DB2 database varchar field to int field problem
Paste my code first:
SELECT BELONG_INSTN_COD AS DEPT_ID, SUM(BALANCE) AS BAL, CASE WHEN length(CERT_ID) = 15 THEN '19' || SUBSTR(CERT_ID, 7, 6) ELSE SUBSTR(CERT_ID, 7, 8) END AS BIRTH_DATE,
CASE WHEN length(CERT_ID) = 15 THEN SUBSTR(CERT_ID, 9, 2) ELSE SUBSTR(CERT_ID, 11, 2) END AS MM,
CASE WHEN length(CERT_ID) = 15 THEN SUBSTR(CERT_ID ...
Added by sharpnova on Sun, 21 Jun 2020 19:12:14 +0300
Hacker attack and defense of station B [network security] - record
cc attack: for applications, such as malicious swipe verification code
DDoS attack: for servers, such as a large number of http requests, malicious access with large traffic
Note source station B video (Knowledge Area > wild Technology Association)Hacker attack and defense: from entry to access to y ...
Added by FoxhoundX on Sun, 21 Jun 2020 12:11:09 +0300
04GORM source code interpretation
brief introduction
query
Query process
Build query SQL statement
Conditional statement
Summary
search structure
Definition of search
search method
Summary
summary
brief introduction
GORM source code interpretation, based on v1.9.11 edition.
query
In the previous section, we explored how models are defined and how data tables are creat ...
Added by champoi on Sun, 21 Jun 2020 12:01:47 +0300
CURD basic operation of MongoDB
Note: This paper is based on MongoDB 4.2.6
1. Delete
Delete a document
> db.bb.find().pretty()
{
"_id" : ObjectId("5ed6549830571733ccb3d678"),
"jordan" : 23,
"haha" : "ending"
}
{
"_id" : ObjectId("5ed6549830571733ccb3d679"),
"kobe" : 24,
"haha" : "ending"
}
> db.bb.remove({jordan: 23})
...
Added by StefanRSA on Sun, 21 Jun 2020 09:46:27 +0300
RocketMQ for reliable message final consistency
RocketMQ for reliable message final consistency
Business description
In this case, RocketMQ middleware is used to realize the final consistent distributed transaction of reliable messages and simulate the transfer transaction process of two accounts.
Two accounts are in different banks (Zhang San is ...
Added by legomez2000 on Sun, 21 Jun 2020 09:31:11 +0300
Packaging Helm diagrams using Operator technology and deploying them to K8S clusters
Preface
In " Packaging and deploying complex applications to the k8s cluster using helm "In this article, we package the application as a chart with helm, which simplifies the deployment process. However, while helm supports Seamless Upgrades for Stateless Applications on the line of Basic Install, replacing the mirrored version to ta ...
Added by kevin_newbie on Fri, 19 Jun 2020 19:26:51 +0300
If BigDecimal is not used properly, the boss's loss will still be deducted from your salary
Yunqi information:[ Click to see more industry information]Here you can find the first-hand cloud information of different industries. What are you waiting for? Come on!
We have basically formed a common sense that we need to use BigDecimal instead of others where money is needed, and we all know that floating-point variables will lose precisio ...
Added by keiran420 on Thu, 18 Jun 2020 11:53:31 +0300
How to Design High Performance Distributed Locks
What is a distributed lock?
In a JVM, where multiple threads are concurrent, we can use synchronous or Lock locks to ensure that only one thread can modify shared variables or execute code blocks at a time.However, our services are deployed on a distributed cluster basis, and for some shared resources, the use of Java locks in a distributed en ...
Added by gersh on Wed, 17 Jun 2020 19:51:19 +0300
Pandas: from shallow to deep
What is panda?
pandas is a NumPy based tool, which is created to solve data analysis tasks. pandas incorporates a large number of libraries and some standard data models, providing the tools needed to efficiently operate large datasets. pandas provides a large number of functions and methods that enab ...
Added by Braveheart on Wed, 17 Jun 2020 06:08:58 +0300
Lab 2 Android Data Storage Instance Address Book
Lab 2 Android Data Storage Instance Address Book
1. Experimental Purpose
(1) Skilled in UI interface design process and methods;
(2) To further understand the establishment and operation of the SQLite database;
(3) Skilled in Andriod database programming.
2. Experimental Environment
(1) Hardware: PC, ot ...
Added by tippy_102 on Wed, 17 Jun 2020 04:20:28 +0300