chinanews.com. All rights reserved. Reproduction in whole or in part without permission is prohibited. [ 网上传播视听节目许可证(0106168) ] [ 京ICP证040655号 ] [ 京公网安备 11010202009201号 ] [ 京ICP备05004340号-1 ] --> -->
2026-01-13T09:29:32
https://issues.jenkins.io/secure/EditIssue!default.jspa?id={0}&returnUrl=/secure/issues#main
Error - Jenkins Jira Log in Skip to main content Skip to sidebar Dashboards Projects Issues Give feedback to Atlassian Help Keyboard Shortcuts About Jira Jira Credits Log In 📢 Jenkins core issues have been migrated to GitHub , no new core issues can be created in Jira Error The issue no longer exists. Atlassian Jira Project Management Software About Jira Report a problem Powered by a free Atlassian Jira open source license for The Linux Foundation. Try Jira - bug tracking software for your team. Atlassian
2026-01-13T09:29:32
https://www.chinadaily.com.cn/a/202512/15/WS69400847a310d6866eb2ebe3.html
Chongqing hosts Silver Age fashion model competition - Chinadaily.com.cn Search HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL WATCHTHIS SPORTS OPINION REGIONAL FORUM NEWSPAPER MOBILE Home China Society Home / China / Society Chongqing hosts Silver Age fashion model competition By Deng Rui and Tan Yingzi in Chongqing | chinadaily.com.cn | Updated: 2025-12-15 21:08 Share Share - WeChat --> CLOSE In a celebration of style and age, the Silver Age Fashion Model Competition (Group Category) concluded on Friday in Nan'an district, Southwest China's Chongqing, after captivating live and online audiences with their runway walks and thoughtfully choreographed performances. [Photo provided to chinadaily.com.cn] In a celebration of style and age, the Silver Age Fashion Model Competition (Group Category) concluded on Friday in Nan'an district, Southwest China's Chongqing, after captivating live and online audiences with their runway walks and thoughtfully choreographed performances. According to Mao Yuanyuan, founder of the competition, the event brought together 25 senior model teams from community and senior groups across the municipality, with 18 teams making it to the finals. The participants, whose average age exceeded 60, showcased a diverse range of styles, including traditional Chinese attire, trendy outfits, and creative costumes. "Our elderly friends are enjoying increasingly rich and high-quality lives in their later years," said Jian Daisheng, chairman of the Nan'an Elderly Care Association. "This public welfare competition is one of our key initiatives to establish a cultural platform for the elderly, broaden their social opportunities, and invigorate their community." The term "Silver Age" typically refers to individuals aged 60 and above, particularly those involved in social volunteer activities like the Silver Age Action programs. This age range generally spans from 55 to 70 and represents an influential force in the context of policy. The age range is sometimes adjusted depending on the specific area of participation. According to the Chongqing Civil Affairs Bureau, by the end of 2024, the municipality had approximately 8.01 million seniors aged 60 and above, accounting for 25.11 percent of the population. That number is 3.11 percentage points higher than the national average.   --> 1 2 3 4 5 6 7 Next    >>| --> 1/7 Next Photo Symphony of life in Yellow River Delta Workers build giant snowman in Heilongjiang Watch it again: SCIO briefing on national economic performance of November Breathing new life into lakes Zhejiang banks bet big on high-tech drivers Thrills designed for 'wimps' make giant leap in tourism --> --> Top BACK TO THE TOP English 中文 HOME CHINA WORLD BUSINESS LIFESTYLE CULTURE TRAVEL VIDEO SPORTS OPINION REGIONAL NEWSPAPER China Daily PDF China Daily E-paper MOBILE Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. Note: Browsers with 1024*768 or higher resolution are suggested for this site. License for publishing multimedia online 0108263 Registration Number: 130349 About China Daily Advertise on Site Contact Us Job Offer Expat Employment FOLLOW US Copyright 1994 - . All rights reserved. The content (including but not limited to text, photo, multimedia information, etc) published in this site belongs to China Daily Information Co (CDIC). Without written authorization from CDIC, such content shall not be republished or used in any form. -->
2026-01-13T09:29:32
https://chromewebstore.google.com/detail/category/detail/volume-master/top-charts/detail/ad-block-wonder/
Chrome Web Store Skip to main content Chrome Web Store My extensions & themes Developer Dashboard Give feedback Sign in Discover Extensions Themes Welcome to Chrome Web Store Welcome to the Chrome Web Store Supercharge your browser with extensions and themes for Chrome See collection Favorites of 2025 Discover the standout AI extensions that made our year See collection Every day is Earth Day Plant trees, shop sustainably, and more See collection Adobe Photoshop Easily remove backgrounds, adjust colors and more. Plus, get 6 months free access to Photoshop web. 3.7 600K Users See details The future of writing Elevate your writing and create engaging and high-quality content effortlessly See collection 1 / 5 Top categories Shopping Entertainment Tools Art & Design Accessibility Top charts Trending Kami for Google Chrome™ Education 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. BetterCampus (prev. BetterCanvas) Education 4.9 Average rating 4.9 out of 5 stars. Learn more about results and reviews. Read&Write for Google Chrome™ Accessibility 3.4 Average rating 3.4 out of 5 stars. Learn more about results and reviews. See more Popular Volume Master Accessibility 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Free VPN for Chrome - VPN Proxy VeePN Workflow & Planning 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. AdBlock — block ads across the web Workflow & Planning 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. See more New and notable Ad Block Wonder Privacy & Security 4.3 Average rating 4.3 out of 5 stars. Learn more about results and reviews. Smart popup blocker Tools 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Manus AI Browser Operator Tools 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. See more Editors' Picks for you Handpicked by Chrome Editors See collection Extend your browser See more Discover a new level of convenience and customization with side panel extensions Chat with all AI models (Gemini, Claude, DeepSeek…) & AI Agents | AITOPIA 4.9 Average rating 4.9 out of 5 stars. Learn more about results and reviews. AI Agent Marketplace & AI Sidebar with all AI models (Gemini, Claude, DeepSeek & more) and hundreds of AI Agents Adobe Photoshop 3.7 Average rating 3.7 out of 5 stars. Learn more about results and reviews. Easily remove backgrounds, adjust colors and more. Plus, get 6 months free access to Photoshop web. BrowserGPT: ChatGPT Anywhere Powered by GPT 4 4.4 Average rating 4.4 out of 5 stars. Learn more about results and reviews. Write, reword, and translate 8x faster. Reply to emails in a click. Works on Google Docs, Gmail, YouTube, Twitter, Instagram, etc. Sidebar: ChatGPT, Bookmarks, GPT-4o | Meomni 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Ultimate Sidebar ChatGPT Assistant, Bookmarks with AI, Calendar and Tasks Fleeting Notes 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Quick notes from the browser to Obsidian Eclipse your screen Dim the lights with our dark mode selections See collection Chrome monthly spotlight Promising extensions to try out Web Highlights: PDF & Web Highlighter + Notes & AI Summary Productivity Highlighter & Annotation Tool for Websites & PDFs with AI Summary - free, easy to use, no sign-up required. Moonlight: AI Colleague for Research Papers Everything you need to read a paper: explanation, summary, translation, chat, and reference search. Reboost - Track Water Intake and Set Reminders Track your water intake and set custom reminders. Stay hydrated, stay on track, and never miss a break! ✨ YouTube Notes to Notion with Udemy, Coursera, BiliBili and more by Snipo Take YouTube notes directly to Notion, generate AI flashcards, capture screenshots, and sync learning courses with Notion Works with Gmail See more Boost your email productivity Boomerang for Gmail 4.2 Average rating 4.2 out of 5 stars. Learn more about results and reviews. Meeting scheduling and email management tool trusted by millions. Schedule meetings, track responses, send later, and more. Checker Plus for Gmail™ 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Get notifications, read, listen to or delete emails without opening Gmail and easily manage multiple accounts. Email Tracker by Mailtrack® 4.4 Average rating 4.4 out of 5 stars. Learn more about results and reviews. Free, unlimited email tracker for Gmail, trusted by millions. Accurate, reliable, GDPR-compliant, and Google-audited. Streak CRM for Gmail 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Manage sales and customer relationships directly inside Gmail. GMass: Powerful mail merge for Gmail 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. A powerful mass email and mail merge system for Gmail. Just for fun Bring some joy to your browser See collection Learn a new language See more Study while you browse Google Translate 4.2 Average rating 4.2 out of 5 stars. Learn more about results and reviews. View translations easily as you browse the web. By the Google Translate team. Rememberry - Translate and Memorize with Flashcards 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Translate words while browsing and turn them into spaced repetition flashcards to build foreign language vocabulary. DeepL: translate and write with AI 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Translate while you read and write with DeepL Translate, the world’s most accurate translator. Relingo - Master vocabulary while browsing websites and watching YouTube 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Relingo extract words, full-text immersive translation while browsing. Also supports bilingual subtitles for Youtube, Netflix, etc. Readlang Web Reader 4.3 Average rating 4.3 out of 5 stars. Learn more about results and reviews. Read websites in the language you're learning, translate words you don't know, and we'll create flashcards to help you remember. Game on See more Beat boredom with bite-sized games in your browser BattleTabs 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Multiplayer Battles in your New Tab Tiny Tycoon 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Build a tiny tycoon on a tiny planet. Boxel 3D 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Boxel 3D is a speedrunning game packed with challenging levels, custom skins, online multiplayer, and a creative level editor. Ice Dodo 4.6 Average rating 4.6 out of 5 stars. Learn more about results and reviews. Play 3D game easily by clicking the little icon at the top right corner of your browser. Boxel Golf 4.7 Average rating 4.7 out of 5 stars. Learn more about results and reviews. Boxel Golf is a multiplayer golf game packed with challenging courses, custom hats, and a powerful level builder. Work smarter, not harder with AI Automate tasks and stay focused and organized with AI-powered productivity extensions See collection For music lovers See more Equalizers, radios, playlists, and more Volume Master 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Up to 600% volume boost Music Mode for YouTube™ 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Hides the video and thumbnails on YouTube. Blocks the video keeping only the audio on YouTube Music. Smart Mute 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Listen to audio one tab at a time. Modest Guitar | Columns for Ultimate-Guitar 4.8 Average rating 4.8 out of 5 stars. Learn more about results and reviews. Multiple columns and fullscreen for Ultimate-Guitar tabs Chrome Piano 4.5 Average rating 4.5 out of 5 stars. Learn more about results and reviews. Play the piano in your browser Google apps About Chrome Web Store Developer Dashboard Privacy Policy Terms of Service Help
2026-01-13T09:29:32