5. Lockless Shared Mode (top), CAS, Atomics
Contents of this Chapter
CAS and volatileAtomic IntegerAtomic ReferenceAtomic accumulatorUnsafe
1. Questions raised
There are requirements below to ensure accont. Thread security for withdraw withdraw method
public interface Account {
// Get Balance
Integer getBalance();
// Withdraw money
void withdraw(Integer amount);
...
Added by Azazeal on Wed, 09 Mar 2022 19:34:20 +0200
Blue Bridge Cup Training March 8
Pure prime number
Title link: https://www.lanqiao.cn/problems/1561/learning/
Create an array to record whether each bit is a prime number or not
Traversing through each number, if it is a prime number, then all the numbers that are multiple of its integer are not prime numbers, set the filter directly in the array, and then judge if ...
Added by greens85 on Wed, 09 Mar 2022 19:02:44 +0200
java official website tutorial (basic)
introduction
Introduction to Java technology and the course of installing java development software and using it to create simple programs.
Learning the Java language
Courses that describe basic concepts such as classes, objects, inheritance, data types, generics, and packages.
Basic Java classes
Courses on exceptions, basic input / ou ...
Added by vicky57t on Wed, 09 Mar 2022 18:36:01 +0200
[advanced features of Java] java learning journey 36 - network programming
Network communication protocol:
Application layer:
HTTP: Hypertext Transfer ProtocolFTP: Text Transfer ProtocolSMTP: mail delivery protocolPOP: mail receiving protocol
Transport layer:
TCP: transmission control protocol (three handshakes) UDP: user packet protocol
network layer
IP: network protocol
data link layerphysical ...
Added by Jramz on Wed, 09 Mar 2022 18:10:27 +0200
Workflow learning log (basic concepts, basic api usage)
Workflow learning log (basic concepts, basic api usage)
preface
When developing OA human resource management system, workflow needs to be used in personnel transfer, leave approval, etc. as a learning opportunity.
1, What is workflow?
1. Concept
Workflow is the automatic execution and management of business processes through computer ...
Added by cunoodle2 on Wed, 09 Mar 2022 16:26:24 +0200
Activiti workflow day04 activiti usage example
Create process
To operate the Activiti engine, you need to go through org Activiti. engine. The services exposed by the processengine instance You can operate an org Activiti. engine. ProcessEngine
Create a workflow for leave application:
Release process
Any data related to "static" resources (such as process definitions ...
Added by CrashRoX on Wed, 09 Mar 2022 14:56:51 +0200
(learning notes) priority and value of SpringBoot2 configuration file
Priority of profile
For springboot, three configuration files are provided to operate its configuration. yaml is officially recommended, but the default is properties, which is in the priority,
properties > yml > yaml
Basic syntax of yaml
Case sensitive.The data value must be preceded by a space as a separator.Use indents to indicate ...
Added by exally on Wed, 09 Mar 2022 14:56:08 +0200
spring scheduled task @ Component
1 Introduction
spring implements scheduled tasks through annotations, and operates automatically after a fixed time. For example, the mall clears the unreceived orders after a certain time.
2 use
2.1 add annotation @ enableshcheduling
Add a comment @ enableshcheduling on the entry class or Task header to enable support for scheduled ...
Added by melvincr on Wed, 09 Mar 2022 14:34:55 +0200
Java learning notes - object oriented
1, Understanding object-oriented
1.1.1 difference between process oriented and object-oriented
1. Process oriented: process oriented programming focuses not on "things", but on doing it in several steps, first what to do and then what to do. For example: ① Get up in the morning: get up, dress, wash, eat and go to work. According ...
Added by rskandarpa on Wed, 09 Mar 2022 14:32:56 +0200
How to defend against XSS attacks in Java
Detect and remove XSS (cross site scripting) attacks from text entered through normalization.
Cross site scripting (XSS) attacks are a form of threat that exploits vulnerabilities in Web applications to plunder user information. Using malicious scripts, attackers can attract different users through normally trusted Web pages and access any inf ...
Added by triphis on Wed, 09 Mar 2022 14:30:08 +0200