JUC AQS ReentrantLock source code analysis (1)_reentrantlock sub-path_shadow?s' blog-CSDN blog /reentrantLock
https://www.cnblogs.com/liuyk-code/p/9886033.html springaop
Spring source code analysis (1)_Xinxin Xiangrong (Huo)'s blog-CSDN blogspring blog
Programmer Jionghui_CSDN blog spring Hui
Install docker in linux - brief book docker
https://www.cnblogs.com/f-ck-need-u/archive/2018/05/08/9010872.html mysql redolog and undolog
https://www.cnblogs.com/kingszelda/p/8988505.html httpclient
Several serialization methods: several common serialization and deserialization methods - Jaryle's Blog - CSDN Blog
hashcode和equals:https://www.cnblogs.com/whgk/p/6071617.html
Analysis of volatile keywords: from volatile keywords to bus storms
happen-before: Java 8 major happen-before principles super comprehensive and detailed explanation - Programmer Sought
The difference between the static proxy mode and the decorator mode: the difference between the proxy mode and the decorator mode_The difference between the decorator mode and the proxy mode_Jun Moxiao(๑˙ー˙๑)'s blog-CSDN blog operation objects are different: decorator mode Emphasis on self-enhancement, the proxy mode is completed by manipulating other objects, and the decorator is a special static proxy.
Dynamic proxy: J JAVA dynamic proxy - short book , 10 minutes to understand the dynamic proxy design pattern - short book
Observer mode, publish-subscribe mode, event-driven observer mode: Observer mode of design mode - Zhihu , Spring source code observer mode and Spring event model - short book
TCC(Try Confirm Cancel): https://www.cnblogs.com/jing99/p/11769093.html
Backtracking method: docker - Looking at the backtracking algorithm from the full arrangement - personal article - SegmentFault think no , backtracking algorithm - full arrangement implementation in java_Slayer_Zhao's Blog-CSDN Blog
Breadth-first search, find the shortest path (take a taxi): Breadth-first search algorithm_Youlan、Liuyue's Blog-CSDN Blog
Dynamic programming: state transition equation f(n) = f(n)+f(n-1);
mybatis interview questions: Mybatis common interview questions summary_mybatis interview_Zhang Weipeng's blog-CSDN blog
esjob: Elastic-Job Principle--Task Scheduling Processing (4) - junwei@的博客-CSDN博客
https encryption process: https://www.cnblogs.com/fengf233/p/11775415.html
Do you know, HTTPS uses symmetric encryption or asymmetric encryption? - Know almost
threadlocal: ThreadLocal-hash conflict and memory leak_threadlocal hash_for your own brave blog-CSDN blog
Generics: What are Generics? _How to make a large row not hard blog-CSDN Blog
DNS resolution: Baidu security verification