Spring boot 2. X Foundation: packaging applications as executable jars

Knowledge changes fate, rolling code makes me happy, and I will continue to swim in the open source industry in 2020 < br / > Take a look at what you like and get into the habit < br / > Give me a Star, Click to learn about the implementation solution of component-based interface service based on spring boot After the application ...

Posted by khanuja.sunpreet on Thu, 20 Feb 2020 00:12:35 -0800

Asynchronous thread pool usage specification

brief introduction spring The interface class of asynchronous thread pool, whose essence is Java.util.concurrent.Executor Spring has implemented exception thread pool: 1. SimpleAsyncTaskExecutor: it is not a real thread pool. This class does not reuse threads. Each call will create a new thread.   2. SyncTaskExecutor: this class does not ...

Posted by angel1987 on Wed, 19 Feb 2020 20:08:32 -0800

Python advanced: data visualization with Matplotlib

brief introduction When editing CSDN, the picture is easy to be missing. You can pay attention to "lazy programming" to get a better reading experience. Next, we use Matplotlib to visualize data. First, we continue to use Matplotlib to draw images. The official account can reply to data2 to ...

Posted by netman182 on Wed, 19 Feb 2020 18:53:39 -0800

[leetcode algorithm search insertion location]

1, Title Requirements Given a sort array and a target value, find the target value in the array and return its index. If the target value does not exist in the array, returns where it will be inserted sequentially. You can assume that there are no duplicate elements in the array. Example 1: Input: [1,3,5,6], 5 Output: 2 Example 2: Input: [ ...

Posted by jeny on Wed, 19 Feb 2020 10:31:42 -0800

stm32cubeMX learning 18. SD card virtual U disk experiment

This program is based on the operation environment of STM32F103ZET6. I had some losses before running this experiment. Let me come together! 1. After the software was written, it was found that there was no enumeration of USB after the USB cable was inserted and connected to the computer resolvent: ...

Posted by kokomo310 on Tue, 18 Feb 2020 05:20:57 -0800

Access control of critical area of rt'thread

I. WHY What is critical area and why do we need access control of critical area? First, let's look at wiki's definition of critical area: Synchronizing Program design Critical section refers to a program segment that accesses shared resources (such as shared devices or shared memory), which cannot ...

Posted by steve490 on Tue, 18 Feb 2020 00:36:47 -0800

EXCEL password clearing (password protection and cracking) - clever use of macro code

All of you have experienced the password setting in excel. After a long time, I thought I would never forget the password in my life. I really forgot it. The only thing we can do is crack, but all kinds of crack tools on the Internet are not reliable, all kinds of worries, we finally got up the cour ...

Posted by trent2800 on Tue, 18 Feb 2020 00:31:42 -0800

The implementation of kubernetes resource extension mechanism

Yesterday, we introduced the key components of resource plug-in mechanism in k8s. Today, we will continue to see how each component communicates and the key design behind event handling in k8s 1.PluginManager PluginManager is a top-level component, which contains the key components in the previous article, coordinates its internal data flow, an ...

Posted by Sillysoft on Mon, 17 Feb 2020 20:20:07 -0800

2. Monitor mode

When you click Download Sources in the IDEA, you will get an error and cannot download sources. To solve this problem, enter in Terminal mvn dependency:resolve -Dclassifier=sources Reference: https://www.cnblogs.com/wwjj4811/p/10364580.html When the system runs to some key nodes, it will broadcast some events, and there are some listeners in ...

Posted by Develop_Sake on Sun, 16 Feb 2020 22:43:36 -0800

The best location of book information table based on chain storage structure

The best location of book information table based on chain storage structure describe   Define a linked list containing book information (book number, book name, price), read in the corresponding book data to complete the creation of the book information table, and then search for the books in the ...

Posted by aquayle on Sun, 16 Feb 2020 04:07:07 -0800