Recent Posts
-
Java concurrent queues and containers
[Preface: it is one of the necessary skills for both big data practitioners and Java practitioners to master Java high…… -
Written test programming (I) | binary search and array correlation
Recently, a small buddy has to prepare some interview related articles in the background of the official account. Actu…… -
Written test programming (II) | analysis of 7 common sorting algorithms (with implementation code)
1. Quick sort (two implementation methods are given here) /**思路: * 1. 在数据集中,选择一个元素作为"基准(pivot)" …… -
For the memory leakage caused by development, the operation and maintenance team does not carry the pot in this way
A few days ago, the group arranged to be on duty and take turns to look after our services, mainly dealing with alarm …… -
Distributed transaction, consistency, transaction compensation, practice
1、 Design of transaction record compensation table 3、 Service compensation function Call the rest interface to trans…… -
From edit distance, BK tree to text error correction
There is a very important topic in search engines, which is text error correction. There are two main methods: one is …… -
Vs code remote, develop programs on the server and start a new development mode
I've been using idea to develop java programs. The headache is that my wife takes up too much memory. Laptops often ja…… -
Zookeeper (1) — start analysis
Starting from this article, I analyze the source code of an open source project from time to time, starting with the f…… -
Get the build log through the drone rest API
Drone is a cicd tool that provides a rest API. Let's briefly introduce how to use the API to obtain the build log. Get…… -
Spring data mongodb optimistic lock
Spring data provides an optimistic lock implementation for mongodb: The @Version annotation provides Syntax similar to…… -
Docker Client (another java docker client api)
The previous article mentioned docker Java. Here is another docker client library, docker client Version compatible Co…… -
Docker enables TLS for security configuration
Previously, I opened docker's 2375 remote API. Upon receiving the request from the company's security department, I ne…… -
Java static proxy and dynamic proxy
proxy pattern Static proxy According to the standard implementation method of agent mode: public interface API { …… -
Let’s create a code naming tool
Are you still struggling with code naming? So how to better name it? Is there a good tool to support our naming? After…… -
Docker Java API
docker-java Docker Java is the Java version API of docker The current implementation is based on Jersey 2 X, so classp…… -
Breakpoint continuation function of java video stream
The problem of video dragging in the browser needs to be solved in the project -
Explore spring data JPA in depth, from repository to specifications and querydsl
The data access layer, the so-called crud, is a required course for back-end programmers. Spring data JPA allows us to…… -
Two methods of dynamically configuring URL permissions by spring security
origin In standard RABC, permissions need to support dynamic configuration. Spring security specifies permissions in t…… -
Spring security architecture and source code analysis
Spring security mainly implements authentication (authentication, which are you?) and access control (access control, …… -
Give swagger a new skin knife4j integrated record
Swagger has a set of classic UI, but it is not very easy to use. I saw knife4j before, with beautiful interface and pe…… -
Introduction and use of skywalking, an open source APM system
introduce Skywalking was founded in 2015 and provides distributed tracking. From 5 X, the project evolved into a funct…… -
Latex formula online visual editor
Seek A recent demo needs to use the online editor of latex formula, which is generally similar from search engines htt…… -
From trie tree to double array trie tree
Trie tree principle Also known as word lookup tree, trie tree is a tree structure and a variant of hash tree. Its adva…… -
Complete collection of methods to access mongodb using spring — spring data mongodb query Guide
1. General Spring data mongodb is an artifact for the spring framework to access mongodb. It is very convenient to rea…… -
Spring boot web program static resources are placed outside the jar
The static directory of the spring boot program is in the resources / static directory by default. When it is packaged…… -
Xnginx – nginx cluster visual management tool
Before the nginx management of the team, the operation and maintenance students modified the configuration file every …… -
Docker + Jenkins continuous integration environment (1) use docker to build Jenkins + docker continuous integration environment
This article describes how to build a continuous integration environment based on docker image from scratch through Je…… -
Spring boot implements ultra lightweight gateway (reverse proxy and forwarding)
In our rest service, a middleware interface needs to be exposed to users, but it needs to be authenticated by the rest…… -
Solr vs. elasticsearch who is the king of open source search engine
At present, cloud computing and data are growing rapidly. Today's applications are producing data at the rate of Pb an…… -
Xnginx upgrade record
As mentioned in the previous blog post, the xnginx - nginx cluster visual management tool has been running stably afte…… -
Customize rainbow fart voice package using iFLYTEK TTS
rainbow-fart-tts After the rainbow fart plug-in is red, do you want to generate a defined voice package? This paper gi…… -
Docker swarm obtains the container information of the service
We can create services through docker service create, for example: docker service create --name MysqL MysqL:latest Af……