JS Foundation: four inheritance methods in JavaScript & instanceof implementation
JS Foundation: four inheritance methods in JavaScript & instanceof implementation
preface
If you don't know much about the prototype chain and type judgment of JS, it is recommended that you first read the following two articles and then come back to understand the principle and purpose of this article
Prototype: Prototype Chain Foun ...
Added by AliasXNeo on Thu, 10 Feb 2022 16:48:11 +0200
[practical problems] - three practices of Bloom filter: handwriting, redistribution and Guava
We have already talked about the principle of Bloom filter [practical problem] - bloom filter for cache penetration (1) , we all understand that it works like this, so how do we use bloom filter in general? If you do it yourself, how do you do it?
Bloom filter
Read the definition again:
Bloom Filter was proposed by Burton Howard Bloom in ...
Added by artizan on Thu, 10 Feb 2022 16:45:16 +0200
Spring Cloud series_ 22 Sentinel defines resources and rules
Define resources
Resources are one of the core concepts of sentinel. Resources here can be anything, such as services, methods in services, and a piece of code. Sentinel provides @ SentinelResource to define resources and AspectJ extension to customize resources and handle blockexceptions
After adding @ SentinelResource to the resource, you c ...
Added by inrealtime on Thu, 10 Feb 2022 16:30:18 +0200
k8s set up mysql master-slave synchronization
1. mysql master image configuration
first, we need to obtain the dockerfile file from the docker hub official website for subsequent modifications. The address is as follows: https://github.com/docker-library/mysql.git then copy one copy of the 8.0 folder and name the other 8.0_slave. Enter the 8.0 folder, where ther ...
Added by andrewburgess on Thu, 10 Feb 2022 16:19:38 +0200
Java8 Lambda expressions and Stream API: Lambda expressions
Reprinted from This article mainly explains the Java8 Stream API, but to explain this part, you need the knowledge of anonymous inner classes, lambda expressions and functional interfaces. This article will be divided into two articles to explain the above contents, which readers can refer to as needed.
Java anonymous inner classes, lambda exp ...
Added by Clandestinex337 on Thu, 10 Feb 2022 16:19:49 +0200
Building Linux root file system
preface
The purpose of writing this article is to record your learning process so that you can review and refer to the relevant knowledge points in the future.
1, Modify Makefile and add compiler
Enter the unzipped BusyBox directory, open the top-level Makefile, and add ARCH and cross_ The value of compile is as follows:
CROSS_COMPILE ?=arm ...
Added by halojoy on Thu, 10 Feb 2022 16:14:31 +0200
Java learning five - collection framework
HashMap
Store key value pairs. First calculate the position in the bucket according to the key, and then put the instance in the corresponding bucket (tail insertion). If the number of instances in the bucket exceeds a certain range, the linked list will become a red black tree (but its red black tree structure still maintains the struc ...
Added by kontesto on Thu, 10 Feb 2022 16:13:18 +0200
An article quickly understand the four commonly used thread pools in Java
See the article on how to use the thread pool constructor in Java to directly create an instance of thread pool Detailed explanation of Java thread pool construction parameters . However, in the Executors class, we are provided with methods to create common thread pools. Next, let's learn about the four commonly used:newFixedThreadPoolFirst, l ...
Added by Jeroen_nld on Thu, 10 Feb 2022 16:03:50 +0200
Qt event cycle process analysis
Qt event cycle process analysis
This article will explain the following questions:
Why does Qt application start with QCoreApplication app(argc, argv) and return app in main() function Exec() end?Why does while(true) cause the CPU to be fully loaded when both are loops? The event loop of Qt will not.Why can blocking program execution through ...
Added by hairytea on Thu, 10 Feb 2022 16:00:49 +0200
Use of advanced Select statements (key points)
1. De duplication query
According to the database tables and data created before, we put forward a demand to query the student numbers of all students who took the exam
select `studentno` from `result` --Query the student numbers of all students with grades
According to the results, we can see that there are a lot of duplicates in the dat ...
Added by bertfour on Thu, 10 Feb 2022 15:58:02 +0200