Using JDBC to connect database and write routine
1. Introduction to JDBC
jdbc(Java DataBase Connectivity)
Developed on the basis of Odbc of C language, it is the earliest ORM (Object Relation Mapping) tool, which can use object-oriented Java code Operate on relational database. With the continuous development of ORM tools, many frameworks have been derived. Most of them are develope ...
Posted by xcasio on Sat, 05 Mar 2022 08:53:26 +0100
MyBatisPlus study notes < 1 >
Opening summary:
When I learned mybatis plus, I did find that the development efficiency is much more convenient, but I still have to learn on the basis of mybatis. It doesn't mean that learning mybatis plus discards mybatis. The foundation is very important.
Performance:
No invasion: it is only enhanced without change, and its introduction ...
Posted by jodie on Sat, 05 Mar 2022 07:42:11 +0100
Microservice notes 03
01. Nacos
1. Introduction
It is said that Nacos has more than 100000 instances running inside Alibaba, which has passed the test of various large traffic such as double 11
C: Consistency: all nodes see the same data at the same time
A: Availability: all requests receive a response
P: Partition tolerance:
CPA theory ...
Posted by Plug-in on Sat, 05 Mar 2022 06:50:51 +0100
Java learning notes
**[JAVA] learning notes * * (12.04)
Code execution process
The development cycle of Java program includes compilation, download, interpretation and execution. 1. Write java code first. 2. Compile and compile Java code into bytecode (. class file). 3. Bytecode is loaded into memory. 4. Entering the virtual machine is executed by the interpr ...
Posted by taya on Sat, 05 Mar 2022 06:38:53 +0100
Netty Source Analysis 3: Create a simple Netty service and test it
Create and start a Netty server
How do I create and start a Netty server? Start a netty server and listen on port 8888 with the following code.
public class MyNettyServer {
private static Logger logger = LogManager.getLogger(MyNettyServer.class);
public static void main(String[] args) throws InterruptedException {
NioEven ...
Posted by 1josh13 on Sat, 05 Mar 2022 06:14:11 +0100
CH6 content provider
target
Master the creation method of content providers and be able to create content providers independentlyMaster the steps of using content providers to access other applications, and be able to read the mobile phone address bookMaster the use of content observers, and be able to use content observers to observe the data changes of other ...
Posted by pspeakman on Sat, 05 Mar 2022 06:06:20 +0100
Redis distributed lock Analysis & source code analysis
summary
Distributed locking has always been a topic that needs to be focused after the emergence of distributed systems. When it comes to distributed systems, we have to think of distributed locks and distributed transactions. In the past single application scenarios, using the built-in lock of jvm can solve the thread safety problem, but ...
Posted by frans-jan on Sat, 05 Mar 2022 05:54:46 +0100
MySql connection query - internal connection and external connection
introduction
In actual business development, data interaction between multiple tables is often involved. At this time, single table query can no longer meet complex business requirements, so multi table connection query is needed;
Connection query is mainly divided into the following three types:
Inner connection
Equivalent connectionNon ...
Posted by chipev on Sat, 05 Mar 2022 05:34:47 +0100
Java learning notes -- operators and control statements
1, Operator
1.1.1 overview of operators
Operator refers to the operation of operands.
1.1.2 arithmetic operators
public class Test02 {
public static void main(String[] args) {
//Arithmetic operator
//Addition, subtraction, multiplication and division
int a = 10;
int b = 3;
System.out.println(a + ...
Posted by DaveSamuel on Sat, 05 Mar 2022 05:19:07 +0100
[JAVA deserialization beginner] DNSLOG deserialization chain analysis
1. Application of dnslog chain 2. Use idea and ysoserial for debugging 3. Analyze the payload of ysosecial
Application of DNSLOG chain
Dnslog chain can only be used to prove the entry of deserialization and judge whether the target can go out of the network. Dnslog is used to judge the existence of deserialization vulnerability and whether th ...
Posted by snoopgreen on Sat, 05 Mar 2022 05:07:00 +0100