On August 28, a hashtag # Better Feed Little Sister # Chengdu Xiaotiantian went viral, as the video's answers on the topic "Chengdu's Most Neighborhood"...
Redis Distributed locks (this article) : Use the setnx command. Zookeeper distributed lock: The sequential temporary nodes of Zookeeper are used to implement distributed locks...
This is the 26th day of my participation in the August More Text Challenge. Thread Pool Overview In Android development, we often place a time-consuming...
Java programs are not run directly. Java compilers compile Java source programs into platform-independent bytecode files (class files), which are then interpreted and executed by...
Before introducing NIO, it is necessary to understand TCP protocol, because most applications currently operate on the application layer, resulting in a large number of...
XSS (Cross Site Scripting) is a common Web security vulnerability called XSS to avoid confusion with the word CSS(Cascading Style Sheets). It allows malicious code...
Development problem with the most popular means of screening system is to check the system log, ELK are generally used in the distributed environment to...
This article introduces you to the basics of Java -- collections framework. From this article, we begin the formal prelude to data structures. To understand...
This is the 6th issue of JavaGuide's "Java High Quality Open Source Project Recommendations". Each issue I will select five high quality Java open source...
Syntax sugar is a piece of computer data, specifically a syntax added to a programming language that has no effect on the language's functionality but...
In the previous article, we have analyzed the realization principle of AQS exclusive mode based on ReetrantLock and Condition realization principle. This chapter is prepared...
Lz this master 985, graduated when went to hangzhou some Internet factory, and then job-hopping to Beijing some Internet factory. Just a quick word about...
Overview Some projects may need to encrypt some properties in the configuration to prevent leakage, such as some password properties. In Java projects, the Jasypt...
A Collection is a Java container. It is located under the java.util package and consists of Collection(interface), Map(interface), and Collection utility classes.
Message queue (MQ) is an important component in distributed system. Message queue mainly solves the problems of application coupling, asynchronous processing and traffic cutting.
The original author of this article is my future colleague. On September 5, 2017, he received the offer of Java R&D engineer of NetEase Cross-border...
Background First, let's talk about B trees. Why use B trees? We need to understand the following two facts: [Fact 1] Different capacities of memory,...
As mentioned in the introduction of the previous article "Initial Java Virtual Machine", the Java code we wrote will generate the corresponding class bytecode files...
Alipay interface usage documentation alipay asynchronous notification (notify_URL) and return_URL. Now the notice that pays treasure has two kinds. A server notification, corresponding parameter is...
Java garbage collection plays an important role in the JVM. This article will briefly discuss the Java garbage collector, from the ancient Serial to the...