JUC and contract the source code. Read reetrantlock lock()
From the top level of the code, the default implementation of ReetrantLock is NonfairSync. The lock () method of NonfairSync is as follows, which is very simple
/**
* Performs lock. Try immediate barge, backing up to normal
* acquire on failure.
*/
final void lock() {
if (compareAnd ...
1, Background
The recent project involves the development of wechat official account for some reasons. Here is a brief record of the access of wechat official account.
2, Preconditions
1. You need a domain name that can be accessed on the Internet 2. For local development, you need to penetrate the Intranet environment to the Internet for acce ...
Posted by riversr54 on Sun, 01 May 2022 02:36:03 +0300
1. Overview of Spring
1.1 What is Spring
Spring is a JavaEE lightweight one-stop development framework.
Lightweight: Start the framework with a minimum amount of code, then choose the module you want to use based on your needs.
Heavyweight: Earlier EJB s, all modules of EBJ need to be introduced to develop a HelloWorld program
One-stop: All ...
Posted by Corin on Sat, 30 Apr 2022 20:46:45 +0300
The other day I installed some software with Homebrew - since it was a month ago, I can't remember what was installed. There was no problem immediately after installation, but after another two days, I restarted the computer and found that Emacs, which was also installed by Homebrew, could not be started. This can be troublesome, after all, I a ...
Posted by Techbot on Sat, 30 Apr 2022 08:19:14 +0300
If you have any questions or suggestions, welcome to communicate and collide in time. My official account is [Brain fried fish], GitHub address: https://github.com/eddycjy. Hello everyone, I am fried fish.Since the Go language has become popular in China, the second most sloppy thing is the way Go handles errors. A classic if err != nil code ca ...
Posted by PHPBewildered on Sat, 30 Apr 2022 06:44:17 +0300
Author | Eaton
Introduction | TARS provides a set of high-performance RPC communication framework to realize efficient communication between services. As the core technology of microservices, RPC supports the growing number of users and massive requests in the era of mobile Internet. In order to meet more requirements, TARS supports synchrono ...
Posted by satal keto on Fri, 29 Apr 2022 19:19:04 +0300
I this keyword introduction
Note: this knowledge point is only limited to the scope of my understanding
package com.study.java.oop;
Core point: "this is a pointer to the object itself"
Location of occurrence: can only be used in the method body of a method (and the method can only be a non static method in a class)
Never use in stati ...
Posted by wildcolour on Fri, 29 Apr 2022 14:33:04 +0300
Network programming
1. Basic concepts of network programming
1. What is computer network
The computers distributed in different geographical regions and special external equipment are interconnected by communication lines to form a large-scale and powerful network system, so that many computers can easily transfer information to each other ...
Posted by mhoard8110 on Fri, 29 Apr 2022 05:34:47 +0300
catalogue
1, Difference between filter and controller?
2, What is the relationship between the URL pattern of the filter and the controller?
3, What is the role of using wildcards in URL pattern when configuring filters?
4, The listener in this example is essentially monitoring what event in the container causes the change of what object? ...
Posted by blargalarg on Thu, 28 Apr 2022 18:45:33 +0300
preface
A previous article mentioned that incremental crawlers can use redis database for url de duplication. Today, bloggers will share with you how python uses redis for de duplication. In the experiment, we use redis database and hash algorithm. Let's learn about redis and hashlib first.
Introduction to Redis
Redis is completely open sour ...
Posted by rbudj on Thu, 28 Apr 2022 09:56:40 +0300