java notes
1.0.0
- Personal blog
- Online interview reading
- Dreamcats official account : visit link
type | name | source |
---|---|---|
Mini program | Online interview assistant | DreamCats |
Facial Sutra | Summary of the experience of major manufacturers | DreamCats |
knowledge system | Java backend knowledge classification | DreamCats |
Crazy vomiting blood series | DreamCats | |
Knowledge architecture mind map | DreamCats | |
Review questions | CS-Notes | cyc |
Write algorithm routine template | labuladong | |
Summarize LC by popularity | DreamCats | |
Sword pointing at Offer | DreamCats | |
Personal Autumn Recruitment and Familiar Questions | DreamCats | |
Hot topics in autumn recruitment exams | DreamCats | |
LC-SQL | DreamCats | |
Illustrated SQL interview questions | xxx | |
Niu Ke starts walking | xxx | |
project | Microservice shuttle online reservation system-documentation | DreamCats |
Microservice shuttle online reservation system-project address | DreamCats | |
Station B has purchased 2 practical Java projects: just choose one and study it carefully | JavaGuide | |
other | JDK1.8 partial source code | DreamCats |
Books to read accordingly | DreamCats | |
A brief introduction to Spring | DreamCats | |
Push lc script online | DreamCats | |
Push knowledge points online | DreamCats |
There are articles written by better technical teams, which are worth reading and will benefit a lot from. For example: Alibaba Technology, Meituan Technology Team, etc.
type | name | source |
---|---|---|
Other | free-programming-books | EbookFoundation |
Other | Computer professional e-books download | IT coder |
Other | Computer professional e-book download-2 | javaer-roadmap |
Other | Various technical development documents | Shuzhan.com |
Other | TikTok 2nd Side: Tell us about the principle of QR code login? | Xiaohaxue |
Other | Performance optimization: some thoughts on caching | Alibaba Technology |
Other | Questions to ask the interviewer at the end of the technical interview |
type | topic | source |
---|---|---|
Java | Interviewer: Let’s talk about the three-color marking of JVM garbage collection. To avoid pitfalls, just read this article. | The road to Java coder |
Java | How does the JVM determine which objects can be recycled? | Big Fish Immortal |
Java | The clever designs in Java Map | Alibaba technical team |
Java | ZGC in JDK 16: average pause time 0.05 ms | Glavo |
Java | Let’s talk about synchronized lock upgrade again | coder ginseng |
Java | Java thread pool source code analysis | Xiao Bin |
Java | Is the immutability of String really due to final? | Flying veal |
Java | A wave of useful information after the holidays: clarifying JVM and GC in one article | Java Architect Alliance |
Java | What are the problems with sychronized in high concurrency situations in Java ? | Jian |
Java | Java concurrency high-frequency interview questions: Tell me about your understanding of AQS? | Ao Bing |
Java | [Basic Skills] Java "lock" things that must be said | Meituan technical team |
Java | Why does HashMap under concurrency cause an infinite loop? ? ? | Java Learner Community |
Java | After being laid off twice, I finally solved the database cache consistency problem | Coder novelist |
Java | Stop worrying about thread pool size/number of threads, there is no fixed formula | nothing |
Java | What is the difference between Spring interceptors and filters? | Huawei Cloud Developer Community |
Java | Interviewer: Can you tell me eight usage scenarios of the Synchronized synchronization method? | I am a programmer |
Java | Research on Java memory access reordering | Meituan technical team |
Java | Interviewer: Let’s talk about the three-color marking of JVM garbage collection. To avoid pitfalls, just read this article. | The road to Java coder |
Java | A brief analysis of Java NIO | Meituan technical team |
Java | Some key technologies of Java Hotspot G1 GC | Meituan technical team |
Java | Java 8 series: Re-understanding HashMap | Meituan technical team |
Java | Exploration and practice of the new generation garbage collector ZGC | Meituan technical team |
Java | Java thread pool implementation principle and its practice in Meituan business | Meituan technical team |
Spring | Taking stock of SpringIOC: circular dependencies | Poor program source |
Java | A summary of common class loading errors, very well written! | The Java Way |
Java | Detailed explanation of the Unsafe class of Java's double-edged sword | Dr Hydra |
Java | With CopyOnWrite, why do we need ReadWriteLock? | java finance |
Java | ThreadLocal usage and principle | Ao Bing |
Java | Summary of dynamic agents, everything you need to know is here, no nonsense! | The moon accompanies the flying fish |
Java | Java Concurrency - Thread Pool - With Scenario Analysis | sweet dumpling |
Java | Learn Java dynamic proxy from source code perspective | Galen specializes in bells and whistles |
Java | Now that you have reached the point where you need to ask about the three-color markings? | Ai Xiaoxian |
Java | An article to understand whether JVM threads belong to user mode or kernel mode | Quancai engineer Xiaohui |
Java | One article to understand the SPI mechanism in Java | Quancai engineer Xiaohui |
Spring | Explain to your boss why you should use SpringCloud alibaba as a microservice development framework? ? ? | Piaopiaosha Jam |
Spring | How to implement a simple version of Spring - How to implement AOP (final chapter) | mghio |
Java | Frequent interview question - Please explain Java's parent delegation mechanism clearly! | Ijiran |
Spring | A large company in Beijing: SpringBean life cycle k | Java3y |
Java | Easy-to-understand ReentrantLock, if you don’t understand, come and kill me | Programmer Axing |
Java | Interviewer: "Have you ever encountered a deadlock problem? How did it happen? How to solve it?" | Chengxiang Moying |
Java | String s="a"+"b"+"c", how many objects are created? | coder ginseng |
Java | Let’s talk about 12 scenarios of spring transaction failure. It’s too confusing. | Su San talks about technology |
Java | The scumbag counterattack: JVM classic fifty questions, now the interview is stable! | The third child |
type | topic | source |
---|---|---|
MySQL | Why is the paging scenario (limit, offset) slow? | Java Learner Community |
MySQL | Talk about MySQL locks | Guo Er's trek |
Redis | Good coding practice: lightweight distributed balanced consumption queue based on Redis | Alibaba technical team |
Redis | Getting started with Redis: Redis concepts and basics (view original text) | Java full stack knowledge system |
MySQL | The relationship between transaction isolation levels and locks in Innodb | Meituan technical team |
MySQL | MySQL index principle and slow query optimization | Meituan technical team |
MySQL | A brief discussion on sub-databases and tables | Alibaba technical team |
MySQL | Synchronization solution for MySQL and Redis cache | Big brother of the people |
MySQL | I almost always ask in interviews: What are your principles for designing indexes? How to avoid index failure? | Hollischuang |
MySQL | Partition modulo and database sharding strategy: multi-table transaction sharding internal closed-loop solution | Ali Technology |
Redis | How to design the Redis cache of a billion-level system? ? ? | TomGE |
MySQL | Meituan 2nd Face: How to ensure the double-write consistency between Redis and MySQL? | Little boy picking up snails |
MySQL | What are the scenarios for index failure? When does an index expire? | Migrant worker |
MySQL | After reading this article, you still don’t understand MySQL master-slave replication, so you can go home and lie down ~ | Xiao Yu |
Redis | Quickly understand cache penetration and cache avalanche | Quancai engineer Xiaohui |
MySQL | Interview question: How many pieces of data can a MySQL B+ tree store? | TomGE |
MySQL | Why does the disk storage engine use b+ tree as the index structure? | Tencent Technology Engineering |
Redis | Understand Redis persistence at the source code level | Mushrooms can't sleep |
Redis | Classic interview question from a major company: Why is Redis so fast? | Little boy picking up snails |
MySQL | Learn about data splitting and sub-database and sub-table in one article | Quancai engineer Xiaohui |
Redis | [redis prequel] How zset solves the inefficiency of internal linked list search | Jump list construction | zxhtom |
MySQL | Worth collecting, reveal the implementation principle of MySQL multi-version concurrency control | The road to architectural improvement |
MySQL | Slow SQL troubleshooting ideas? That's it. | yes’s leveling guide |
MySQL | 42 pictures to guide you through MySQL optimization | Programmer emcxuan |
MySQL | Two treatments that can easily cause avalanches | Programming for a lifetime |
MySQL | A MySQL lock and the interviewer fought for thirty rounds, and I dominated! | yes’s leveling guide |
MySQL | Understand MySQL index pushdown in five minutes | The third child |
Redis | Essential information-16 pictures to understand the evolution of Redis architecture | IT |
Java | Slow SQL governance classic case sharing | Ali Technology |
MySQL | Cost-based optimization suggestions for slow queries | Meituan technical team |
type | topic | source |
---|---|---|
distributed | Analysis and solution of mutual exclusivity and idempotence issues in distributed systems | Meituan technical team |
Distributed lock | Understand the principle and implementation of distributed locks in one article | The road to architectural advancement |
concurrent | [10,000-level concurrency] How to design e-commerce inventory deductions? Not oversold! | TomGE |
Distributed transactions | Seven distributed transaction solutions, told to you at once | moon talks about technology |
distributed | How to prevent duplicate payments on the server side | Markerhub |
Current limiting | Why is the service concurrency of big manufacturers high but very stable? Distributed service circuit breaker downgrade current limiting tool to Hystrix | zxhtom |
Distributed lock | SpringBoot + Redis distributed lock: simulate order grabbing | JAVA Xiaoka Show |
message queue | How does the message queue ensure the orderliness of messages? | Du Yishu |
message queue | Listen to my uncle's advice, the message queue is too deep and you can't control it! | single tone |
Distributed lock | Damn, the guy next door asked me to use distributed lock again | Java3y |
Dubbo | Detailed explanation of Apache Dubbo’s SPI implementation mechanism | Ning Peng |
distributed | Ctrip eventually consistent and strongly consistent caching practice | GSF |
Distributed lock | Distributed lock design based on Redis | xiaoxiaotank |
distributed | Consistent hashing algorithm in distributed systems | Code architecture |
information | How to solve message idempotence (duplication removal)? Come check out this plan! | JAVA Daily Record |
local cache | Guava Cache principle analysis and best practices | Azusagawa |
Distributed lock | A 10,000-word long article explaining distributed locks thoroughly | Many candies |
Downgrade current limit | High concurrency overall availability: Detailed explanation of downgrade, current limiting and circuit breaker in one article | Coder’s technical journey |
kafka | Why does Kafka abandon Zookeeper? | Bug Catching Master |
type | topic | source |
---|---|---|
algorithm | Common primary sorting algorithms, understand them all this time | XSliently9527 |
algorithm | ByteDance’s favorite 64 algorithm questions (JS version) | tuque community |
algorithm | The bottom layer of MySQL index: Detailed explanation of B+ tree | Java3y |
algorithm | In-depth analysis of red-black trees and Java implementation | Meituan technical team |
algorithm | The awesome BitMap, where is the awesomeness? | ITl bro |
algorithm | bloom filter | DreamCats |
algorithm | Implement LRU caching mechanism | Guo Er's trek |
algorithm | Implement LFU caching mechanism | Guo Er's trek |
type | topic | source |
---|---|---|
Jiwang | What is the essential difference between GET and POST requests? It turns out that I had understood it wrong all along. | Coders break out |
Jiwang | Confused! Why do we need RPC when we have HTTP? | Xiaohaxue |
Jiwang | "Handshake three times, wave four times" says this, I guarantee you will never forget it | Three points of evil |
Jiwang | Ultra-detailed DNS protocol analysis | Flying veal |
Jiwang | Cookie, Session, Token, JWT that are confusing to distinguish | No leaves fall in autumn |
Jiwang | Brief illustration: Enter the URL to the page that appears. What does the browser do? | Shoot the clouds again |
type | topic | source |
---|---|---|
system | Go to the ground floor and see NIO’s zero copy | Huangfu howled |
system | Can't tell the difference between process, thread and coroutine? One article will guide you through it all! | Programmer Axing |
system | That thing about virtual memory | Sylvassun |
system | Tonight: What is the relationship between the number of CPU cores and the number of threads? | A coder's desert island survival |
system | Talk about multi-process in operating system | ZhiboZhao |
system | Ali Ermian: What is mmap? | Su San talks about technology |
type | topic | source |
---|---|---|
writing | Picture bed, construction and use of uPic and Alibaba oss | Sisi |
Git | Your file requires git, detailed installation and use (1) | Sisi |
Git | Your file requires git, common commands (2) | Sisi |
document | Mac solves the pain points of moving files-yoink | Sisi |
picture bed | Management image bed-oss-browser | Sisi |
terminal | Sometimes it’s flashy, sometimes it’s plain and simple-iterm2 | Sisi |
rss | Timely push-RSSHub | Sisi |
vim | vim programming-a preliminary study (1) | Sisi |
vim | vim programming-elegant (2) | dark night |
type | topic | source |
---|---|---|
nginx | Can't take any time - what is nginx? (one) | Sisi |
nginx | Can’t take any time off-nginx environment setup (2) | Sisi |
nginx | Can't take any time-global knowledge of nginx source code (3) | Sisi |
nginx | Can’t take time off-nginx configuration file (4) | Sisi |
nginx | No time to spare - nginx basic data structure (5) | Sisi |
nginx | Can't take any time - nginx array structure (6) | Sisi |
nginx | Can’t take any time-nginx linked list structure (7) | Sisi |
nginx | No time to spare - nginx queue structure (8) | Sisi |
type | topic | source |
---|---|---|
design pattern | I learn design patterns - singleton pattern | Sisi |
design pattern | I learn design patterns-factory pattern | Sisi |
type | topic | source |
---|---|---|
data structure | How to design a map (1) | dark night |
data structure | How to design a concurrent map (2) | dark night |
data structure | How to design an LRU (3) | dark night |
data structure | How to design a Bloom filter (4) | dark night |
System design | How to design an idempotent solution (5) | dark night |
Lock | How to design a read-write lock (6) | dark night |
Lock | How to design a distributed lock (7) | dark night |
Lock | How to design an optimistic lock (8) | dark night |
Log in | The principle of QR code scanning and login (9) | dark night |
Log in | Principle of mobile phone verification code login (10) | dark night |
Log in | Principle of one-click login with mobile phone number (11) | dark night |
Log in | App mobile phone number login distinguishes new users (12) | dark night |
Order | Automatically update status when order expires (13) | dark night |
counter | Implementation based on Redis counter (14) | dark night |
MySQL paging | MySQL paging query optimization (15) | dark night |
Current limiting algorithm | Leaky bucket algorithm implemented based on Golang (16) | dark night |
Current limiting algorithm | Token bucket algorithm implemented based on Golang (17) | dark night |
System design | How to design an order-sharing service (18) | dark night |
System design | How to design short chain services (19) | dark night |
System design | How to design a video barrage service (20) | dark night |
MySQL | Problems caused by MySQL concurrent transaction writing (21) | dark night |
Hot key | Problems with high concurrency and hot keys (22) | dark night |
in stock | How to deduct inventory under high concurrency (23) | dark night |