5. Lockless Shared Mode (top), CAS, Atomics

Contents of this Chapter CAS and volatileAtomic IntegerAtomic ReferenceAtomic accumulatorUnsafe 1. Questions raised There are requirements below to ensure accont. Thread security for withdraw withdraw method public interface Account { // Get Balance Integer getBalance(); // Withdraw money void withdraw(Integer amount); ...

Added by Azazeal on Wed, 09 Mar 2022 19:34:20 +0200

Blue Bridge Cup Training March 8

Pure prime number Title link: https://www.lanqiao.cn/problems/1561/learning/ Create an array to record whether each bit is a prime number or not Traversing through each number, if it is a prime number, then all the numbers that are multiple of its integer are not prime numbers, set the filter directly in the array, and then judge if ...

Added by greens85 on Wed, 09 Mar 2022 19:02:44 +0200

java official website tutorial (basic)

introduction Introduction to Java technology and the course of installing java development software and using it to create simple programs. Learning the Java language Courses that describe basic concepts such as classes, objects, inheritance, data types, generics, and packages. Basic Java classes Courses on exceptions, basic input / ou ...

Added by vicky57t on Wed, 09 Mar 2022 18:36:01 +0200

[advanced features of Java] java learning journey 36 - network programming

Network communication protocol: Application layer: HTTP: Hypertext Transfer ProtocolFTP: Text Transfer ProtocolSMTP: mail delivery protocolPOP: mail receiving protocol Transport layer: TCP: transmission control protocol (three handshakes) UDP: user packet protocol network layer IP: network protocol data link layerphysical ...

Added by Jramz on Wed, 09 Mar 2022 18:10:27 +0200

Workflow learning log (basic concepts, basic api usage)

Workflow learning log (basic concepts, basic api usage) preface When developing OA human resource management system, workflow needs to be used in personnel transfer, leave approval, etc. as a learning opportunity. 1, What is workflow? 1. Concept Workflow is the automatic execution and management of business processes through computer ...

Added by cunoodle2 on Wed, 09 Mar 2022 16:26:24 +0200

Activiti workflow day04 activiti usage example

Create process To operate the Activiti engine, you need to go through org Activiti. engine. The services exposed by the processengine instance You can operate an org Activiti. engine. ProcessEngine Create a workflow for leave application: Release process Any data related to "static" resources (such as process definitions ...

Added by CrashRoX on Wed, 09 Mar 2022 14:56:51 +0200

(learning notes) priority and value of SpringBoot2 configuration file

Priority of profile For springboot, three configuration files are provided to operate its configuration. yaml is officially recommended, but the default is properties, which is in the priority, properties > yml > yaml Basic syntax of yaml Case sensitive.The data value must be preceded by a space as a separator.Use indents to indicate ...

Added by exally on Wed, 09 Mar 2022 14:56:08 +0200

spring scheduled task @ Component

1 Introduction spring implements scheduled tasks through annotations, and operates automatically after a fixed time. For example, the mall clears the unreceived orders after a certain time. 2 use 2.1 add annotation @ enableshcheduling Add a comment @ enableshcheduling on the entry class or Task header to enable support for scheduled ...

Added by melvincr on Wed, 09 Mar 2022 14:34:55 +0200

Java learning notes - object oriented

1, Understanding object-oriented 1.1.1 difference between process oriented and object-oriented 1. Process oriented: process oriented programming focuses not on "things", but on doing it in several steps, first what to do and then what to do. For example: ① Get up in the morning: get up, dress, wash, eat and go to work. According ...

Added by rskandarpa on Wed, 09 Mar 2022 14:32:56 +0200

How to defend against XSS attacks in Java

Detect and remove XSS (cross site scripting) attacks from text entered through normalization. Cross site scripting (XSS) attacks are a form of threat that exploits vulnerabilities in Web applications to plunder user information. Using malicious scripts, attackers can attract different users through normally trusted Web pages and access any inf ...

Added by triphis on Wed, 09 Mar 2022 14:30:08 +0200