In depth analysis of concurrent.futures

Simulate a story, randomly find a few beautiful pictures from Baidu pictures, download them, save them locally, and download them in order first 1 sequential synchronous Download import random import time import requests urls = [ "https://t7.baidu.com/it/u=3676218341,3686214618&fm=193&f=GIF", "https://t7.baidu.com/it/u=3 ...

Posted by esfisher on Mon, 08 Nov 2021 10:08:04 -0800

springboot quick reference

springboot notes Reference from http://c.biancheng.net/spring_boot/ Parent project dependency management <!--SpringBoot Parent project dependency management,spring-boot-starter-parent Is all Spring Boot The parent dependency of the project, which is called Spring Boot The version arbitration center can uniformly manage some commo ...

Posted by xluminex on Mon, 08 Nov 2021 10:01:48 -0800

c + + factory mode

Before you get familiar with factory mode, you should first understand the six guidelines before writing c + + programs Opening and closing principle: do not modify existing codes, only add codes.Dependency Inversion Principle: use abstract classes instead of concrete classes to solve problems. (isolation change, package change)Richter substit ...

Posted by dessolator on Mon, 08 Nov 2021 08:15:28 -0800

mysql from getting started to deleting databases

Relatively speaking, the writing is fairly complete. Basically, that's all you can use in your work. A good brain is better than a bad pen. Stored procedures, stored functions, engines, transactions, scheduled tasks, triggers, variables and so on are included. You can collect those you are interested in! 1. Connect to mysql mysql is divide ...

Posted by david.brown on Mon, 08 Nov 2021 07:38:52 -0800

C + + Learning Day10 -- references, classes

Day1 Reference What is a reference A reference is a pointer. A reference is just a high-level modification based on correction to make the code easier to read. A reference is a reference to an existing variable. In other words, "reference variable" must refer to an existing variable. It is not a new variable itself. They do not rea ...

Posted by mandred on Mon, 08 Nov 2021 07:20:27 -0800

zookeeper client usage and clustering features

zookeeper Java client Project construction The official client of zookeeper is not separated from the server code. They are the same jar file, so we can directly introduce zookeeper maven. Please keep the version here consistent with the server version, otherwise there will be many compatibility problems <dependency> <groupI ...

Posted by jakep on Mon, 08 Nov 2021 04:47:28 -0800

Concurrent Programming Notes

Content overview What is multithreading, synchronous asynchronous concept, thread safety (synchronization between threads), communication between threads, JDK1.8 parallel contracting, thread pool principle analysis, lock 1. Thread: an execution path that does not interfere with each other. It is divided into user thread and daemon thread. ...

Posted by spaceknop on Mon, 08 Nov 2021 02:08:46 -0800

Linux multithreaded server programming notes-1

Thread safe object creation, callback and Deconstruction in C + +It is not difficult to write thread safe classes. You can use synchronization primitives to protect the internal stateMost STL classes are not thread safe and need to be locked externally to ensure simultaneous access by multiple threadsSecure object creationThe only requirement i ...

Posted by Rottingham on Mon, 08 Nov 2021 01:24:48 -0800

Love, this summary of Java Concurrent Programming technology is too detailed

preface Concurrent programming technology is an important knowledge point in Java. How much do you know about the following? Overview of process, thread and collaboration relationship Process: in essence, it is an independently executed program. Process is the basic concept of resource allocation and scheduling by the operating system. T ...

Posted by guarriman on Sun, 07 Nov 2021 23:42:17 -0800

Spring Boot implements code scanning login.

This way to achieve code scanning login is too sweet!!! If you need more tutorials, just scan the code on wechat           1, First you need a table Record who scanned the code. Who logged in. User_Token table The fields are as follows: uuid: used to ensure uniqueness userId: who logged in loginTime: login time createTime: the c ...

Posted by steviewdr on Sun, 07 Nov 2021 23:28:22 -0800