Install Tomcat JDK MySQL under Linux

Tomcat service setup steps Initialization of an environment begins with the first graphical interface entered after installation Configure the server to work in command line mode Close iptables and selinux Configure the local YUM source Restart the server to display the demo effect 2. The environment needed to install tomcat Install ...

Added by MaxD on Wed, 26 Jun 2019 01:58:12 +0300

[118 days] Shang Xue Gao Qi Java300 set video highlights notes (18-23)

Set 18-19: Basic Usage of switch Statement, case Penetration, String Usage of switch in JDK7 Basic usage of switch statement The case tag of a switch statement can be an int or a type that can be converted to an int (byte, char, short) [strings can be used in JDK 7.0] Based on the value of the expression, a section of execution is selected fr ...

Added by czambran on Tue, 25 Jun 2019 21:34:33 +0300

Java needs to learn the basics again (11) WeakHashMap in detail

Overview of WeakHashMap WeakHashMap is a map that stores mapping data based on hash table implemented by weak keys. When the JVM cleans up and reclaims the objects pointed to by these weak keys, WeakHashMap automatically and effectively removes the reclaimed maps from the map. Relevant knowledge cited There are four kinds of references in J ...

Added by bostonmacosx on Mon, 24 Jun 2019 21:47:04 +0300

CentOS 7 cluster deployment Hadoop 2.7.3

I. Explanation _ 2. Installation of Virtual Machine (CentOS 7 is used in this paper) _1. In this paper, CetnOS7 installation and deployment is adopted.   2. jdk1.8   3. Hadoop 2.7.3 hostname ip master 10.10.1.3 slave1 10.10.1.4 3. Install jdk, configure firewall, SSH Modify hostname There is a big difference ...

Added by Simply Me on Mon, 24 Jun 2019 00:39:40 +0300

Construction and Deployment of ELK Platform for Open Source Log Analysis System

Construction and Deployment of ELK Platform for Open Source Log Analysis System  I. PrefaceLogs mainly include system logs, application logs and security logs. System operations and peacekeeping developers can log the server hardware and software information, check the configuration process of errors and the causes of errors. Frequent ...

Added by Nuggit on Fri, 21 Jun 2019 03:01:34 +0300

java Collection - views and wrappers

View - By using views, you can get other objects that implement the Collection-Map interface.An example of this is the keySet of the mapping class.At first glance, it looks like this method creates a new set, fills in all the keys in the map, and returns to the set.However, this is not the case.Instead, the keySet method returns a class object ...

Added by ILMV on Mon, 17 Jun 2019 19:37:53 +0300

LinkedList Principle and Source Code Analysis

brief introduction LinkedList is a two-way linear linked list, but it does not store data in a linear order, but a pointer (Pointer) to the next node in each node. Since it is not necessary to store in sequence, the linked list can achieve O(1) complexity when inserted, which is much faster than another linear table sequence table, but it t ...

Added by derrtyones on Mon, 17 Jun 2019 02:25:09 +0300

Insider of Spring Technology 3 - Principle of Spring AOP (2)

Continue with Blog: Spring Technology Insider 3 - Spring AOP Principle (1) https://my.oschina.net/guanhe/blog/1476138 Spring Aop is eventually converted to JdkDynamicAopProxy or Objenesis CglibAopProxy to invoke the object as an entry The entry of JdkDynamicAopProxy is invoke function, and the entry of Objenesis CglibAopProxy is the intercep ...

Added by nykoelle on Wed, 12 Jun 2019 03:01:49 +0300

A familiar design pattern

Write before To judge whether a programmer is good or not is to show me the code.Good code readability, high cohesion, low coupling, scalability.To write good code and be a good programmer, you need to look at the open source framework written by Taurus, absorb the essence of it, learn more about design patterns, and there are no other shortcut ...

Added by serg91 on Mon, 10 Jun 2019 19:20:30 +0300

Write out 23 design patterns in one breath

Creative Patterns 1. Factory Model An interface for creating objects is defined, but subclasses determine which class to instantiate. The factory method defers instantiation of the class bar to subclasses. // Product Category public interface IProduct { } public class ProductA1 implements IProduct{} public class ProductA2 implements IProduct{} ...

Added by bbauder on Mon, 10 Jun 2019 01:54:14 +0300