I believe you have a general impression on the theory and practice of the JVM through the previous several lessons. This lesson will focus on the troubleshooting and optimization of the JVM, so as to have a complete understanding of the knowledge points of the JVM, so that it can be better applied to th ...
Posted on Tue, 23 Jun 2020 04:31:08 -0400 by Jewbilee
Regular expressions define patterns for strings that can be used to search, edit, or process text.
1, Regular basic knowledge points
Metacharacters are one of the basic elements in constructing regular expressions.
Several commonly used metacharacters:
Posted on Tue, 23 Jun 2020 04:02:40 -0400 by jeanne
Write before: Blogger is a rebel who pursues freedom after 80's standard of devoting himself to education and training. His nickname comes from Su Shi's "the height is too cold" in "the head of the tune of water". He always reminds himself to stand the loneliness and suffer the loneliness. On the road of technology, he is ...
Posted on Tue, 23 Jun 2020 03:37:21 -0400 by Fribbles
What I bring you today is the basic knowledge of Java, including the basic syntax of Java, such as Java, variables, constants, data types, operators, various selection structures, loop structures, arrays, etc!!! The content and steps are super detailed, with source code of various cases (you can directly use O(∩)_ ∩)O~)!!! After readin ...
Posted on Tue, 23 Jun 2020 00:58:05 -0400 by toms
The previous article, "advanced learning of Fabric 2.0 - image deployment network (2)", introduced how to use the script provided by Fabric sample byfn.sh To start the first network. In order to understand the startup process of Fabric network, this section completes the custom startup of Fabric through binary executable program.
In t ...
Posted on Mon, 22 Jun 2020 23:20:12 -0400 by jgp4
Protocol resolution is essential in daily network development. Although length-based, delimiter-based codecs are built into Netty, in most scenarios we use custom protocols, so Netty provides MessageToByteEncoder<I> and ByteToMessageDecoder Two abstract classes that encode and decode private protocols by inheriting overrides of their enco ...
Posted on Mon, 22 Jun 2020 22:05:16 -0400 by jalapena
Previously, no tools were used for development.Development is cumbersome, start here and import the project into idea
Import projects into IDEA and develop
(1) Import Project
(2) Create a new src directory to facilitate the development of java code such as servlet s in t ...
Posted on Mon, 22 Jun 2020 21:30:57 -0400 by QWERTYtech
There is a cloud in the old saying:
Tao is the spirit of art, and art is the body of Tao; Tao is the rule of art, and art leads to Tao.
Among them, "Tao" refers to "law, truth and theory", and "technique" refers to "method, skill and technology" ...
Posted on Mon, 22 Jun 2020 02:05:39 -0400 by greenberry
The depth of Java lock
When multiple requests operate the database at the same time, first change the order status to paid, and add 200 to the amount, which will cause duplicate notifications under the concurrent scenario query condition.
Pessimistic lock and optimistic lock
Posted on Mon, 22 Jun 2020 01:44:27 -0400 by CantonWeb
This article has been included GitHub There are also real interview questions, interview strategies, efficient learning materials, etc
1, Implementation principle of container
In essence, container is a sandbox technology. It's like isolating an application in a box and making it work. Because of the box boundary, there is no interference b ...
Posted on Mon, 22 Jun 2020 00:38:31 -0400 by LearningKid