Home
Chang Wan
Cancel

Why I Don't Recommend Using the Singleton Pattern?

Contents What is Singleton Pattern? The Effect of the Singleton Pattern How to Implement a Singleton? Eager Initialization Lazy Initialization ...

Buffer Overflow Attacks

Contents What is a Buffer Overflow Attack? Why Buffer Overflow Attacks are Feasible Some Types of Buffer Overflow Attacks Changing the Program Return Addr...

Table Value Parameter (TVP)

In the evolving landscape of database management and SQL programming, efficiency and flexibility in handling data operations are paramount. Table Value Parameters (TVPs) stand out as a powerful fea...

Getters/Setters Are Evil in OOP

Many compilers or libraries, such as Lombok, will also provide the ability to quickly add Getter/Setter. There’s nothing wrong with these tools, they can help programmers write sample code easily. ...

Big Refactoring

In the lifecycle of any software project, there comes a time when incremental updates and minor tweaks are no longer sufficient. This is where Big Refactoring steps in, a process that can rejuvenat...

Locks in Java

In the world of Java concurrency, understanding and effectively using locks is crucial for building reliable and efficient multi-threaded applications. Locks in Java provide a mechanism for control...

Different Thread Pools in Java

At its core, a thread pool manages a collection of worker threads that execute tasks. This approach offers several benefits, including reduced overhead from thread creation and destruction, improve...

Multithreading in Java

Contents Understanding Multithreading in Java Key Benefits of Multithreading Implementing Multithreading (Thread, Runnable, and Callable) in Java Example ...

Preview Image

Clean Code: Concurrency

Writing clean concurrent programs is hard — very hard. It is much easier to write code that executes in a single thread. It is also easy to write multithreaded code that looks fine on the surfac...

Reverse Engineering

Contents What is Reverse Engineering? Different Representations of Reverse Engineering Overall Process of Reverse Engineering Compiled Execution & Interpreted Executio...

ip