JDBC learning summary (Idea implementation)
catalogue
preface
1, What is JDBC?
2, JDBC programming steps
(1) Design concept
(2) Preparatory work
(3) Open Idea
(4) Code section steps
3, Summary
preface
This paper records that the author has realized the java connection to the database through the study of JDBC, and completed some simple operations on the database data. ...
Added by howard-moore on Mon, 04 Oct 2021 05:18:20 +0300
Grain mall advanced chapter - distributed lock and cache
1, Local cache (single project)
If it is a single project, the cache only needs to consider its current application, but in the micro service, each micro service must have a cache service, and the data update must update its own cache, which may lead to data inconsistency
Let's take a look at the process of sing ...
Added by designrandom on Mon, 04 Oct 2021 04:07:49 +0300
Experiment 6 of 2020 database system of Shandong University
What's more
Experiment 1 of 2020 database system of Shandong University Experiment 2 of 2020 database system of Shandong University Experiment 3 of 2020 database system of Shandong University Experiment 4 of 2020 database system of Shandong University Experiment 5 of 2020 database system of Shandong University Experiment 6 of 2020 database sys ...
Added by freewholly on Sun, 03 Oct 2021 01:49:51 +0300
Creation and call of oracle database stored procedure
Learning destination:
PLSQL programming: Hello World, program structure, variables, process control, cursorStored procedure: concept, parameterless storage, parameterless storage (input, output)JAVA call stored procedure
1. PLSQL programming
1.1. Concept and purpose
What is PL/SQL?
PL/SQL(Procedure Language/SQL)PLSQL is a procedural ex ...
Added by birdie on Fri, 01 Oct 2021 06:45:14 +0300
Redis cluster construction
brief introduction
Redis cluster adopts P2P mode, which is completely decentralized, and there is no central node or proxy node;Redis clusters do not have a unified portal. When client s connect to the cluster, they can connect to any node in the cluster. Nodes in the cluster communicate with each other (PING-PONG mechanism), and each node is ...
Added by denhamd2 on Fri, 01 Oct 2021 02:43:32 +0300
Table splitting based on springboot+sharding jdbc +spring data jpa
Table splitting based on springboot+sharding jdbc +spring data jpa
background
The IOT PC rental project in the charge of the blogger did not consider this aspect in the code design because the product said it did not need to support the multi tenant mode in the design stage. Suddenly, some time ago, gou product said it needed to do this mode. ...
Added by nor0101 on Thu, 30 Sep 2021 04:56:37 +0300
MySQL common statements
mysql login
mysql -uroot -p password
mysql -hip -uroot -p Password for connection target
mysql --host=ip --user=root --password=Password for connection target
MySQL exit
exit
quit
DDL: operation database and table
Create database
create database Database name;
Create a database, judge that it does not exist, a ...
Added by Design on Wed, 29 Sep 2021 21:03:30 +0300
Docker Builds redis Master+Sentry
1. Principle of redis master slave + sentry
First, we need to know the consistency hash algorithm, which works by storing data clockwise to the nearest redis server, or possibly by calculating the value of the key from the hash algorithm The hash value is exactly the address value of the redis server. The reids master slave + sentry implement ...
Added by MikeL7 on Tue, 28 Sep 2021 21:22:57 +0300
Single case pattern analysis
Singleton mode
Why single example
Ensure that a class has only one object, which is commonly used to access database operations, service configuration files, etc.
Key points of singleton
1. The default constructor is private, and the copy constructor and copy assignment function should also be disabled by private or = delete. (it cannot be ...
Added by wilburforce on Tue, 28 Sep 2021 20:31:49 +0300
Mysql from deleting database to running -- constraints of 2Mysql
1, Restraint·
1. Primary key constraint We can add constraints to a data table of a data table so that it can uniquely identify a data table. After being constrained, the data is not repeated and not unique: primary key
mysql> use test;
mysql> create table number(
-> id int primary key,
-> name varchar(20)
-> ...
Added by jpaloyo on Tue, 28 Sep 2021 13:32:20 +0300