Using JDBC to connect database and write routine

1. Introduction to JDBC jdbc(Java DataBase Connectivity) Developed on the basis of Odbc of C language, it is the earliest ORM (Object Relation Mapping) tool, which can use object-oriented Java code Operate on relational database. With the continuous development of ORM tools, many frameworks have been derived. Most of them are develope ...

Posted by xcasio on Sat, 05 Mar 2022 08:53:26 +0100

MyBatisPlus study notes < 1 >

Opening summary: When I learned mybatis plus, I did find that the development efficiency is much more convenient, but I still have to learn on the basis of mybatis. It doesn't mean that learning mybatis plus discards mybatis. The foundation is very important. Performance: No invasion: it is only enhanced without change, and its introduction ...

Posted by jodie on Sat, 05 Mar 2022 07:42:11 +0100

Microservice notes 03

01. Nacos 1. Introduction It is said that Nacos has more than 100000 instances running inside Alibaba, which has passed the test of various large traffic such as double 11 C: Consistency: all nodes see the same data at the same time A: Availability: all requests receive a response P: Partition tolerance: CPA theory ...

Posted by Plug-in on Sat, 05 Mar 2022 06:50:51 +0100

Java learning notes

**[JAVA] learning notes * * (12.04) Code execution process The development cycle of Java program includes compilation, download, interpretation and execution. 1. Write java code first. 2. Compile and compile Java code into bytecode (. class file). 3. Bytecode is loaded into memory. 4. Entering the virtual machine is executed by the interpr ...

Posted by taya on Sat, 05 Mar 2022 06:38:53 +0100

Netty Source Analysis 3: Create a simple Netty service and test it

Create and start a Netty server How do I create and start a Netty server? Start a netty server and listen on port 8888 with the following code. public class MyNettyServer { private static Logger logger = LogManager.getLogger(MyNettyServer.class); public static void main(String[] args) throws InterruptedException { NioEven ...

Posted by 1josh13 on Sat, 05 Mar 2022 06:14:11 +0100

CH6 content provider

target Master the creation method of content providers and be able to create content providers independentlyMaster the steps of using content providers to access other applications, and be able to read the mobile phone address bookMaster the use of content observers, and be able to use content observers to observe the data changes of other ...

Posted by pspeakman on Sat, 05 Mar 2022 06:06:20 +0100

Redis distributed lock Analysis & source code analysis

summary Distributed locking has always been a topic that needs to be focused after the emergence of distributed systems. When it comes to distributed systems, we have to think of distributed locks and distributed transactions. In the past single application scenarios, using the built-in lock of jvm can solve the thread safety problem, but ...

Posted by frans-jan on Sat, 05 Mar 2022 05:54:46 +0100

MySql connection query - internal connection and external connection

introduction In actual business development, data interaction between multiple tables is often involved. At this time, single table query can no longer meet complex business requirements, so multi table connection query is needed; Connection query is mainly divided into the following three types: Inner connection Equivalent connectionNon ...

Posted by chipev on Sat, 05 Mar 2022 05:34:47 +0100

Java learning notes -- operators and control statements

1, Operator 1.1.1 overview of operators Operator refers to the operation of operands. 1.1.2 arithmetic operators public class Test02 { public static void main(String[] args) { //Arithmetic operator //Addition, subtraction, multiplication and division int a = 10; int b = 3; System.out.println(a + ...

Posted by DaveSamuel on Sat, 05 Mar 2022 05:19:07 +0100

[JAVA deserialization beginner] DNSLOG deserialization chain analysis

1. Application of dnslog chain 2. Use idea and ysoserial for debugging 3. Analyze the payload of ysosecial Application of DNSLOG chain Dnslog chain can only be used to prove the entry of deserialization and judge whether the target can go out of the network. Dnslog is used to judge the existence of deserialization vulnerability and whether th ...

Posted by snoopgreen on Sat, 05 Mar 2022 05:07:00 +0100