The core point of the collaboration is the use of the collaboration, that is, you only need to know how to use the collaboration; but if you want to know how to achieve the collaboration, you need to know the iterator, the generator in turn.
If you only want to see the use of the coordinator, you just need to look at the first part; i ...
Posted by Kitkat on Mon, 14 Oct 2019 23:48:58 -0700
Java Multithreading Series 7.
Let's talk about another feature of threads: daemon threads or user threads?
Let's first look at the annotations for the Thread.setDaemon() method, as shown below.
Marks this thread as either a daemon thread or a user thread.
The Java Virtual Machine exits when the only threads running are all daemon threads.
Posted by SpinCode on Mon, 14 Oct 2019 18:13:31 -0700
yum source configuration is often used in work, especially when installing databases, it is time-consuming to install dependency packages one by one, so it is enough to configure yum installation directly.
1. yum configuration instructions (reprinted in this section)
The configuration file for yum is divided into two parts: main and repositor ...
Posted by zimmo on Mon, 14 Oct 2019 17:46:04 -0700
In the last article, we introduced how to install and deploy traefik components through helm. Besides traefik, we also mentioned that the commonly used ingress controller s include Nginx, HAProxy, Kong and so on. In this article, we introduced how to install and deploy Nginx-ingress. Only after accumulating the experience of using d ...
Posted by nocontrol on Mon, 14 Oct 2019 05:33:36 -0700
1. Network Communication Protocol
Through computer network, many computers can be connected. The computers in the same network need to obey certain rules when connecting and communicating, which is just like the traffic rules when driving on the road. In computer networks, these rules of connection and communication are called network communi ...
Posted by tcsnguy08 on Mon, 14 Oct 2019 02:40:41 -0700
awk of shell three swordsmen
In Linux/UNIX system, awk is a powerful editing tool. It reads input text line by line, searches according to the specified matching mode, formats and outputs qualified content or filters it. It can realize quite complex text operation without interaction. It is widely used in Shell scripts to complete various aut ...
Posted by nick5449 on Sun, 13 Oct 2019 19:14:11 -0700
Project Host Configuration Based on Virtual Directory
In Tomcat, the default virtual directory is webapps, but for the project location, we can also set up Context to achieve, a Host can set up more than one Context;
<Host name="localhost" appBase="webapps" unpackWARs="true" autoDeploy="true" xm ...
Posted by Wldrumstcs on Sun, 13 Oct 2019 11:27:47 -0700
Addition of two numbers
Two non-empty linked lists are given to represent two non-negative integers. Among them, their respective digits are stored in reverse order, and each of their nodes can only store one digit.
If we add the two numbers together, we return a new list to represent their sum.
You can assume that neither of these numbers w ...
Posted by waygood on Sun, 13 Oct 2019 07:01:55 -0700
At present, a connection trace quintuple is the source destination IP, the transport layer protocol, and the source destination port. In multi-tenant environment, the private address network of tenants may overlap. If only one CT is distinguished by these five elements, it can not meet the needs of multi-tenants. So the conce ...
Posted by jlp09550 on Sat, 12 Oct 2019 07:05:49 -0700
The Java Collection Detailed Series is a new series that I am going to start after I have completed a series of blogs that consolidate the Java Foundation Chapter.
These articles will be sorted out into my Java Interview Guide warehouse on GitHub, and more exciting content can be found in my warehouse.
If y ...
Posted by littleelmo on Sat, 12 Oct 2019 05:32:19 -0700