Java
-
Java – why is it necessary to override hashcode and equals methods of HashMap?
See English answers > what issues should be considered when overriding equals and hashcode in Java? 11 Now I've rea…… -
Java dateformat: how to handle “ST”, “nd”, “Rd”, “th”?
How to use some dateformats to parse such strings? As far as I know, there is nothing in simpledateformat Solution Try…… -
In Java, is there a type constant equivalent to Pascal
In Delphi / Pascal, there is a mechanism through which local variables in a method can remember the value from one met…… -
Java – core and core_ Differences between RT and JSTL Tags
When I use <% @ taglib URI = "http: / / Java. Sun. COM / JSP / JSTL / core" prefix = "C"% > for my struts 1.3 10…… -
Java realizes account withdrawal and deposit operations
This article mainly introduces the Java implementation of account withdrawal and deposit operation. The example code i…… -
Benefit analysis of java interface
This article describes the advantages of java interface. Share with you for your reference, as follows: What is the fu…… -
Usage example of project bean in spring actual combat container
This article describes the usage of project bean in spring container. Share with you for your reference, as follows: O…… -
Joint search set of data structure and algorithm (Disjoint Set)
Recognize and search the set Many people will feel strange to the joint query set (Disjoint Set), have never heard of …… -
Example of uploading files to OSS (alicloud) using java
This article describes how Java implements the function of uploading files to OSS (Alibaba cloud). Share with you for …… -
The correct way to implement the exit function of spring security (recommended)
Introduction to spring security The core functions of spring security mainly include: Its core is a set of filter chai…… -
Detailed explanation of the process of building Eureka server port with multiple modules of spring could
This article mainly introduces the detailed process of building Eureka server port with multiple modules in springcour…… -
Java implements audio playback code examples by reading and writing
This article mainly introduces the example of audio playback code in Java by reading and writing. The example code is …… -
Spring declarative transaction implementation process parsing
/** * 声明式事务: * * 环境搭建: * 1、导入相关依赖 * 数数据 * 3、给方法上标注 @Transactional 表示当前方法是…… -
Examples and solutions of java thread deadlock
This article mainly introduces java thread deadlock examples and solutions. The example code is introduced in great de…… -
Detailed explanation of web client usage in spring 5
preface Spring 5 brings a new responsive web development framework Webflux and a new httpclient framework webclient. W…… -
Java 7 improved exception handling
There are two improvements in exception handling - multicatch and final re throwing. To see how they can help us, firs…… -
Detailed explanation of volatile keyword in Java concurrency tutorial
introduction When it comes to multithreading, I think the most important thing is to understand the concept of a criti…… -
Using nail robot to push message to nail group based on Java
This article mainly introduces the use of nail robot to push messages to nail groups based on Java. The example code i…… -
Spring security test practice
introduction The security module of the test question management system uses spring security, and the code is transpla…… -
Spring boot JPA service layer code example
This article mainly introduces the spring boot JPA service layer code examples, which are introduced in great detail t…… -
Parsing process of reading XML file content through Java
This article mainly introduces the content parsing process of reading XML files through Java. It is introduced in grea…… -
Java uses socket to determine whether a service can connect to a code instance
This article mainly introduces how Java uses socket to judge whether a service can be connected. The example code is i…… -
Analysis of PDF file generated by Java based on rich text
This article mainly introduces the process of generating PDF files by Java according to rich text. It is introduced in…… -
Spring boot builds a file server to solve the problem of uploading and downloading multiple pictures at the same time
In normal business scenarios, it is inevitable to build a file upload server as a public service. Generally, only a si…… -
Spring process analysis of ActiveMQ message queue technology integration
This article mainly introduces the integration of ActiveMQ message queue technology and spring process parsing. It is …… -
Basic knowledge points of Java language and platform
Before using Java, we should first make clear the difference between the Java language and the Java platform. However,…… -
Writing examples of 7 singleton modes in Java version
preface Today, I saw a sentence in an article. Add V before single example DCL. Let me take a closer look at the singl…… -
Detailed explanation of spring IOC container knowledge points
Spring IOC container can be compared to a restaurant. When you come to a restaurant, you usually directly greet the wa…… -
Simple implementation of Huffman algorithm for Java optimal binary tree
The optimal binary tree is also called Huffman tree. The straight point is that each node has weight. We let the large…… -
Mybatis-Plus3. 2.0 metaobjecthandler cannot globally populate public fields
Problem description Recently, the project architecture team has taken the following measures for the decision of confi…… -
Automatic configuration does not take effect after inheriting webmvcconfigurationsupport and how to configure interceptors
There are many articles on the Internet about spring boot2 After 0, it is recommended to directly implement webmvcconf…… -
Spring security can automatically log in to “remember me” within two weeks
This article is part of the spring security series. In the previous article, we implemented userdetailsservice and use……