Great God blog. . .

JUC AQS ReentrantLock source code analysis (1)_reentrantlock sub-path_shadow?s' blog-CSDN blog  /reentrantLock

https://www.cnblogs.com/liuyk-code/p/9886033.html  springaop

Spring source code analysis (1)_Xinxin Xiangrong (Huo)'s blog-CSDN blogspring  blog

Programmer Jionghui_CSDN blog  spring Hui

Install docker in linux - brief book  docker

https://www.cnblogs.com/f-ck-need-u/archive/2018/05/08/9010872.html  mysql redolog and undolog

https://www.cnblogs.com/kingszelda/p/8988505.html httpclient

Several serialization methods: several common serialization and deserialization methods - Jaryle's Blog - CSDN Blog

hashcode和equals:https://www.cnblogs.com/whgk/p/6071617.html

Analysis of volatile keywords:   from volatile keywords to bus storms

happen-before: Java 8 major happen-before principles super comprehensive and detailed explanation - Programmer Sought

The difference between the static proxy mode and the decorator mode: the difference between the proxy mode and the decorator mode_The difference between the decorator mode and the proxy mode_Jun Moxiao(๑˙ー˙๑)'s blog-CSDN blog operation  objects are different: decorator mode Emphasis on self-enhancement, the proxy mode is completed by manipulating other objects, and the decorator is a special static proxy.

Dynamic proxy: J JAVA dynamic proxy - short book , 10 minutes to understand the dynamic proxy design pattern - short book

Observer mode, publish-subscribe mode, event-driven observer mode: Observer mode of design mode - Zhihu , Spring source code observer mode and Spring event model - short book

TCC(Try Confirm Cancel): https://www.cnblogs.com/jing99/p/11769093.html

Backtracking method: docker - Looking at the backtracking algorithm from the full arrangement - personal article - SegmentFault think no , backtracking algorithm - full arrangement implementation in java_Slayer_Zhao's Blog-CSDN Blog

Breadth-first search, find the shortest path (take a taxi): Breadth-first search algorithm_Youlan、Liuyue's Blog-CSDN Blog

Dynamic programming: state transition equation f(n) = f(n)+f(n-1);

mybatis interview questions: Mybatis common interview questions summary_mybatis interview_Zhang Weipeng's blog-CSDN blog

esjob: Elastic-Job Principle--Task Scheduling Processing (4) - junwei@的博客-CSDN博客

https encryption process: https://www.cnblogs.com/fengf233/p/11775415.html

Do you know, HTTPS uses symmetric encryption or asymmetric encryption? - Know almost

threadlocal: ThreadLocal-hash conflict and memory leak_threadlocal hash_for your own brave blog-CSDN blog

Generics: What are Generics? _How to make a large row not hard blog-CSDN Blog

DNS resolution: Baidu security verification

Guess you like

Origin blog.csdn.net/qq_16803227/article/details/105383116