This article is mainly to comb the list of articles for everyone to browse

JVM Deep parsing

  • JVM built-in lock synchronized keyword, bias lock optimization in batch rebias and batch undo
  • JVM lock optimization and escape analysis in detail
  • An overview of several states of JVM built-in lock synchronized
  • There are four reference types in the JVM
  • JVM tricolor notation and read/write barriers
  • JVM actual combat OutOfMemoryError
  • What garbage collection algorithms does the JVM have?
  • How is JVM runtime heap memory generational?
  • JVM three constant pools
  • JVM garbage collection algorithms and garbage collectors
  • JVM bytecode instruction parsing
  • The JVM memory allocation mechanism, enough!
  • JVM memory model
  • JVM class loader mechanism
  • JVM class loading subsystem and SPI in detail
  • JVM class loading mechanism
  • ZGC garbage collector details
  • Garbage – First steps
  • Openjdk 1.8 source code to add Chinese annotations
  • Openjdk 1.8 source code compilation
  • Java thread source code analysis based on Hotspot
  • Java object disclosure based on Hostpot VIRTUAL machine

MySQL > alter database

  • MySQL index optimization practice (2)
  • MySQL index optimization practices
  • MySQL Index Practice
  • MySQL execution plan (explain) use details
  • MySQL update operation case Analysis
  • MySQL JOIN query
  • MySQL primary/secondary replication
  • MySql locking mechanism
  • This section describes the MySQL logical architecture
  • MySQL indexes and underlying data structures and algorithms
  • Using MySQL as an example, let’s talk about index creation principles and execution plan analysis.
  • MySQL lock and transaction isolation levels

Spring In-depth parsing

  • Spring Aop common annotations and execution order
  • Spring loops rely on parsing
  • Spring Boot 3.x quick experience
  • Spring Boot custom component practices
  • Spring core concepts and usage tips
  • Spring Boot integrates Kafka
  • Spring MVC interceptor
  • Spring source code parsing | message conversion
  • Spring source code analysis | Spring MVC combat
  • Spring transaction (2)
  • Spring transaction (a)
  • Spring source code analysis | Spring MVC principle
  • Spring source code analysis | Aop source implementation (two)
  • Aop source code implementation (a)
  • Spring source code parsing | populateBean property to fill
  • Refresh ()
  • Spring source code parsing | core functionality
  • Spring source code parsing | 5.3 x source code to compile
  • Spring source code parsing | type conversion
  • Sentinel Implementation of Spring-Gateway Traffic Limiting
  • The Spring Cloud Gateway is used
  • Spring Cloud Eureka source code analysis
  • Spring MVC message converter
  • Spring FAQ
  • Spring transactions
  • Spring integration MyBatis
  • Spring Aop,
  • Spring loop dependencies
  • Spring property padding
  • The life cycle of Spring beans
  • Spring Startup Process

#Redis source code design

  • Redis Source analysis Set object (Z_set)
  • Redis source code analysis of the hash object (z_hash)
  • Redis source code analysis list object (z_list)
  • Redis source code analysis string object (z_string)
  • Redis Source Code Analysis Object (redisObject)
  • Redis source code analysis ziplist (ziplist)
  • Redis source code analysis integer set (intSet)
  • Redis source code analysis skiplist
  • Redis Source Code Analysis Dict
  • Redis Source Code Analysis List
  • Redis Source Code Analysis simple String (SDS)
  • Redis cache elimination strategy
  • Redis distributed lock
  • Five basic types in Redis
  • Redis distributed lock
  • What are the Redis cache elimination strategies?
  • Redis data type supplement
  • Redis core data structures and applications

JUC Java concurrent programming

  • AQS processing process and use
  • AQS principle and ReentrantLock source code
  • Explanation of the volatile keyword
  • ReentrantLock principle analysis
  • LockSupport principle analysis
  • AbstractQueuedSynchronizer principle resolution
  • Brief analysis of Fork/Join basic concept and actual practice
  • Design and optimization of HashMap
  • How do I set the Java thread pool size?
  • Several ways to create Java threads
  • CountDownLatch source code analysis
  • Java random number generation principle and ThreadLocalRandom details
  • Semaphore source code analysis
  • LockSupport and park, unpark method source code analysis
  • Learning JMM instruction reorder, let me understand how to write singleton pattern
  • Unsafe and Atomic
  • Priority queue and binary heap details
  • BlockingQueue explains the BlockingQueue
  • How to select an appropriate lock based on different business scenarios?
  • What is the cause and solution of TCP packet Sticking/unpacking?
  • How does JDK dynamic proxy differ from CGLIB?
  • What is readable code?

Thinking and Skills

  • What are microservices and why?
  • I’ll write 100 more articles on the Nuggets and tell you what I think.
  • MapStruct addresses Bean property copy performance issues
  • Are you still using if to determine if a parameter is in an enumeration range? I’ve used the notes.
  • Want a red envelope for Chinese New Year? Years ago, you put our red envelope system online!
  • Java mid-platform technology inventory, these technologies you do not know enough
  • Detailed explanation of responsibility chain model
  • Java paradigm basics
  • Design pattern | singleton pattern
  • With the story of chang ‘e Hou Yi, with everyone chat encryption decryption
  • TestNG + PowerMock unit tests
  • Design of rule executor in multi-conditional judgment scenarios
  • What if the code is too long? Try command mode

NIO

  • Path, Files, and AsychronousFileChannel in Java NIO
  • Pipe and FileLock in Java NIO
  • Java NIO Selector in detail
  • Java NIO Buffer details
  • Java NIO Channel details
  • Java NIO Overview (Channel, Buffer, Selector)

ElasticSearch

  • ELK log system deployment practice
  • ElasticSearch queries with Java API practices
  • Basic principles of ElasticSearch and group query
  • ElasticSearch cluster architecture and search in depth
  • ElasticSearch query practice
  • ElasticSearch describes ElasticSearch concepts and deployment

Kafka

  • Common Kafka operation commands
  • Kafka partition introduction
  • The core concept of Kafka in detail
  • Kafka core concept introduction

MyBatis

  • Log configuration in MyBatis
  • MyBatis uses the SQL statement builder
  • MyBatis uses Java API details
  • Mapper. XML file in MyBaits
  • MyBatis XML configuration file details
  • Application of MyBatis
  • MyBatis custom SQL interceptor

Docker

  • Docker – compose the installation
  • Docker Ovrlay2 driver introduction
  • Docker underlying storage structure
  • Common Docker commands
  • Docker installation steps

LeetCode

  • LeetCode Sum of four numbers
  • LeetCode A letter combination of a phone number
  • The sum of the three closest numbers in LeetCode
  • LeetCode Sum of three numbers
  • LeetCode the container that holds the most water
  • Total number of LeetCode combinations ⅱ
  • LeetCode concatenates substrings of all words
  • LRU algorithm practice
  • Data structures and algorithms | branch bound method

Nacos

  • Nacos configuration center source code analysis
  • Nacos service registry source code analysis
  • Nacos configures data persistence
  • Nacos Quick start
  • Query Nacos service instances using the Ribbon

Sentinel

  • Sentinel and common flow limiting algorithms
  • Sentinel flow control principle
  • Sentinel data is persisted to Nacos
  • Detailed explanation of Sentinel flow control rules
  • Use Sentinel to implement traffic limiting on the interface
  • Sentinel Quick Start
  • SPI mechanism in Dubbo

Zookeeper

  • Zookeeper distributed lock application
  • Zookeeper ZAB Consistency protocol
  • Zookeeper Leader election process

Support the author

Wechat Pay Transfer:

Your support will always be the biggest motivation for me to continue. Thank you very much!