Java Concurrent Column 2
This is the second half about Java Concurrent of my blog
non-blocking synchronization
- Much of the recent research on concurrent algorithms has focused on nonblock- ing algorithms, which use low-level atomic machine instructions such as compare- and-swap instead of locks to ensure data integrity under concurrent access. Non- blocking algorithms are used extensively in operating systems and JVMs for thread and process scheduling, garbage collection, and to implement locks and other concurrent data structures.
- Nonblocking algorithms are considerably more complicated to design and im- plement than lock-based alternatives, but they can offer significant scalability and liveness advantages. They coordinate at a finer level of granularity and can greatly reduce scheduling overhead because they don’t block when multiple threads contend for the same data. Further, they are
immune to deadlock and other liveness problems
. In lock-based algorithms, other threads cannot make progress if a thread goes to sleep or spins while holding a lock, whereas nonblocking algorithms are impervious to individual thread failures
. As of Java 5.0, it is possible to build efficient nonblocking algorithms in Java using the atomic variable classes such as AtomicInteger and AtomicReference.
- Atomic variables can also be used as “better volatile variables” even if you are not developing nonblocking algorithms.
Atomic variables offer the same memory semantics as volatile variables
, but with additional support for atomic updates— making them ideal for counters, sequence generators, and statistics gathering while offering better scalability than lock-based alternatives.
- Coordinating access to shared state using a consistent locking protocol ensures that whichever thread holds the lock guarding a set of variables has exclusive access to those variables, and that any changes made to those variables are visible to other threads that subsequently acquire the lock.
Volatile variables are a lighter-weight synchronization mechanism
than locking because they do not involve context switches or thread scheduling
. However, volatile variables have some limitations compared to locking: while they provide similar visibility guarantees, they cannot be used to construct atomic compound actions
. This means that volatile variables cannot be used when one variable de- pends on another, or when the new value of a variable depends on its old value. This limits when volatile variables are appropriate, since they cannot be used to reliably implement common tools such as counters or mutexes.
- This can be a serious problem if the blocked thread is a high-priority thread but the thread holding the lock is a lower-priority thread—a performance hazard known as priority inversion. Even though the higher-priority thread should have precedence, it must wait until the lock is released, and this effectively down- grades its priority to that of the lower-priority thread. If a thread holding a lock is permanently blocked (due to an infinite loop, deadlock, livelock, or other liveness failure), any threads waiting for that lock can never make progress.
hardware
Exclusive locking is a pessimistic technique
—it assumes the worst (if you don’t lock your door, gremlins will come in and rearrange your stuff) and doesn’t proceed until you can guarantee, by acquiring the appropriate locks, that other threads will not interfere.
- For fine-grained operations, there is an alternate approach that is often more efficient—
the optimistic approach
, whereby you proceed with an update, hopeful that you can complete it without interference. This approach relies on collision detection to determine if there has been interference from other parties during the update
, in which case the operation fails and can be retried (or not). The optimistic approach is like the old saying, “It is easier to obtain forgiveness than permission”
, where “easier” here means “more efficient”.
- Processors designed for multiprocessor operation provide special instructions for managing concurrent access to shared variables. Early processors had atomic test-and-set, fetch-and-increment, or swap instructions sufficient for implementing mutexes that could in turn be used to implement more sophisticated concurrent objects. Today, nearly every modern processor has some form of atomic read- modify-write instruction, such as compare-and-swap or load-linked/store-conditional. Operating systems and JVMs use these instructions to implement locks and con- current data structures, but until Java 5.0 they had not been available directly to Java classes.
Compare and swap
- The approach taken by most processor architectures, including IA32 and Sparc, is to implement a compare-and-swap (CAS) instruction. (Other processors, such as PowerPC, implement the same functionality with a pair of instructions: load- linked and store-conditional.)
CAS has three operands—a memory location V on which to operate, the expected old value A, and the new value B. CAS atomically updates V to the new value B, but only if the value in V matches the expected old value A; otherwise it does nothing
. In either case, it returns the value currently in V. (The variant called compare-and-set instead returns whether the operation succeeded
.) CAS means “I think V should have the value A; if it does, put B there, otherwise don’t change it but tell me I was wrong.” CAS is an optimistic technique—it proceeds with the update in the hope of success
, and can detect failure if another thread has updated the variable since it was last examined. SimulatedCAS in Listing 15.1 illustrates the semantics (but not the implementation or performance) of CAS.
When multiple threads attempt to update the same variable simultaneously using CAS, one wins and updates the variable’s value, and the rest lose
. But the losers are not punished by suspension, as they could be if they failed to acquire a lock; instead, they are told that they didn’t win the race this time but can try again. Because a thread that loses a CAS is not blocked, it can decide whether it wants to try again, take some other recovery action, or do nothing.3 This flexibility eliminates many of the liveness hazards associated with locking (though in unusual cases can introduce the risk of livelock—see Section 10.3.3).
- CAS addresses the problem of implementing atomic read-modify-write sequences without locking,
because it can detect interference from other threads
.
counter implemented by CAS
- At first glance, the CAS-based counter looks as if it should perform worse than a lock-based counter; it has more operations and a more complicated control flow, and depends on the seemingly complicated CAS operation. But in reality, CAS-based counters significantly outperform lock-based counters if there is even a small amount of contention, and often even if there is no contention. The fast path for uncontended lock acquisition typically requires at least one CAS plus other lock-related housekeeping, so more work is going on in the best case for a lock-based counter than in the normal case for the CAS-based counter. Since the CAS succeeds most of the time (assuming low to moderate contention), the hardware will correctly predict the branch implicit in the while loop, minimizing the overhead of the more complicated control logic.
- The language syntax for locking may be compact, but the work done by the JVM and OS to manage locks is not. Locking entails traversing a relatively com- plicated code path in the JVM and may entail OS-level locking, thread suspension, and context switches. In the best case, locking requires at least one CAS, so using locks moves the CAS out of sight but doesn’t save any actual execution cost. On the other hand, executing a CAS from within the program involves no JVM code, system calls, or scheduling activity. What looks like a longer code path at the ap- plication level is in fact a much shorter code path when JVM and OS activity are taken into account.
The primary disadvantage of CAS is that it forces the caller to deal with contention (by retrying, backing off, or giving up), whereas locks deal with contention automatically by blocking until the lock is available
.
- Competitive forces will likely result in continued CAS performance improvement over the next sev- eral years. A good rule of thumb is that the cost of the “fast path” for uncontended lock acquisition and release on most processors is approximately twice the cost of a CAS.
CAS support in JVM
- So, how does Java code convince the processor to execute a CAS on its behalf? Prior to Java 5.0, there was no way to do this short of writing native code.
In Java 5.0, low-level support was added to expose CAS operations on int, long, and object references
, and the JVM compiles these into the most efficient means provided by the underlying hardware
. On platforms supporting CAS, the run- time inlines them into the appropriate machine instruction(s); in the worst case, if a CAS-like instruction is not available the JVM uses a spin lock
. This low-level JVM support is used by the atomic variable classes (AtomicXxx in java.util.con- current.atomic) to provide an efficient CAS operation on numeric and reference types; these atomic variable classes are used, directly or indirectly, to implement most of the classes in java.util.concurrent.
Other liveness hazards
- While deadlock is the most widely encountered liveness hazard, there are sev- eral other liveness hazards you may encounter in concurrent programs including starvation, missed signals, and livelock.
Starvation
- Starvation occurs when a thread is perpetually denied access to resources it needs in order to make progress; the most commonly starved resource is CPU cycles. Starvation in Java applications can be caused by inappropriate use of thread prior- ities. It can also be caused by executing nonterminating constructs (infinite loops or resource waits that do not terminate) with a lock held, since other threads that need that lock will never be able to acquire it.
- The thread priorities defined in the Thread API are merely scheduling hints. The Thread API defines ten priority levels that the JVM can map to operating system scheduling priorities as it sees fit. This mapping is platform-specific, so two Java priorities can map to the same OS priority on one system and different OS priorities on another.
- Avoid the temptation to use thread priorities, since they increase platform dependence and can cause liveness problems. Most concurrent applica- tions can use the default priority for all threads.
Poor responsiveness
- One step removed from starvation is poor responsiveness, which is not uncom- mon in GUI applications using background threads.
- If the work done by other threads are truly background tasks, lowering their priority can make the foreground tasks more responsive.
Livelock
- Livelock is a form of liveness failure in which a thread, while not blocked, still cannot make progress because it keeps retrying an operation that will always fail.
- Livelock often occurs in transactional messaging applications, where the messaging infrastructure rolls back a transaction if a message cannot be processed successfully, and puts it back at the head of the queue. If a bug in the message handler for a particular type of message causes it to fail, every time the message is dequeued and passed to the buggy handler, the transaction is rolled back. Since the message is now back at the head of the queue, the handler is called over and over with the same result. (This is sometimes called the poison message problem.) The message handling thread is not blocked, but it will never make progress either. This form of livelock often comes from overeager error-recovery code that mistakenly treats an unrecoverable error as a recoverable one.
- This is similar to what happens when two overly polite people are walking in opposite directions in a hallway: each steps out of the other’s way, and now they are again in each other’s way. So they both step aside again, and again, and again. . .
Solutions
- The solution for this variety of livelock is to introduce some randomness into the retry mechanism. For example, when two stations in an ethernet network try to send a packet on the shared carrier at the same time, the packets collide. The stations detect the collision, and each tries to send their packet again later. If they each retry exactly one second later, they collide over and over, and neither packet ever goes out, even if there is plenty of available bandwidth. To avoid this, we make each wait an amount of time that includes a random component. (The ethernet protocol also includes exponential backoff after repeated collisions, reducing both congestion and the risk of repeated failure with multiple colliding stations.) Retrying with random waits and backoffs can be equally effective for avoiding livelock in concurrent applications.
Summary
- Liveness failures are a serious problem because there is no way to recover from them short of aborting the application. The most common form of liveness failure is lock-ordering deadlock. Avoiding lock ordering deadlock starts at design time: ensure that when threads acquire multiple locks, they do so in a consistent order. The best way to do this is by using open calls throughout your program. This greatly reduces the number of places where multiple locks are held at once, and makes it more obvious where those places are.
Reference
- One of the primary reasons to use threads is to improve performance.
- First make your program right, then make it fast—and then only if your performance requirements and measurements tell you it needs to be faster. In designing a con- current application, squeezing out the last bit of performance is often the least of your concerns.
- When the performance of an activity is limited by availability of a par- ticular resource, we say it is bound by that resource: CPU-bound, database-bound, etc.
- using multiple threads always introduces some performance costs compared to the single-threaded approach. These include the overhead associated with coordinating between threads (locking, signaling, and memory synchronization), increased context switching,thread creation and teardown, and scheduling overhead. When threading is employed effectively, these costs are more than made up for by greater throughput, responsiveness, or capacity. On the other hand, a poorly designed concurrent application can perform even worse than a comparable sequential one.
- we want to keep the CPUs busy with useful work
Scalability
- Scalability describes the ability to improve throughput or capacity when additional computing resources (such as additional CPUs, memory, stor- age, or I/O bandwidth) are added.
- Nearly all engineering decisions involve some form of tradeoff.
- This is one of the reasons why most optimizations are premature: they are often undertaken before a clear set of requirements is available.
- Avoid premature optimization. First make it right, then make it fast—if it is not already fast enough.
- Measure, don’t guess.
Amdahl’s law
- the theoretical speedup is always limited by the part of the task that cannot benefit from the improvement.
- If F is the fraction of the calculation that must be executed serially, then Amdahl’s law says that on a machine with N processors, we can achieve a speedup of at most:
Speedup ≤ 1 / (F + (1 − F)/N)
- As N approaches infinity, the maximum speedup converges to 1/F, meaning that a program in which fifty percent of the processing must be executed serially can be sped up only by a factor of two, regardless of how many processors are available, and a program in which ten percent must be executed serially can be sped up by at most a factor of ten.
- Amdahl’s law also quantifies the efficiency cost of serialization. With ten processors, a program with 10% serialization can achieve at most a speedup of 5.3 (at 53% utilization), and with 100 processors it can achieve at most a speedup of 9.2 (at 9% utilization). It takes a lot of inefficiently utilized CPUs to never get to that factor of ten.
- It is clear that as processor counts increase, even a small percentage of serialized execution limits how much throughput can be increased with additional computing resources.
- All concurrent applications have some sources of serialization; if you think yours does not, look again.
- Amdahl’s law tells us that the scalability of an application is driven by the proportion of code that must be executed serially. Since the primary source of serialization in Java programs is the exclusive resource lock, scalability can often be improved by spending less time holding locks, either by reducing lock granu- larity, reducing the duration for which locks are held, or replacing exclusive locks with nonexclusive or nonblocking alternatives.
Costs introduced by threads
Context switching
- Context switches are not free; thread scheduling requires manipulating shared data structures in the OS and JVM. The OS and JVM use the same CPUs your pro- gram does; more CPU time spent in JVM and OS code means less is available for your program.
- When a new thread is switched in, the data it needs is unlikely to be in the local processor cache, so a context switch causes a flurry of cache misses, and thus threads run a little more slowly when they are first scheduled.
- The actual cost of context switching varies across platforms, but a good rule of thumb is that a context switch costs the equivalent of 5,000 to 10,000 clock cycles, or several microseconds on most current processors.
memory synchronization
- The performance cost of synchronization comes from several sources. The visibility guarantees provided by synchronized and volatile may entail using special instructions called memory barriers that can flush or invalidate caches, flush hard- ware write buffers, and stall execution pipelines. Memory barriers may also have indirect performance consequences because they inhibit other compiler optimizations; most operations cannot be reordered with memory barriers.
- When assessing the performance impact of synchronization, it is important to distinguish between contended and uncontended synchronization. The synchronized mechanism is optimized for the uncontended case (volatile is always uncontended), and at this writing, the performance cost of a “fast-path” uncontended synchronization ranges from 20 to 250 clock cycles for most systems. While this is certainly not zero, the effect of needed, uncontended synchronization is rarely significant in overall application performance, and the alternative involves compromising safety and potentially signing yourself (or your succes- sor) up for some very painful bug hunting later.
- Modern JVMs can reduce the cost of incidental synchronization by optimizing away locking that can be proven never to contend. If a lock object is accessible only to the current thread, the JVM is permitted to optimize away a lock acquisi- tion because there is no way another thread could synchronize on the same lock. For example, the lock acquisition in following Listing can always be eliminated by the JVM.
Following synchronization has no effect
synchronized (new Object()) {
// do something
}
- More sophisticated JVMs can use escape analysis to identify when a local object reference is never published to the heap and is therefore thread-local. As below sample:
public String getStoogeNames() {
List<String> stooges = new Vector<String>(); stooges.add("Moe");
stooges.add("Larry");
stooges.add("Curly");
return stooges.toString();
}
- the only reference to the List is the local variable stooges, and stack-confined variables are automatically thread-local. A naive execution of getStoogeNames would acquire and release the lock on the Vector four times, once for each call to add or toString. However, a smart runtime compiler can inline these calls and then see that stooges and its internal state never escape, and therefore that all four lock acquisitions can be eliminated.
- Even without escape analysis, compilers can also perform lock coarsening, the merging of adjacent synchronized blocks using the same lock. For getStooge- Names, a JVM that performs lock coarsening might combine the three calls to add and the call to toString into a single lock acquisition and release, using heuristics on the relative cost of synchronization versus the instructions inside the synch- ronized block.5 Not only does this reduce the synchronization overhead, but it also gives the optimizer a much larger block to work with, likely enabling other optimizations.
Don’t worry excessively about the cost of uncontended synchronization. The basic mechanism is already quite fast, and JVMs can perform addi- tional optimizations that further reduce or eliminate the cost. Instead, focus optimization efforts on areas where lock contention actually occurs.
- Synchronization by one thread can also affect the performance of other threads. Synchronization creates traffic on the shared memory bus; this bus has a limited bandwidth and is shared across all processors. If threads must compete for synchronization bandwidth, all threads using synchronization will suffer.
Blocking
- Uncontended synchronization can be handled entirely within the JVM (Bacon et al., 1998); contended synchronization may require OS activity, which adds to the cost. When locking is contended, the losing thread(s) must block. The JVM can implement blocking either via spin-waiting (repeatedly trying to acquire the lock until it succeeds) or by suspending the blocked thread through the operating system. Which is more efficient depends on the relationship between context switch overhead and the time until the lock becomes available; spin-waiting is preferable for short waits and suspension is preferable for long waits. Some JVMs choose between the two adaptively based on profiling data of past wait times, but most just suspend threads waiting for a lock.
Reducing lock contention
- We’ve seen that serialization hurts scalability and that context switches hurt performance. Contended locking causes both, so reducing lock contention can improve both performance and scalability.
Access to resources guarded by an exclusive lock is serialized—only one thread at a time may access it. Of course, we use locks for good reasons, such as preventing data corruption, but this safety comes at a price. Persistent contention for a lock limits scalability.
- The principal threat to scalability in concurrent applications is the exclu- sive resource lock.
- Two factors influence the likelihood of contention for a lock: how often that lock is requested and how long it is held once acquired.7 If the product of these factors is sufficiently small, then most attempts to acquire the lock will be uncon- tended, and lock contention will not pose a significant scalability impediment.
There are three ways to reduce lock contention:
- Reduce the duration for which locks are held;
- Reduce the frequency with which locks are requested; or
- Replace exclusive locks with coordination mechanisms that permit
greater concurrency.
Narrowing lock scope
- An effective way to reduce the likelihood of contention is to hold locks as briefly as possible. This can be done by moving code that doesn’t require the lock out of synchronized blocks, especially for expensive operations and potentially block- ing operations such as I/O.
- It is easy to see how holding a “hot” lock for too long can limit scalability
- Reducing the scope of the lock in userLocationMatches substantially reduces the number of instructions that are executed with the lock held. By Amdahl’s law, this removes an impediment to scalability because the amount of serialized code is reduced.
- Because AttributeStore has only one state variable, attributes, we can im- prove it further by the technique of delegating thread safety (Section 4.3). By replacing attributes with a thread-safe Map (a Hashtable, synchronizedMap, or Con- currentHashMap), AttributeStore can delegate all its thread safety obligations to the underlying thread-safe collection.
Reducing lock granularity
- The other way to reduce the fraction of time that a lock is held (and therefore the likelihood that it will be contended) is to have threads ask for it less often. This can be accomplished by lock splitting and lock striping, which involve using separate locks to guard multiple independent state variables previously guarded by a single lock. These techniques reduce the granularity at which locking occurs, potentially allowing greater scalability—but using more locks also increases the risk of deadlock.
- If a lock guards more than one independent state variable, you may be able to improve scalability by splitting it into multiple locks that each guard different variables. This results in each lock being requested less often.
- After splitting the lock, each new finer-grained lock will see less locking traffic than the original coarser lock would have.
Lock stripping
- Splitting a heavily contended lock into two is likely to result in two heavily contended locks.
- Lock splitting can sometimes be extended to partition locking on a variable- sized set of independent objects, in which case it is called lock striping. For exam- ple, the implementation of ConcurrentHashMap uses an array of 16 locks, each of which guards 1/16 of the hash buckets; bucket N is guarded by lock N mod 16.
- One of the downsides of lock striping is that locking the collection for ex- clusive access is more difficult and costly than with a single lock. Usually an operation can be performed by acquiring at most one lock, but occasionally you need to lock the entire collection, as when ConcurrentHashMap needs to expand the map and rehash the values into a larger set of buckets. This is typically done by acquiring all of the locks in the stripe set
- common optimizations such as caching frequently computed values can introduce “hot fields” that limit scalability.
- A common optimization is to update a separate counter as entries are added or removed; this slightly increases the cost of a put or remove operation to keep the counter up-to-date, but reduces the cost of the size operation from O(n) to O(1).
- In this case, the counter is called a hot field because every mutative operation needs to access it.
- ConcurrentHashMap avoids this problem by having size enumerate the stripes and add up the number of elements in each stripe, instead of maintaining a global count. To avoid enumerating every element, ConcurrentHashMap maintains a separate count field for each stripe, also guarded by the stripe lock.
Alternative to exclusive lock
- A third technique for mitigating the effect of lock contention is to forego the use of exclusive locks in favor of a more concurrency-friendly means of managing shared state. These include using the concurrent collections, read-write locks, immutable objects and atomic variables.
ReadWriteLock
- enforces a multiple-reader, single-writer locking discipline: more than one reader can access the shared resource concurrently so long as none of them wants to modify it, but writers must acquire the lock excusively. For read-mostly data structures, ReadWriteLock can offer greater concurrency than exclusive locking; for read-only data structures, immutability can eliminate the need for locking entirely.
- Atomic variables (see Chapter 15) offer a means of reducing the cost of updat- ing “hot fields” such as statistics counters, sequence generators, or the reference
- If size is called frequently compared to mutative operations, striped data structures can optimize for this by caching the collection size in a volatile whenever size is called and invalidating the cache (setting it to -1) whenever the collection is modified. If the cached value is nonnegative on entry to size, it is accurate and can be returned; otherwise it is recomputed.
- The atomic variable classes pro- vide very fine-grained (and therefore more scalable) atomic operations on integers or object references, and are implemented using low-level concurrency primitives (such as compare-and-swap) provided by most modern processors. If your class has a small number of hot fields that do not participate in invariants with other variables, replacing them with atomic variables may improve scalability.
Comparing Map
- The single-threaded performance of ConcurrentHashMap is slightly better than that of a synchronized HashMap, but it is in concurrent use that it really shines. The implementation of ConcurrentHashMap assumes the most common operation is retrieving a value that already exists, and is therefore optimized to provide highest performance and concurrency for successful get operations.
- The major scalability impediment for the synchronized Map implementations is that there is a single lock for the entire map, so only one thread can access the map at a time. On the other hand, ConcurrentHashMap does no locking for most successful read operations, and uses lock striping for write operations and those few read operations that do require locking. As a result, multiple threads can access the Map concurrently without blocking.
- The numbers for the synchronized collections are not as encouraging. Perfor- mance for the one-thread case is comparable to ConcurrentHashMap, but once the load transitions from mostly uncontended to mostly contended—which happens here at two threads—the synchronized collections suffer badly. This is common behavior for code whose scalability is limited by lock contention. So long as contention is low, time per operation is dominated by the time to actually do the work and throughput may improve as threads are added. Once contention becomes significant, time per operation is dominated by context switch and scheduling delays, and adding more threads has little effect on throughput.
Building a asynchronous log
- Building a logger that moves the I/O to another thread may improve performance, but it also introduces a number of design complications, such as interruption (what happens if a thread blocked in a logging operation is interrupted?), service guarantees (does the logger guarantee that a success- fully queued log message will be logged prior to service shutdown?), saturation policy (what happens when the producers log messages faster than the logger thread can handle them?), and service lifecycle (how do we shut down the logger, and how do we communicate the service state to producers?).
Reducing context switching
- The “get in, get out” principle of Section 11.4.1 tells us that we should hold locks as briefly as possible, because the longer a lock is held, the more likely that lock will be contended. If a thread blocks waiting for I/O while holding a lock, another thread is more likely to want the lock while the first thread is holding it. Concurrent systems perform much better when most lock acquisitions are uncontended, because contended lock acquisition means more context switches. A coding style that encourages more context switches thus yields lower overall throughput.
Testing concurrency
- we defined safety as “nothing bad ever happens” and liveness as “something good eventually happens”.
- when interrupted, it throws InterruptedException. This is one of the few cases in which it is appropriate to subclass Thread explicitly instead of using a Runnable in a pool: in order to test proper termination with join.
- The result of Thread.getState should not be used for concurrency control, and is of limited usefulness for testing—its primary utility is as a source of debugging information.
- a common error in implementing semaphore-controlled buffers is to forget that the code actually doing the insertion and extraction requires mutual exclu- sion (using synchronized or ReentrantLock). A sample run of PutTakeTest with a version of BoundedBuffer that omits making doInsert and doExtract synch- ronized fails fairly quickly.
- Tests should be run on multiprocessor systems to increase the diversity of potential interleavings. However, having more than a few CPUs does not necessarily make tests more effective. To maximize the chance of detecting timing-sensitive data races, there should be more active threads than CPUs, so that at any given time some threads are running and some are switched out, thus reducing the predicatability of interactions between threads.
- Tests like PutTakeTest tend to be good at finding safety violations. For exam- ple, a common error in implementing semaphore-controlled buffers is to forget that the code actually doing the insertion and extraction requires mutual exclu- sion (using synchronized or ReentrantLock). A sample run of PutTakeTest with a version of BoundedBuffer that omits making doInsert and doExtract synch- ronized fails fairly quickly. Running PutTakeTest with a few dozen threads iterating a few million times on buffers of various capacity on various systems increases our confidence about the lack of data corruption in put and take.
- The source code PutTakeTest.java demonstreated aforesaid logic.
Test resource management
- The tests so far have been concerned with a class’s adherence to its specifica- tion—that it does what it is supposed to do. A secondary aspect to test is that it does not do things it is not supposed to do, such as leak resources. Any object that holds or manages other objects should not continue to maintain references to those objects longer than necessary. Such storage leaks prevent garbage collectors from reclaiming memory (or threads, file handles, sockets, database connections, or other limited resources) and can lead to resource exhaustion and application failure.
2024
3 minute read
A younger brother knows his older brother better than anyone else.
3 minute read
You are not a drop in the ocean, you are the entire ocean in a drop.
3 minute read
Unraveling the Mystery of Nested SQL Comments in VS Code
Have you ever found yourself staring at a sea of incorrectly highlighted SQL code in Visual Studio C...
less than 1 minute read
how to let your flyway database scheme migrate more robustly and self healing
less than 1 minute read
how to let your flyway database scheme migrate more robustly and self healing
3 minute read
If you can make your hobby your profession, you never have to work another day in your life. —Anonymous
3 minute read
“Stress is like a pulse, if you have it you are alive.” — Steve Maraboli
1 minute read
Good leadership consists of doing less and being more. —Dave Ramsey
1 minute read
A leader takes people where they want to go. A great leader takes people where they don’t necessarily want to go, but ought to be.
—Rosalynn Carter, forme...
less than 1 minute read
一旦你知道答案,一切都会变得简单。” —— 戴夫·梅吉(Dave Magee)
2 minute read
“Everything is easy, once you know the answer. —Dave Magee
1 minute read
Life begins at the edge of the comfort zone
3 minute read
One must learn by doing the thing; for though you think you know it, you have no certainty, until you try. —Sophocles
less than 1 minute read
One must learn by doing the thing; for though you think you know it, you have no certainty, until you try. —Sophocles
less than 1 minute read
A younger brother knows his older brother better than anyone else.
Back to top ↑
2023
3 minute read
Mastering JSON Data Manipulation with jq: A Comprehensive Guide
2 minute read
XLOOKUP vs. VLOOKUP: Excel’s Dynamic Duo for Data Lookup
less than 1 minute read
To find out the port numbers running in servers
less than 1 minute read
The simplest way to check an mariadb is runnning
systemctl status mariadb
less than 1 minute read
To run commands in VMs in Azure
5 minute read
The biggest room in the world is the room for improvement.
Filters in Convolutional Neural Networks (CNNs)
In the context of convolutional neural net...
2 minute read
A younger brother knows his older brother better than anyone else.
4 minute read
A younger brother knows his older brother better than anyone else.
1 minute read
whether it seems possible or not - go for it
Cheaper X 2 to EC2, to use Fargate Spot
With Fargate Spot you can run interruption tolerant Amazon ECS t...
3 minute read
A dream deferred is a dream denied. -Langston Hughes
2 minute read
“The past does not equal the future unless you live there.” - Tony Robbins
3 minute read
“The best way to predict the future is to invent it.” - Alan Kay
2 minute read
“Hang Out with People Who are Better than You.”
— Warren Buffett
1 minute read
A young idler, an old beggar. - William Shakespeare
Understanding React export a Component
In this blog post, we will dive into the code of the RepoU...
1 minute read
“Don’t let yesterday take up too much of today.” - Will Rogers
less than 1 minute read
“It always seems impossible until it’s done.” - Nelson Mandela
2 minute read
We never lose friends but just start to find real ones. - William Shakespeare
1 minute read
Everybody may not to be famous but everybody can be great.
“The Curious Case of ‘localhost’ vs ‘127.0.0.1’ in MySQL Connections”
Have you ever encoun...
2 minute read
Your past is a lesson. Not a life sentence.
Forgive yourself and focus on the future.
-Mel Robbins
2 minute read
Your past is a lesson. Not a life sentence.
Forgive yourself and focus on the future.
-Mel Robbins
3 minute read
Your past is a lesson. Not a life sentence.
Forgive yourself and focus on the future.
-Mel Robbins
3 minute read
A young idler, an old beggar. - William Shakespeare
2 minute read
A young idler, an old beggar. - William Shakespeare
1 minute read
“Don’t let yesterday take up too much of today.” - Will Rogers
1 minute read
“Don’t let yesterday take up too much of today.” - Will Rogers
2 minute read
“What you seek is seeking you.” — Rumi
4 minute read
“I can’t relate to lazy people. We don’t speak the same language.” — Kobe Bryant
1 minute read
“What you seek is seeking you.” — Rumi
2 minute read
A young idler, an old beggar. - William Shakespeare
4 minute read
A young idler, an old beggar. - William Shakespeare
1 minute read
The biggest room in the world is the room for improvement.
— Helmut Schmidt
less than 1 minute read
A young idler, an old beggar. - William Shakespeare
1 minute read
A young idler, an old beggar. - William Shakespeare
less than 1 minute read
Why HTTP/2 is Better
2 minute read
How to Fine Tune RestTemplate
less than 1 minute read
大堡礁的一些知识
less than 1 minute read
The root cause is your customized HttpMessageConverter stopped processing of WebSecurity
1 minute read
A young idler, an old beggar. - William Shakespeare
2 minute read
Summary
As a Java developer, it’s important to know how to find out which port number your Spring service is running on. This information is useful when you ...
3 minute read
“Hang Out with People Who are Better than You.” — Warren Buffett
1 minute read
“Hang Out with People Who are Better than You.” — Warren Buffett
1 minute read
Failure of timeout or connection when running pip install
less than 1 minute read
message:/'Invoking SP with quoteContext*werqewr-1234asdf-sdf23-9d83-asdf23*'/
less than 1 minute read
What’s and how to avoid error of the authenticity of host ‘xxx’ can’t be established
You can suppress the “The authenticity of host ‘’ can’t be established” ...
3 minute read
You are not a drop in the ocean, you are the entire ocean in a drop.
less than 1 minute read
知其雄,守其雌 什么意思
1 minute read
Transaction silently rolled back because it has been marked as rollback-only
2 minute read
Why using wildcard import is devil
7 minute read
A sample to test concurrent JPA modifications
4 minute read
A runnable example in Java to create a cucumber test code files to simulate multiple read and write entity via JPA repository
2 minute read
What’s purpose of AopTestUtils.getTargetObject()?
3 minute read
“The only way to do great work is to love what you do.” - Steve Jobs
2 minute read
“The only way to do great work is to love what you do.” - Steve Jobs
7 minute read
Give me sample to test concurrent JPA modifications
4 minute read
what’s spring boot test annotation
4 minute read
A real sample of using JPA detach
14 minute read
summary Feature flag library in spring boot
3 minute read
what’s difference of CNY and CNH
CNY and CNH are both currencies used in China, but they are different in a few important ways:
1 minute read
Details of how hibernate transaction management works
3 minute read
In spring cloud what’s when to use feign client and when to sue resttemplate
7 minute read
What’s spring cloud config
Spring Cloud Config is a distributed configuration server that provides a centralized location to manage external properties for a...
1 minute read
Spring API Gateway Best Practices
6 minute read
Splitting a monolithic application into microservices can be a complex process that requires careful planning and implementation. Here is a high-level approa...
1 minute read
Sample me build a micro service payment system with spring cloud
Here’s an example of building a microservice payment system using Spring Cloud:
1 minute read
The main difference between using Ribbon and a Load Balancer is the location of the load balancing logic.
1 minute read
How to add security among micro service in spring boot
1 minute read
How to use service discovery in spring book
1 minute read
Sample me how to build a eureka service discovery
5 minute read
what’s usage of bootstrap yml
In a Spring Boot application, the bootstrap.yml (or bootstrap.properties) file is used for configuring the application’s enviro...
7 minute read
what’s API gateway
An API Gateway is a key component in microservices architecture that acts as a single entry point for client requests to a microservices-b...
1 minute read
Stop annoying debug logs in spring boot test
less than 1 minute read
how-to-stop-quartz-scheduling-during-springboot-test
6 minute read
“The only way to do great work is to love what you do.” - Steve Jobs
less than 1 minute read
“Believe you can and you’re halfway there.” - Theodore Roosevelt
4 minute read
“The only way to do great work is to love what you do.” - Steve Jobs
1 minute read
Whatever is worth doing is worth doing well.
2 minute read
“Climb the mountains and get their good tidings. Nature’s peace will flow into you as sunshine flows into trees. The winds will blow their own freshness i...
less than 1 minute read
Live the life you’ve imagined.
3 minute read
“Climb the mountains and get their good tidings. Nature’s peace will flow into you as sunshine flows into trees. The winds will blow their own freshness i...
1 minute read
“Winning is nice if you don’t lose your integrity in the process.” — Arnold Horshak
less than 1 minute read
紹介
私は、私のOppo Androidスマートフォンのアプリ「Googleマップ」で奇妙な問題が発生していることに気づきました。Googleマップで特定の場所(例えば「中央公園」)を検索すると、通常、このアプリは公園の写真やコメントリストを表示するはずです。例えば、誰かが公園の芝生や川の写真を投稿し、便利な場所...
1 minute read
Introduction
J’ai remarqué un problème étrange avec l’application “Google Maps” de mon téléphone Android Oppo. Lorsque vous recherchez un lieu sur Google Map...
less than 1 minute read
Nothing is as easy as it looks.
less than 1 minute read
Nothing is as easy as it looks.
1 minute read
You are not a drop in the ocean, you are the entire ocean in a drop.
1 minute read
You are not a drop in the ocean, you are the entire ocean in a drop.
1 minute read
You are not a drop in the ocean, you are the entire ocean in a drop.
less than 1 minute read
You are not a drop in the ocean, you are the entire ocean in a drop.
2 minute read
You are not a drop in the ocean, you are the entire ocean in a drop.
1 minute read
An honest days’ work makes for a good night’s sleep.
less than 1 minute read
Imagination is the key ingredient to a happy life.
less than 1 minute read
Keep an eye on the fruits of your labor.
2 minute read
Superheros come in all shapes and sizes.
less than 1 minute read
The heart can see what is invisible to the eye.
less than 1 minute read
The heart can see what is invisible to the eye.
less than 1 minute read
The best way to predict the future is to create it.
4 minute read
Som are born beautiful. The rest of us have to work at it.
less than 1 minute read
Don’t be greedy. Half of something is better than all nothing.
less than 1 minute read
The best way to predict the future is to create it.
less than 1 minute read
The best way to predict the future is to create it.
1 minute read
Lift is short, enjoy the ride.
Back to top ↑
2022
less than 1 minute read
The best way to predict the future is to create it.
less than 1 minute read
枝上柳棉吹又少, 天涯何处无芳草. –苏轼
1 minute read
The best way to predict the future is to create it.
1 minute read
Life is like the ocean, it goes up and down.
less than 1 minute read
Be the Sun of your solar system.
6 minute read
”—————————————————————-
“ 4. User interface
“—————————————————————-
“ Set X lines to the cursor when moving vertically
set scrolloff=0
1 minute read
Get busy living or get busy dying.
1 minute read
Turn your wounds into wisdom
1 minute read
Today a reader, tomorrow a leader.
1 minute read
Never stop learning, because life never stops teaching.
1 minute read
Life is really simple, but men insist on making it complicated.
1 minute read
Take the risk or lose the chance!
1 minute read
Worries less, smile more!
1 minute read
Kill time, or kiss time!
3 minute read
One must learn by doing the thing; for though you think you know it, you have no certainty, until you try. —Sophocles
3 minute read
Success is the sum of small efforts, repeated.
less than 1 minute read
Do what you say, say what you do.
3 minute read
Don’t wish for it, work for it.
3 minute read
Don’t find fault. Find a remedy.
1 minute read
People are smarter than you think. Give them a chance to prove themselves.
less than 1 minute read
Be happy in front of people who don’t like you, it kills them.
2 minute read
This is your life. Do what you love, and do it often.
2 minute read
Life is short. Don’t waste it with negative people who don’t appreciate you. Keep them in your heart but keep them out of your life.
3 minute read
The most effective way to do it, is to do it
Homebrew
The best practice is to run brew info before install new software. It will generally list what’s c...
1 minute read
Burn your ego before it burns you.
2 minute read
Don’t be afraid to make s splash.
less than 1 minute read
Less expecting, more accepting.
1 minute read
Stay focused, believe that you can achieve at the highest level, surround yourself with others who believe in you and do not stray from your goals.
1 minute read
Fina a way. If there’s none, make one!
less than 1 minute read
The sentence The quick brown fox jumps over the lazy dog uses every letter of the alphabet.
1 minute read
The moment you start focusing on yourself, things start falling into place.
11 minute read
When love is real, it doesn’t lie, cheat, pretend or keep secrets.
5 minute read
Little things make big things happens.
5 minute read
Remember, some things have to end for better things to begin.
1 minute read
A good day starts with a good mindset!
1 minute read
A good day starts with a good mindset!
less than 1 minute read
A good day starts with a good mindset!
1 minute read
A good day starts with a good mindset!
1 minute read
Don’t spend another year doing the same shit.
less than 1 minute read
With great power comes great responsibilities.
4 minute read
Don’t tell people your plans. Just show them your results!
4 minute read
Life is short, make a big splash!
1 minute read
Take time to do what makes your soul happy!
77 minute read
Life isn’t about finding yourself. Life is about creating yourself.
less than 1 minute read
Java Deep Notes
1 minute read
Coding is everything! Code Now!
1 minute read
Coding is everything! Code Now!
2 minute read
Leave nothing for tomorrow which can be done today. -Abraham Lincoln.
3 minute read
Leave nothing for tomorrow which can be done today. -Abraham Lincoln.
less than 1 minute read
Leave nothing for tomorrow which can be done today. -Abraham Lincoln.
5 minute read
Don’t promis when you are hapy. Don’t reply when you’re angry and don’t decide when you’re sad
Service keep on restarting
If you spot service is restartin...
4 minute read
Don’t promis when you are hapy. Don’t reply when you’re angry and don’t decide when you’re sad
1 minute read
Gradle build stuck, keep on running but never ending
Back to top ↑
2021
3 minute read
Too much screen time
2 minute read
Summary
Following diagram demonstrated the process to bootstrap and use Logback for loggings in Spring Boot applciation.
1 minute read
Symptoms
When you are using integrated authentication (Kerberos connection) for MS SqlServer connection, there is one possible error :
2 minute read
Why to extract resources from jar to local disk
less than 1 minute read
Normal approach to debug maven
less than 1 minute read
How to watch specific kubenetes deployment by labels
1 minute read
Background
It’s typical to get various network connection issues when you run commands within corporation network. For example, you’ll find diversed issues w...
less than 1 minute read
More developer friendly Threa Sleep
less than 1 minute read
Summary
As you know, staff and your safety is paramount. So what if emergency take place, such as fire in office, how to help yourself and your colleagues by...
2 minute read
Summary
As you know, there are various event will be sent (multicast) when a specific story taken place.
less than 1 minute read
IT-Solutions-For-Remote-Learning.md
1 minute read
Summary
To talk to K8s for getting data, there are few approaches. While K8s’ official Java library is the most widely used one.
This blog will look into thi...
less than 1 minute read
Summary
In windows operating system, if you want to get your CPU name, core, 64bit and speed in command line. Just follow below actions:
6 minute read
Be a good person in real life, not in social media
less than 1 minute read
Summary
Whitelabel Error Page is the default error page in Spring Boot web app.
It provide a more user-friently error page whenever there are any issues when...
less than 1 minute read
If you’d like to view solution in YouTube, check out at https://youtu.be/ICiwuqJ-yU8
1 minute read
The greatest wealth is health!
less than 1 minute read
A debt security represents a debt owed by the issuer to an investor. Here, the investor acts as a lender to the issuer which may be a government, organisatio...
Back to top ↑
2020
less than 1 minute read
S3 download URL
As you know, AWS S3 object can be downloaded/processed by S3 download URL.
I’m showing you two examples on how to process S3 Object by NIO f...
1 minute read
What happened to a debug job hanging in IntelliJ (IDEAS) IDE?
You may find when you try to debug a class in Intellij but it stuck there and never proceed, e....
less than 1 minute read
Difference with Scala
Kotlin takes the best of Java and Scala, the response times are similar as working with Java natively, which is a considerable advantag...
less than 1 minute read
Shortcuts & tips
1 minute read
此文是作者英文原文的翻译文章,英文原文在:http://todzhang.com/posts/2018-06-10-jvm-warm-up/
less than 1 minute read
Shortcuts for Slack
less than 1 minute read
Key points of Reactive Programming
2 minute read
Frame in Swift
less than 1 minute read
#
2 minute read
Argument Matching & Answers
For example, you have mocked DOC with call(arg: Int): Intfunction. You want to return 1 if argument is greater than 5 and -1 ...
2 minute read
Argument Matching & Answers
For example, you have mocked DOC with call(arg: Int): Intfunction. You want to return 1 if argument is greater than 5 and -1 ...
1 minute read
Dockers Concepts
1 minute read
How to decode path parameters in All REST WebServices calls
less than 1 minute read
Linux Curl command
less than 1 minute read
The concept of join points as matched by pointcut expressions is central to AOP, and Spring uses the AspectJ pointcut expression language by default.
less than 1 minute read
As a general rule it should be possible to use the name as a pivot. Dimensions allow a particular named metric to be sliced to drill down and reason about th...
2 minute read
# Pigeonhole principle
2 minute read
你就会发现只要涉及递归的问题,都是 树的问题。
8 minute read
A Facial Recognition utility in a dozen of python LOC (Lines Of Code)
16 minute read
What’s TLS
TLS (Transport Layer Security) and its predecessor, SSL (Secure Sockets Layer), are security protocols designed to secure the communication betwee...
13 minute read
Why JVM need warm up
I don’t know how and why you get to this blog. But I know the key words in your mind are “warm” for JVM. As the name “warm up” suggested...
26 minute read
This is the second half about Java Concurrent of my blog
54 minute read
This blog is about noteworthy pivot points about Java Concurrent Framework
Back to Java old days there were wait()/notify() which is error prone, while fr...
65 minute read
Algorithm Leetcode
Back to top ↑
2019
less than 1 minute read
Feelings is the language of the soul.
If you want to know what’s true for you about something, look to how your’re feeling about.
4 minute read
Enable Kafka listener annotated endpoints that are created under the covers by a AbstractListenerContainerFactory. To be used on Configuration classes as fol...
less than 1 minute read
Why Terraform
1 minute read
FX Spot is not covered by the regulation, as it is not considered to be a financial instrument by ESMA, the European Union (EU) regulator. As FX is considere...
less than 1 minute read
currency pairs
Direct ccy: means USD is part of currency pair
Cross ccy: means ccy wihtout USD, so except NDF, the deal will be split to legs, both with...
less than 1 minute read
IPC
Back to top ↑
2018
less than 1 minute read
nano seconds
less than 1 minute read
Simple Binary Encoding (SBE)
less than 1 minute read
“Cannot connect to remote desktop” with Citrix Receiver
7 minute read
A new type of Juice
Put simply, Guice alleviates the need for factories and the use of new in your Java code. Think of Guice’s @Inject as the new new. You wi...
less than 1 minute read
Key points
All YAML files (regardless of their association with Ansible or not) can optionally begin with — and end with …. This is part of the YAML format a...
1 minute read
multithreading
less than 1 minute read
Feature
5 minute read
What are protocol buffers?
6 minute read
Sudo in a Nutshell
Sudo (su “do”) allows a system administrator to give certain users (or groups of users) the ability to run some (or all) commands as root...
14 minute read
ZK Motto
the motto “ZooKeeper: Because Coordinating Distributed Systems is a Zoo.”
1 minute read
WHAT IS PRESTO?
28 minute read
Acceptance testing vs unit test
It’s sometimes said that unit tests ensure you build the thing right, whereas acceptance tests ensure you build the right thi...
less than 1 minute read
Scala String
27 minute read
philosophy
The actor model adopts the philosophy that everything is an actor. This is similar to the everything is an object philosophy used by some object-o...
less than 1 minute read
FileUtil.class
8 minute read
Camel’s message model
In Camel, there are two abstractions for modeling messages, both of which we’ll cover in this section.
org.apache.camel.Message—The ...
less than 1 minute read
Exporting your beans to JMX
The core class in Spring’s JMX framework is the MBeanExporter. This class is responsible for taking your Spring beans and registe...
1 minute read
Solace PubSub+
It is a message broker that lets you establish event-driven interactions between applications and microservices across hybrid cloud environmen...
4 minute read
App deployment, configuration management and orchestration - all from one system. Ansible is powerful IT automation that you can learn quickly.
10 minute read
Ansible: What Is It Good For?
Ansible is often described as a configuration management tool, and is typically mentioned in the same breath as Chef, Puppet, a...
4 minute read
How Flexbox works — explained with big, colorful, animated gifs
less than 1 minute read
commands:
9 minute read
Single Writer principle
18 minute read
KDB
However kdb+ evaluates expressions right-to-left. There are no precedence rules. The reason commonly given for this behaviour is that it is a much simple...
less than 1 minute read
Foreign Exchange markets
1 minute read
Better to use smart wait
less than 1 minute read
Key concept
In Scrum, a team is cross functional, meaning everyone is needed to take a feature from idea to implementation.
3 minute read
:100:DevOps Model Defined
6 minute read
https://stormforger.com/blog/2016/07/08/types-of-performance-testing/
1 minute read
Error of ‘ECONNRESET’
You may face error ECONNRESET from intranet, even appropriate proxy tools (e.g. cntlm) is running. The errors may looks like
```bash
$ ...
less than 1 minute read
Release & Testing Strategy
There are various methods for safely releasing changes to Production. Each team must select what is appropriate for their own ...
less than 1 minute read
commands to read files
var lineReader = require(‘readline’).createInterface({
input: require(‘fs’).createReadStream(‘C:\dev\node\input\git_reset_files.tx...
less than 1 minute read
https://blog.leanstack.com/minimum-viable-product-mvp-7e280b0b9418
1 minute read
What is difference between declarations, providers and import in NgModule
1 minute read
Cross-Origin Request Sharing - CORS (A.K.A. Cross-Domain AJAX request) is an issue that most web developers might encounter, according to Same-Origin-Policy,...
2 minute read
Why @Effects?
In a simple ngrx/store project without ngrx/effects there is really no good place to put your async calls. Suppose a user clicks on a button or...
3 minute read
View
A view is also a responder (UIView is a subclass of UIResponder). This means that a view is subject to user interactions, such as taps and swipes. Thus,...
Back to top ↑
2017
less than 1 minute read
openshift vs openstack
The shoft and direct answer is `OpenShift Origin can run on top of OpenStack. They are complementary projects that work well together....
3 minute read
Concepts
Cloud computing is the on-demand demand delivery of compute database storage applications and other IT resources through a cloud services platform v...
less than 1 minute read
whats @Effects
You can almost think of your Effects as special kinds of reducer functions that are meant to be a place for you to put your async calls in suc...
less than 1 minute read
The second advantage to a lazy subscription is that the observable doesn’t hold onto data by default. In the previous example, each event generated by the in...
less than 1 minute read
code E503
code E503 when run npm install packages, e.g.
2 minute read
The Docker project was responsible for popularizing container development in Linux systems. The original project defined a command and service (both named do...
less than 1 minute read
The drawback of using Promises is that they’re unable to handle data sources that produce more than one value, like mouse movements or sequences of bytes in ...
7 minute read
Commands bible
9 minute read
How Page Value is calculated
less than 1 minute read
interface RandomAccess
Marker interface used by List implementations to indicate that they support fast (generally constant time) random access. The primary ...
4 minute read
Secure FTP
SFTP over FTP is the equivalant of HTTPS over HTTP, the security version
6 minute read
Setup WebSphere profiles and application in command line
less than 1 minute read
After establishing a SSH session, you can install a default web server by executing sudo yum install httpd -y. To start the web server, type sudo service htt...
less than 1 minute read
ORA-12899: Value Too Large for Column
27 minute read
Spring Bean Life Cycle Callback Methods
113 minute read
#《亿级流量网站架构核心技术》目录一览
TCP四层负载均衡
使用Hystrix实现隔离
基于Servlet3实现请求隔离
限流算法 令牌桶算法 漏桶算法
分布式限流 redis+lua实现 Nginx+Lua实现
使用sharding-jdbc分库分表
Disruptor+Redis...
3 minute read
This is talking about Java JIT (Just-In-Time) compiler
7 minute read
Java Security
well-behaved: programs should be prevent from consuming too much system resources
3 minute read
Noteworthy points about SeriableVersionUID in Java
less than 1 minute read
s<-read.csv("C:/Users/xxx/dev/R/IRS/SHH_SCHISHG.csv")
# aggregate
s2<-table(s$Original.CP)
s3<-as.data.frame(s2)
# extract by Frequency ordered
s3...
35 minute read
SFTP versus FTPS
SS: Secure Shell
An increasing number of our customers are looking to move away from standard FTP for transferring data, so we are ofte...
less than 1 minute read
How do I remove a plug-in?
Run Help > About Eclipse > Installation Details, select the software you no longer want and click Uninstall. (On Macintosh i...
less than 1 minute read
Class loading subsystem
27 minute read
Maven philosophy
“It is important to note that in the pom.xml file you specify the what and not the how. The pom.xml file can also serve as a documentatio...
less than 1 minute read
Notes
JDK 1.0 introduced rudimentary I/O facilities for accessing the file system (to create a directory, remove a file, or perform another task), accessi...
less than 1 minute read
Net Protocols
1 minute read
SOA
SOA is a set of design principles for building a suite of interoperable, flexible and reusable services based architecture.
top-down and bottom-up a...
15 minute read
This page is about key points about Algorithm
less than 1 minute read
Concept
19 minute read
What is the difference between Serializable and Externalizable in Java?
In earlier version of Java, reflection was very slow, and so serializaing large ob...
3 minute read
What is NavigableMap
6 minute read
Concepts
If you implement Comparable interface and override compareTo() method it must be consistent with equals() method i.e. for equal object by equals(...
3 minute read
Difference between equals and deepEquals of Arrays in Java
Arrays.equals() method does not compare recursively if an array contains another array
on oth...
4 minute read
Hashmap in JDK
Some note worth points about hashmap
Lookup process
Step# 1: Quickly determine the bucket number in which this element may resid...
66 minute read
This blog is listing key new features introduced in Java 8
1 minute read
What is the difference between arbitrage and hedging?
Back to top ↑
2016
28 minute read
verbose:gc
verbose:gc prints right after each gc collection and prints details about each generation memory details. Here is blog on how to read verbose gc
12 minute read
contract of hashCode :
Whenever it is invoked on the same object more than once during an execution of a Java application, the hashCode method must consis...
less than 1 minute read
Apache
2 minute read
Dependency Injection
Angular doesn’t automatically know how you want to create instances of your services or the injector to create your service. You must co...
less than 1 minute read
ThreadLocalRandom, SecureRandm, java.util.Random, java.math.Random
less than 1 minute read
JDK Versions
JDK 1.5 in 2005
JDK 1.6 in 2006
JDK 1.7 in 2011
JDK 1.8 in 2014
Sun之前风光无限,但是在2010年1月27号被Oracle收购。
在被Oracle收购后对外承诺要回到每2年一个realse的节奏。但是20...
less than 1 minute read
用10几行代码自己写个人脸识别程序
less than 1 minute read
Eslastic Search
less than 1 minute read
JSON lines
less than 1 minute read
Python Scraphy
less than 1 minute read
引言
有句话说有人的地方就有江湖,同样,有江湖的地方就有恩怨。在软件行业历史长河(虽然相对于其他行业来说,软件行业的历史实在太短了,但是确是充满了智慧的碰撞也是十分的精彩)中有一些恩怨情愁,分分合合的小故事,比如类似的有,从一套代码发展出来后面由于合同到期就分道扬镳,然后各自发展成独门产品的Sybase DB和微...
4 minute read
Hyperledger Fabric for Mortals
less than 1 minute read
使用Solidity创建以太坊(Ethereum)智能合约(Smart Contract)
less than 1 minute read
Reference
Sublime Scope Naming
Syntax Guide
less than 1 minute read
大家都知道,在软件测试特别是在单元测试时,必用的一个功能就是“断言”(Assert),可能有些人觉得不就一个Assert语句,没啥花头,也有很多人用起来也是懵懵懂懂,认为只要是Assert开头的方法,拿过来就用。一个偶然的机会跟人聊到此功能,觉得还是有必要在此整理一下如何使用以及对“断言”的理解。希望可以帮助大家...
less than 1 minute read
深入浅出区块链系统:第一章.
what you should know about blockchain
less than 1 minute read
Kubernetes 和Docker Swarm 可能是使用最广泛的工具,用于在集群环境中部署容器。但是这两个工具还是有很大的差别。
2 minute read
在开发设计中有一些常用原则或者潜规则,根据笔者的经验,这里稍微总结一下最最常用的,以飨读者。
11 minute read
RFC origion http://www.w3.org/Protocols/rfc2616/rfc2616-sec9.html#sec9.1.2)
less than 1 minute read
The stark difference among Spark and Storm. Although both are claimed to process the streaming data in real time. But Spark processes it as micro-batches; wh...
less than 1 minute read
可以想像一下,之前的传统应用系统,像是一个大办公室里面,有各个部门,销售部,采购部,财务部。办一件事情效率比较高。但是也有一些弊端,首先,各部门都在一个房间里。
1 minute read
What’s it
Returns an unmodifiable view of the specified set. This method allows
modules to provide users with “read-only” access to internal sets.
Query ope...
less than 1 minute read
What’s Kibana
kibana is an open source data visualization plugin for Elasticsearch. It provides visualization capabilities on top of the content indexed on...
less than 1 minute read
What’s Kibana
kibana is an open source data visualization plugin for Elasticsearch. It provides visualization capabilities on top of the content indexed on...
less than 1 minute read
Design philosophies
less than 1 minute read
UI
HTML5, AngularJS, BootStrap, REST API, JSON
Backend
Hadoop core (HDFS), Hive, HBase, MapReduce, Oozie, Pig, Solr
less than 1 minute read
Purpose of BA
带来一些商业价值(收益)
解决业务痛点
5 minute read
REST API must be hypertext driver
Roy’s interview
2 minute read
Binary Tree
A binary tree is a tree in which no node can have more than two children.
A property of a binary tree that is sometimes important is that th...
less than 1 minute read
eBooks
list of various books
Node.js
less than 1 minute read
Symptoms:
less than 1 minute read
Common solutions
less than 1 minute read
Toggle crosshair
4 minute read
“Be the change you wish to see in the world.” - Mahatma Gandhi
less than 1 minute read
Difference between mutal funds and hedge funds
less than 1 minute read
Differences between not in, not exists , and left join with null
less than 1 minute read
concepts
less than 1 minute read
404 error for customized domain (such as godday)
404
There is not a GitHub Pages site here.
Go to github master branch for gitpages site, manually add CN...
1 minute read
RQFII
RQFII stands for Renminbi Qualified Foreign Institutional Investor. RQFII was introduced in 2011 to allow qualified foreign institutional investors to ...
3 minute read
includes() vs some()
less than 1 minute read
Docker Errors
less than 1 minute read
Concepts
LVS means Linux Virtual Server, which is one Linux built-in component.
less than 1 minute read
(‘—–Unexpected error:’, <type ‘exceptions.TypeError’>) datetime.datetime.now()
less than 1 minute read
RAID
RAID is Reductant Array Independent Disk,
less than 1 minute read
Concepts
less than 1 minute read
Description
less than 1 minute read
How to setup Git in Mint Linux
=================================================
4 minute read
DB sharding in YHD
1 minute read
Microservice
Services are organized around capabilities, e.g., user interface front-end, recommendation, logistics, billing, etc.
Services are small in ...
33 minute read
Codecache
The maximum size of the code cache is set via the -XX:ReservedCodeCacheSize=N flag (where N is the default just mentioned for the particular com...
Back to top ↑