Recent Posts
-
Dynamic diagram demonstration: two implementation methods of hand rolling stack!
Before we start, let's talk with friends about our plans for the later stage. In the following articles, we plan to wr…… -
Station B true question: how to judge whether brackets are valid?
Today's question is not only the real question of BiliBili's written test this year, but also a classic interview ques…… -
Key value expiration in redis
1. Expiration setting There are four ways to set the expiration time in redis: Let's take a look at the specific imple…… -
Rabbitmq series (IV) rabbitmq transaction and confirm sender message confirmation – in depth interpretation
Rabbitmq transaction and confirm sender message acknowledgement - in depth interpretation Rabbitmq series introduction…… -
Six methods of file writing, this method has the best performance
There are only two ways to operate files in Java: character stream and byte stream, and there are many implementation …… -
Why do you recommend enumerations?
Enumeration is a new data type in JDK 1.5. Using enumeration, we can well describe some specific business scenarios, s…… -
Never initialize an instance with double curly braces, otherwise it will oom!
Embarrassment is everywhere in life. Sometimes you just want to pretend, but some "old comrades" always inadvertently …… -
Java improvement class (V) in-depth understanding of bio, NiO and AIO
Introduction: in this article, you will get: the performance difference between same / asynchronous + blocking / non b…… -
General directory of spring boot series
1、 Reasons for the birth of spring boot series At school, I mainly learned Java and Net two languages. At that time, …… -
New Java feature: can data types be thrown away?
A long time ago, when writing code, we should carefully consider the data types of variables, such as the following: H…… -
Java improvement class (IV) interview Essentials – data sets you don’t know
Introduction: does map not belong to a subset of the Java collection framework? Like a list, a queue belongs to one of…… -
Interview raids | how does redis query a key from massive data? Attached video
1. Review knowledge points The knowledge points investigated in this topic are as follows: 2 solution ideas 3 keys usa…… -
Xiaobai learning algorithm: the best time to buy and sell stocks!
Today, the ant group (Alipay) is officially listed. There is no doubt that this initiative has created a large number …… -
Spring boot (11) redis integration is installed from docker to distributed session sharing
1、 Introduction Redis is an open-source log type key value database written in ANSI C language, supporting network, m…… -
Spring boot (VI) integrates mybatis to operate MySQL 8
1、 Introduction 1.1 introduction to mybatis Mybatis is an excellent persistence layer framework, which supports custo…… -
Java improvement class (I) thread explanation
1、 Overview Before learning thread, let's first understand the relationship between threads and processes: From the a…… -
Detailed explanation of 505 interview questions in “full analysis of Java interview”
"Full analysis of Java interview" is an e-book I released in gitchat. The book has a total of 150000 words and 505 Jav…… -
Spring boot (x) logback and log4j2 integration and log development history
1、 Introduction There are many well-known logs in Java, such as Jul, log4j, JCL, slf4j, logback and log4j2. What is t…… -
There are 7 ways to create thread pool. It is strongly recommended that you use it
According to Moore's law, the number of transistors that can be accommodated on the integrated circuit doubles every 1…… -
Rabbitmq series (VI) complete solution of rabbitmq cluster architecture you don’t know
preface This paper will systematically introduce the characteristics, exception handling, construction and use of rabb…… -
99% of programmers are using Lombok. Is the principle so simple? I got one too| Recommended collection!!!
I believe most people are familiar with Lombok, but little is known about its implementation principle and disadvantag…… -
Six tough moves of current limiting, with detailed code and evaluation results
For the convenience of work, last year I rented out my house in the northern suburbs and moved to the southern suburbs…… -
Why does Ali recommend using longadder instead of volatile?
The above content has two key points: But words have no basis. Even if it is said by the lonely big man, we have to pr…… -
Spring boot (II) integrating JSP and production environment deployment
1、 Introduction One development scenario that I have to say about Java is web development, which is also one of the m…… -
Java improvement class (VI) reflection and dynamic proxy (JDK proxy and cglib)
1、 Reflection 1. Get class object 2. Common methods of class // 此段代码为公共代码 interface People { int parentA…… -
Summary of the most complete implementation methods of delayed tasks in history! Code attached (strongly recommended)
The birth of this article is thanks to a reader who gave this excellent article the opportunity to meet you. The focus…… -
Two implementation methods of linked list inversion, the latter beat 100% of users!
Linked list inversion is a very basic but very popular algorithm interview question. It has also appeared in question …… -
Rabbitmq series (III) introduction and practice of rabbitmq exchange
Introduction and practice of rabbitmq exchange switch Rabbitmq series Reading guide After we have the basic knowledge …… -
Ubuntu 18.04. 1 build Java environment and HelloWorld
1、 Build Java environment System environment 1. Download JDK Official website address: http://www.oracle.com/technetw…… -
Don’t ask me how many objects are created by the new string! Let me prove it to you!
I think all Java programmers have been troubled by this new string question. This is a high-frequency Java interview q…… -
Blood spitting finishing: 13 military regulations for redis performance optimization! The most complete in history
In this article, we will use the following methods to improve the running speed of redis: 1. Shorten the storage lengt…… -
Please, stop waiting and notify!
Condition is a thread communication method provided in JDK 1.5 to replace wait and notify. Then someone will ask: why ……