Arthas: an artifact for troubleshooting. It was brutally abused by MySQL in the first battle

I thought it might be a log problem, but there is no evidence to support it. The trace command can monitor the time consumption of each step, and can cooperate with the conditional expression to print a detailed log when the time consumption exceeds xx ms. Find a machine, enter a command, and then wait. When rt spikes appear again, the time-c ...

Posted by hr8886 on Sat, 18 Dec 2021 09:37:44 +0100

Tired of VMware, try a lighter virtual machine

When it comes to virtual machine tools, VMware is naturally the most familiar. It has many powerful functions. What I recognize most is that it is very convenient to modify the configuration of the virtual machine to make the virtual machine achieve its desired performance ~ ~ But VMware is really easy to use, but you have to pay! It's not che ...

Posted by utahcon on Sat, 18 Dec 2021 02:54:53 +0100

Have you considered performance in interface oriented programming?

Most of us will follow interface programming in normal development, which can facilitate the implementation of dependency injection, polymorphism and other small skills, but this is at the expense of performance in exchange for code flexibility. Everything has Yin and Yang. It depends on your application scenario. 1: Background 1. Reason Du ...

Posted by m00p4h on Fri, 17 Dec 2021 16:14:53 +0100

Teach you to use Python to download music in batches. You don't need to install a player, download it directly!

The songs we want to listen to are only available in specific music software, but we don't think it's too troublesome to download the software. It's easy to say that Python can implement it casually! We take Qiuqiu music as an example to do a function of searching and downloading music. Before we start, we recommend a place for communication. ...

Posted by deth4uall on Fri, 17 Dec 2021 15:56:25 +0100

Understand the memo mode of 23 design modes

Memo mode Reference [1] bugstack.cn/md/develop/... [2] c.biancheng.net/view/1397.h... [3] refactoringguru.cn/design-patt... [4] cmsblogs.com/article/140... [5] blog.csdn.net/lovelion What is memo mode? Memo mode is a behavior design mode, which allows saving and restoring the previous state of an object without exposing the implement ...

Posted by Klojum on Fri, 17 Dec 2021 07:17:48 +0100

Analysis on binary search of array

Note: all the following contents are from personal superficial understanding of the use of binary search, for personal reference only! Don't spray if you don't like it. Welcome to correct it! 1, The situations suitable for binary search are divided into two categories: 1. Obvious conditions: The array is ordered and clearly tells you that th ...

Posted by ted_chou12 on Thu, 16 Dec 2021 16:06:08 +0100

Python crawler's scripy framework Spider class

Spider What is it? Spider Is a basic class provided by scripy, and other basic classes contained in scripy (such as CrawlSpider )And custom spider s must inherit this class. Spider Is a class that defines how to crawl a website, including how to crawl and how to extract structured data from its web pages. The source code is as follows: The ...

Posted by rnewman on Thu, 16 Dec 2021 15:49:02 +0100

How to ensure thread safety in Java

1, Thread safety is embodied in three aspects 1. Atomicity: provides mutually exclusive access. Only one thread can operate on data at a time (atomic,synchronized); 2. Visibility: a thread's modification of main memory can be seen by other threads in time (synchronized,volatile); 3. Orderliness: one thread observes the execution order of ...

Posted by seddonym on Thu, 16 Dec 2021 06:36:14 +0100

Detailed explanation of Java reflection mechanism (from simple to deep, you don't know the super detailed JVM memory structure

``` Name of class: obj.SonClass private int getSonAge( ) private void setSonAge( int arg0, ) public void printSonMsg( ) private void setSonName( java.lang.String arg0, ) private java.lang.String getSonName( ) ``` 3, Accessing or manipulating private variables and methods of a class ================ In the above, we successfully ob ...

Posted by MiCR0 on Wed, 15 Dec 2021 20:40:04 +0100

Ali artifact, a move to locate the online Bug

background The company has a channel system, which is specially connected with three-party channels. There is no business logic. It mainly works on message conversion and parameter verification, which plays a connecting role. Recently, after optimizing the response time of the interface and the code, the time still can not meet the requiremen ...

Posted by numan82 on Wed, 15 Dec 2021 16:06:17 +0100