In Java, the Object class is the parent class of all classes. There are several methods that need override, such as equals,hashCode and toString. Every time I write these methods, I have to make a lot of repetitive judgments. Many class libraries provide tool classes to override these methods, and Gu ...
Posted on Sun, 07 Jun 2020 03:34:59 -0700 by culprit
Tree structure is not new to everyone, but there are several trees that are really applied to the code - binary sorting tree, balanced binary tree, B tree, B + tree, red and black tree. Whether you know it or not, today, after reading this blog, you will plant it in front of your home.
Posted on Sun, 07 Jun 2020 01:31:13 -0700 by srikanthiv
Production message retry
Retry of production message may cause duplicate message
//Send timeout, default is 3000
//Retry times may cause message repetition
Posted on Fri, 05 Jun 2020 23:13:00 -0700 by kankohi
1, The definition of square tree
2, Construction of the square tree
3, Application of the square tree
[SDOI2018] strategy game
Brief int ...
Posted on Fri, 05 Jun 2020 21:39:22 -0700 by OnePlus
Play Redis - Introduction to Redis
Introduction to Redis
1. Overview of Redis
2. Redis usage scenarios
3. Basic Types
Four SpringBoot Integrated Redis
(1) Introducing dependencies
(2) yml configuration
(3) Injection Template starts
(4) Write Config classes
(5) Writing service classes
Posted on Thu, 04 Jun 2020 11:54:06 -0700 by ~J~R~R
Single line function -- PL/SQL
(1) Character function
Concatenate two strings, same as |
Change the first letter of the string to uppercase
Find the position of a string
Give the length of the string in characters
Posted on Sun, 31 May 2020 08:55:23 -0700 by rushenas
Indicates that the execution step returns at most one row of data. const usually appears in the equivalent query of the primary key or unique index, such as the equivalent query of the primary key id of the t table:It can be considered that it is as fast as a rocket to locate a record by comparing the equivalence between the primary key ...
Posted on Sun, 31 May 2020 08:54:20 -0700 by a.heresey
5.1 introduction to integer security: integers consist of natural numbers (0, 1, 2, 3,...) including 0 )And negative numbers of nonzero natural numbers (- 1, - 2, - 3 )Composition.
5.2 integer data type: integer type provides a model of a finite subset of integer mathematical sets. The value of an object of type integer is the mathematical val ...
Posted on Sat, 30 May 2020 19:10:07 -0700 by Stegs
At present, Kafka is mainly used as a distributed publish subscribe message system, and it is also one of the most popular message queuing systems. Therefore, more and more frameworks integrate Kafka, such as spring Kafka, which will be mentioned in this article.
Since Kafka is a message publishing and subscription system, ...
Posted on Sat, 30 May 2020 01:00:05 -0700 by foyer
This article focuses on how Redis-based distributed locking is implemented. It refers to a number of articles written by big guys and summarizes distributed locking.
Overview of Distributed Locks
In a multithreaded environment, in order to ensure that a block of code can only be accessed by one thread at a time, we can usua ...
Posted on Thu, 28 May 2020 17:50:56 -0700 by outsidaz