Recent Posts
-
What is consistency hash and what problems are usually used to solve?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
How to call a third-party API to upload pictures.
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
ThreadLocal source code analysis – java8
1. Characteristic analysis Threadlocalhashcode describes a custom hash value (valid only in threadlocalmaps), which el…… -
quartz。
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Simple use of RMI
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
HTTP protocol
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
What is SOA? What is SCA? What is micro service?
This is the front-end small class of the Xiuzhen Academy. Each shared article is from [background introduction] [knowl…… -
What is the anemia model and what is the congestion model? Why do we force the use of anemia models?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Simple use of zookeeper
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
How to write false data?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
What is the HTTP protocol? What is the difference between get and post requests? There are several content types for HTTP requests. What is the difference? What scenario is HTTP suitable for? What are the HTTP status codes?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Implementing comparator interface in HashMap sorting in Java
1. By observing collections The source code of sort() is as follows: -
Java map traversal mode and performance test
Transferred from: For the traversal of map in Java, many articles recommend using entryset, which is much more effi…… -
Brief introduction to TCP / IP
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
-
Difference between shift right operator > > and > > >
Transferred from: nofollow "> http://blog.csdn.net/maggiemiaomiao/article/details/49763649 1. > > > is an…… -
Briefly describe the direction of this in JS
This is the front-end small class of the Xiuzhen Academy. Each shared article is from [background introduction] [knowl…… -
What is session? What is a cookie? What is the difference between session and cookie? What scenarios apply to sessions? What scenarios apply to cookies?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Selection of Java collections
Which set should we use when using sets? The details still depend on the requirements. Of course, there are not only t…… -
Convert array to ArrayList in Java
list=new ArrayList<>(Arrays.asList(strs))。 list=Arrays. asList(strs); (adsbygoogle = window.a…… -
Mybatis common tags and dynamic queries
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Effective Java reading notes
< H3 id = "1 static factory method" > 1 Static factory method There are three ways: set the constructor method t…… -
Common application scenarios of singleton mode
Singleton, also known as singleton, is the simplest of design patterns. Even some pattern masters do not call it a pa…… -
The difference between string, StringBuilder and StringBuffer
< span style="font-size:14px;"> I recently learned about StringBuffer. I have many questions in my mind. I sear…… -
Analysis of hashtable source code of Java collection
summary Hashtable is also implemented based on hash table, which is similar to map, but hashtable is thread safe, and …… -
Java internal class Usage Summary
Reprint address: nofollow "> http://android.blog.51cto.com/268543/384844/ < div style = "color: rgb (44,44,44); …… -
HashMap obtains all keys and values respectively
I can't remember. I have to record it myself this time. I'll check it if I encounter it. It's a waste of time Although…… -
Analysis of HashSet source code of Java collection
summary HashSet is implemented based on HashMap. The bottom layer uses the key of HashMap to save data, so that the el…… -
Validation parameter verification
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an……