26 - how does the production environment exclude and optimize the JVM?

I believe you have a general impression on the theory and practice of the JVM through the previous several lessons. This lesson will focus on the troubleshooting and optimization of the JVM, so as to have a complete understanding of the knowledge points of the JVM, so that it can be better applied to th ...

Posted on Tue, 23 Jun 2020 04:31:08 -0400 by Jewbilee

Full parsing of regular expressions

Regular expressions define patterns for strings that can be used to search, edit, or process text. 1, Regular basic knowledge points 1.1 metacharacter Metacharacters are one of the basic elements in constructing regular expressions. Several commonly used metacharacters: Metacharacter explain ...

Posted on Tue, 23 Jun 2020 04:02:40 -0400 by jeanne

[linux] learn operation and maintenance step by step - Basic chapter - file permission management

Write before: Blogger is a rebel who pursues freedom after 80's standard of devoting himself to education and training. His nickname comes from Su Shi's "the height is too cold" in "the head of the tune of water". He always reminds himself to stand the loneliness and suffer the loneliness. On the road of technology, he is ...

Posted on Tue, 23 Jun 2020 03:37:21 -0400 by Fribbles

Learn the basics of Java

What I bring you today is the basic knowledge of Java, including the basic syntax of Java, such as Java, variables, constants, data types, operators, various selection structures, loop structures, arrays, etc!!! The content and steps are super detailed, with source code of various cases (you can directly use O(∩)_ ∩)O~)!!! After readin ...

Posted on Tue, 23 Jun 2020 00:58:05 -0400 by toms

Fabric 2.0 advanced learning - custom network deployment

The previous article, "advanced learning of Fabric 2.0 - image deployment network (2)", introduced how to use the script provided by Fabric sample byfn.sh To start the first network. In order to understand the startup process of Fabric network, this section completes the custom startup of Fabric through binary executable program. In t ...

Posted on Mon, 22 Jun 2020 23:20:12 -0400 by jgp4

Custom Codec for Netty Source Analysis

Protocol resolution is essential in daily network development. Although length-based, delimiter-based codecs are built into Netty, in most scenarios we use custom protocols, so Netty provides MessageToByteEncoder<I> and ByteToMessageDecoder Two abstract classes that encode and decode private protocols by inheriting overrides of their enco ...

Posted on Mon, 22 Jun 2020 22:05:16 -0400 by jalapena

Servlet-related Technology

Servlet-related Technology Previously, no tools were used for development.Development is cumbersome, start here and import the project into idea Import projects into IDEA and develop (1) Import Project (2) Create a new src directory to facilitate the development of java code such as servlet s in t ...

Posted on Mon, 22 Jun 2020 21:30:57 -0400 by QWERTYtech

The way to simplify Java code

preface   There is a cloud in the old saying: Tao is the spirit of art, and art is the body of Tao; Tao is the rule of art, and art leads to Tao. Among them, "Tao" refers to "law, truth and theory", and "technique" refers to "method, skill and technology&quot ...

Posted on Mon, 22 Jun 2020 02:05:39 -0400 by greenberry

Concurrent programming: how to use locks in java?

The depth of Java lock When multiple requests operate the database at the same time, first change the order status to paid, and add 200 to the amount, which will cause duplicate notifications under the concurrent scenario query condition. SQL: Update Pessimistic lock and optimistic lock Pessimistic ...

Posted on Mon, 22 Jun 2020 01:44:27 -0400 by CantonWeb

How to do well in containerization management? Tencent architect's article takes you through the Docker principle

This article has been included GitHub There are also real interview questions, interview strategies, efficient learning materials, etc 1, Implementation principle of container In essence, container is a sandbox technology. It's like isolating an application in a box and making it work. Because of the box boundary, there is no interference b ...

Posted on Mon, 22 Jun 2020 00:38:31 -0400 by LearningKid