Tag:processor
-
Spring source code analysis 6: processor mapping and processor adaptation processing
Spring source code analysis 6: processor mapping and processor adaptation processing staySpring source code analysis 1: Spring MVC loading mechanismThere are some points to be resolved: ConfigurableWebApplicationContext.refreshRefresh context ApplicationContext.getBeanGet bean from context DispatcherServlet.propertiesPolicy processing defined in the file ContextLoader.propertiesPolicy processing defined in the file View.renderView rendering Among them, articles 1, 2 and 4 have been […]
-
Spring source code analysis 7: exception handling and view analysis
Spring source code analysis 7: exception handling and view analysis Next, let’s talk about the remaining strategies holdExceptionHandlerExceptionResolver、ResponseStatusExceptionResolver、DefaultHandlerExceptionResolverAs the default handler exception parser holdDefaultRequestToViewNameTranslatorFind processor as default view holdInternalResourceViewResolverAs the default view parser In addition,View.renderView rendering is also discussed here 1. ExceptionHandlerExceptionResolver ExceptionHandlerExceptionResolverThe main function of is to parse the exceptions generated by the processor […]
-
The magic weapon of training 100 billion parameter model is to ascend cann heterogeneous computing architecture~
Summary:Pangu’s training is based on the “shengteng AI processor” and with the help of the “cann heterogeneous computing architecture”, so that the hardware computing power can be fully released and the training time can be greatly shortened! In April 2021, “Huawei cloud Pangu model” became popular in the field of AI Artificial Intelligence. If Mingming […]
-
Principle analysis of spring MVC (I)
Servlet lifecycle understanding The life cycle of a servlet is managed by a container (eg: Tomcat). In other words, a servlet programmer cannot control its life with code. Load and instantiateWeb. Timing depends on: XML definition, if anyxWhen the container starts (eg: SSM), otherwise, when the first request for this servlet occurs (eg: spring boot). […]
-
[get the interviewer] series: three questions of the soul of the interviewer: why redis is so fast, how to support high concurrency, and how to solve the problem of concurrent competition
preface Redis is currently a hot NoSQL database, which has almost become the standard configuration of high concurrency and high availability systems. If the recognition of redis’s fast response is only based on memory and single thread, I’m afraid it’s difficult to win the offer of big companies. This article focuses on the single thread […]
-
Use ASM to implement the method interception framework, and there is no need to write duplicate code
MehodInterceptor Project address MehodInterceptor preface Mehod interceptor is a method that uses ASM to dynamically modify bytecode to achieve method interception. Through this framework, you can control whether a method is executed. For example, some businesses have some common judgment logic: for example, pop up a confirmation prompt to judge whether the user logs in […]
-
The most popular operating system in the world is not windows?
preface Stop, I know you were cheated by the title, but this topic is not my boasting. The most popular operating system in the world is really not windows. When it comes to the operating system, we are impressed by nothing more than windows, Linux, MacOS, IOS or Android. However, the operating system I want […]
-
Springboot source code MVC workflow (Part 2)
Return value processing The previous section mentioned that dispatcherservlet finds the corresponding class method according to the access path. After calling the class method, it needs to process the return value, such as returning JSON. Open the source code and do it~ Back in time ~ go back to the dodispatch() method and find this […]
-
Springboot + shardingsphere completely solves the problem of encryption and decryption of database fields in production environment
preface companies in the Internet industry must encrypt the sensitive fields of the database. There are many schemes. The most direct one is to write an encryption and decryption tool class and then process it manually in each business logic. This method is obviously unrealistic in slightly large-scale projects, which is not only heavy […]
-
Blow up your CPU
Blow up your CPU Intro This is the last article in this code series——Full CPU, relatively speaking, it is simpler than the previous three, and there are not so many knowledge points. Today, let’s try to write a piece of code to fill up the CPU and make the CPU utilization of all processors reach […]
-
Netty series: performance is king! Create a multiplex http2 server
brief introduction In the previous article, we mentioned that the client of netty can support multiplexing by using http2framecodec and http2multiplexhandler, that is, create multiple sub channels based on a connected channel and process different streams through sub channels, so as to achieve the purpose of multiplexing. Since the client side can achieve multiplexing, the […]
-
C serial 23 – usage of star in input and output
1、 Return value of scanf() The scanf() function returns the number of items successfully read If no item is read, and a number needs to be read, but a non number is read, 0 will be returned When “end of file” is detected, EOF will be returned (EOF is a special value in the header […]