DB2 database varchar field to int field problem

Paste my code first: SELECT BELONG_INSTN_COD AS DEPT_ID, SUM(BALANCE) AS BAL, CASE WHEN length(CERT_ID) = 15 THEN '19' || SUBSTR(CERT_ID, 7, 6) ELSE SUBSTR(CERT_ID, 7, 8) END AS BIRTH_DATE, CASE WHEN length(CERT_ID) = 15 THEN SUBSTR(CERT_ID, 9, 2) ELSE SUBSTR(CERT_ID, 11, 2) END AS MM, CASE WHEN length(CERT_ID) = 15 THEN SUBSTR(CERT_ID ...

Added by sharpnova on Sun, 21 Jun 2020 19:12:14 +0300

Hacker attack and defense of station B [network security] - record

cc attack: for applications, such as malicious swipe verification code DDoS attack: for servers, such as a large number of http requests, malicious access with large traffic Note source station B video (Knowledge Area > wild Technology Association)Hacker attack and defense: from entry to access to y ...

Added by FoxhoundX on Sun, 21 Jun 2020 12:11:09 +0300

04GORM source code interpretation

brief introduction query Query process Build query SQL statement Conditional statement Summary search structure Definition of search search method Summary summary brief introduction GORM source code interpretation, based on v1.9.11 edition. query In the previous section, we explored how models are defined and how data tables are creat ...

Added by champoi on Sun, 21 Jun 2020 12:01:47 +0300

CURD basic operation of MongoDB

Note: This paper is based on MongoDB 4.2.6 1. Delete Delete a document > db.bb.find().pretty() { "_id" : ObjectId("5ed6549830571733ccb3d678"), "jordan" : 23, "haha" : "ending" } { "_id" : ObjectId("5ed6549830571733ccb3d679"), "kobe" : 24, "haha" : "ending" } > db.bb.remove({jordan: 23}) ...

Added by StefanRSA on Sun, 21 Jun 2020 09:46:27 +0300

RocketMQ for reliable message final consistency

RocketMQ for reliable message final consistency Business description In this case, RocketMQ middleware is used to realize the final consistent distributed transaction of reliable messages and simulate the transfer transaction process of two accounts. Two accounts are in different banks (Zhang San is ...

Added by legomez2000 on Sun, 21 Jun 2020 09:31:11 +0300

Packaging Helm diagrams using Operator technology and deploying them to K8S clusters

Preface In " Packaging and deploying complex applications to the k8s cluster using helm "In this article, we package the application as a chart with helm, which simplifies the deployment process. However, while helm supports Seamless Upgrades for Stateless Applications on the line of Basic Install, replacing the mirrored version to ta ...

Added by kevin_newbie on Fri, 19 Jun 2020 19:26:51 +0300

If BigDecimal is not used properly, the boss's loss will still be deducted from your salary

Yunqi information:[ Click to see more industry information]Here you can find the first-hand cloud information of different industries. What are you waiting for? Come on! We have basically formed a common sense that we need to use BigDecimal instead of others where money is needed, and we all know that floating-point variables will lose precisio ...

Added by keiran420 on Thu, 18 Jun 2020 11:53:31 +0300

How to Design High Performance Distributed Locks

What is a distributed lock? In a JVM, where multiple threads are concurrent, we can use synchronous or Lock locks to ensure that only one thread can modify shared variables or execute code blocks at a time.However, our services are deployed on a distributed cluster basis, and for some shared resources, the use of Java locks in a distributed en ...

Added by gersh on Wed, 17 Jun 2020 19:51:19 +0300

Pandas: from shallow to deep

What is panda? pandas is a NumPy based tool, which is created to solve data analysis tasks. pandas incorporates a large number of libraries and some standard data models, providing the tools needed to efficiently operate large datasets. pandas provides a large number of functions and methods that enab ...

Added by Braveheart on Wed, 17 Jun 2020 06:08:58 +0300

Lab 2 Android Data Storage Instance Address Book

Lab 2 Android Data Storage Instance Address Book 1. Experimental Purpose (1) Skilled in UI interface design process and methods; (2) To further understand the establishment and operation of the SQLite database; (3) Skilled in Andriod database programming. 2. Experimental Environment (1) Hardware: PC, ot ...

Added by tippy_102 on Wed, 17 Jun 2020 04:20:28 +0300