Java: extract the content in the xml file into entity and transfer it to the database

summary         In our daily work, we often encounter the need to extract the information in xml files and convert it into entity classes. Combined with our own work experience, we make the following summary, which is convenient for people and ourselves. Code example xml format: <?xml version="1.0" encoding="utf-8"?& ...

Posted by Bunkermaster on Fri, 22 Oct 2021 23:15:48 -0700

Want to thoroughly understand how large manufacturers achieve Redis high availability? It's enough to read this article

High Availability HA (High Availability) is one of the factors that must be considered in the architecture design of distributed systems. It usually refers to reducing the time when the system cannot provide services through design. Assuming that the system can always provide services, we say that the availability of the system is 100%. If the ...

Posted by Retired Bill on Fri, 22 Oct 2021 22:19:40 -0700

mybatis learning notes-04

1. Set log Logs can facilitate our troubleshooting. They are not enabled by default. They need to be set in the core configuration file. name and value should be consistent with the official documents! 1.1 default log <!--Set log default configuration--> <settings> <setting name="logImpl" value="STDOUT_LOGGING"/&gt ...

Posted by killerz on Fri, 22 Oct 2021 21:06:55 -0700

Submit the sql script file with Flink sql client

Title: submit sql script file with flynk sql client Date: twenty 21-10-22 22:11:34 Tag: [Flink, SQL client] Category: flink We know that sql-client.sh can provide us with an SQL interactive interface, so that we can see the execution results or interactive query table results without executing an SQL. In fact, we can also submit sql scripts t ...

Posted by Drannon on Fri, 22 Oct 2021 07:39:30 -0700

MySQL common constraints

preface When creating a table, you can add corresponding constraints to the fields of the table. The purpose of adding constraints is to ensure the legitimacy, validity and integrity of the data in the table. Common constraints nameexplainNon NULL constraint (not null)The field of the constraint cannot be NULLUnique constraintConstrained ...

Posted by sowmithrii on Fri, 22 Oct 2021 02:54:14 -0700

(super detailed) MySQL advanced - notes-01

MySQL advanced - Notes - 01 Video of this article: Dark horse MySQL advanced 1, MySQL architecture 1-1 overview of MySQL architecture The entire MySQL Server consists of the following components: Connection Pool: Connection Pool componentManagement services & Utilities: management services and tools componentsSQL interface: SQL i ...

Posted by GoncaloF on Wed, 20 Oct 2021 23:07:31 -0700

Neo4j - CQL use

Neo4j - CQL introduction Neo4j's Cypher language is built to process graphic data, and CQL stands for Cypher query language. Like Oracle database with query language SQL, neo4j has CQL as query language It is the query language of Neo4j graphics databaseIs a declarative pattern matching languageFollow SQL syntaxGrammar is a very simple, h ...

Posted by dyip on Wed, 20 Oct 2021 19:31:30 -0700

Principle and application of fuse Hystrix

preface         After migrating a single application to a distributed framework, it is likely to encounter such a problem: the system has only one control unit, which will call multiple computing units. If a computing unit (as a service provider) is unavailable, the control unit (as a service caller) will be blocked and eve ...

Posted by codygoodman on Tue, 19 Oct 2021 20:06:58 -0700

Take you to master java deserialization vulnerabilities and their detection

Absrtact: This paper will first introduce the principle of java deserialization vulnerability, and then introduce how security tools detect and scan such vulnerabilities. This article is shared from Huawei cloud community< java deserialization vulnerability and its detection >, author: alpha1e0. 1 Introduction to Java deserialization ...

Posted by DuNuNuBatman on Tue, 19 Oct 2021 18:22:07 -0700

Phoenix installation and use

Phoenix installation and use 1. Background introduction 1.1 Phoenix definition Phoenix is an open source SQL skin for HBase. You can use the standard JDBC API instead of the HBase client API to create tables, insert data, and query HBase data. 1.2 Phoenix features Easy integration: such as Spark, Hive, Pig, Flume and Map Reduce. Good per ...

Posted by epukinsk on Tue, 19 Oct 2021 12:40:48 -0700