Because I changed int to Integer, I was dismissed the next day
This article is excerpted from the Flyweight Pattern of "design patterns should be learned in this way"
1 story background
Because a programmer changed a method parameter in the production environment and changed the int type to Integer type, because money was involved, the company suffered heavy losses and the programmer was dism ...
Posted by foxy69 on Mon, 01 Nov 2021 18:55:16 -0700
High frequency interview question: a picture to thoroughly understand Spring circular dependency
home pagespecial columnjavaArticle details0High frequency interview question: a picture to thoroughly understand Spring circular dependencyJava general Published 10 minutes ago1 what is circular dependency?As shown in the figure below:BeanA class depends on BeanB class, and BeanB class depends on BeanA class. This dependency forms a closed loop ...
Posted by Singularity on Fri, 29 Oct 2021 23:17:32 -0700
Distributed system architecture - explanation of basic code iunknown.c of samgr/source system service development framework
Overview of this article
Based on IUnknown, we can develop external interfaces of services or functions. The essence of interface implementation is the conduction of function address and function call. Therefore, IUnknown is particularly important in the basic code of M-core and A-core system service development framework. A component publ ...
Posted by riffy on Fri, 29 Oct 2021 20:28:01 -0700
A diagram to thoroughly understand the Spring circular dependency
1 what is circular dependency?
As shown in the figure below:
BeanA class depends on BeanB class, and BeanB class depends on BeanA class. This dependency forms a closed loop, which we call circular dependency. Similarly, see the following figure:
In the above figure, BeanA class depends on BeanB class, BeanB class depends on BeanC class, and B ...
Posted by Johntron on Fri, 29 Oct 2021 00:07:41 -0700
Analyze java assembly instructions through javap command
1, javap command Brief
javap is the jdk's own anti parsing tool. Its function is to inverse parse the code area (assembly instruction), local variable table, exception table, code line offset mapping table, constant pool and other information corresponding to the current class according to the class bytecode file. Of course, some of these info ...
Posted by nick_whitmarsh on Thu, 28 Oct 2021 22:29:38 -0700
Detailed explanation of Java docking with wechat public platform
1. Overview of public platform
1.1 overview of public platform
The official account of official account is the platform for operators to provide information and services to WeChat users through the official account. The platform of public platform development is the foundation of providing services. After creating public numbers and obtai ...
Posted by sashi34u on Thu, 28 Oct 2021 04:11:23 -0700
Chapter VIII software package management
1. Software operation and compilation
1.1 software related concepts
1.1.1 ABI
ABI : Application Binary Interface
Windows is incompatible with Linux
ELF(Executable and Linkable Format)PE(Portable Executable)
Library level virtualization:
Linux: WINEWindows: Cygwin
1.1.2 API
API is the Application Programming Interface. API can be implem ...
Posted by webguy262 on Thu, 28 Oct 2021 03:10:41 -0700
JVM interview question series: two objects have the same value (x.equals(y) == true), but may hashcodes be different?
Interviewer's investigation point
This question is still to investigate the basic knowledge at the JVM level. The interviewer believes that only with solid basic skills can we write code with high robustness and stability.
Technical knowledge involved
(x.equals(y)==true). This code looks very simple, but it actually involves some underlying ...
Posted by keefe007 on Tue, 26 Oct 2021 23:30:32 -0700
redis principle 3: High Availability Cluster
1. Comparison of Redis cluster schemes
Sentinel mode
Before redis 3.0, the cluster is usually implemented by using sentinel tool to monitor the status of the master node. If the master node is abnormal, it will make a master-slave switch. Taking a slave as the master, the sentinel configuration is slightly complex, and the perfo ...
Posted by epukinsk on Mon, 25 Oct 2021 21:31:04 -0700
k8s replicaset controller analysis - core processing logic analysis
replicaset controller analysis
Introduction to replicaset controller
Replicaset controller is one of many controllers in Kube controller manager component. It is the controller of replicaset resource object. It monitors replicaset and pod resources. When these two resources change, it will trigger the replicaset controller to tune the corresp ...
Posted by glueater on Sun, 24 Oct 2021 15:08:03 -0700