Java
-
Java – string packed loop logic
My for loop is a bit biased for my string compression I've been doing this task for the past five days. I can't figure…… -
Java – how to use Weblogic to detect connection leaks in JDBC?
Is there any way to detect the connection leakage in the project without load test I am using WebLogic Server. Is ther…… -
Java – jlabel can have img tag
I'm trying to display a jlabel with several lines of text and images as follows: @ h_ 502_ 2@String html = " hello "…… -
java – org. apache. hadoop. mapreduce. counters. Limitexceededexception: too many counters: 121 max = 120
I'm running a Hadoop job (from oozie) with few counters and multiple outputs I got the following error: org apache. ha…… -
Usage example of project bean in spring actual combat container
This article describes the usage of project bean in spring container. Share with you for your reference, as follows: O…… -
Joint search set of data structure and algorithm (Disjoint Set)
Recognize and search the set Many people will feel strange to the joint query set (Disjoint Set), have never heard of …… -
Example of uploading files to OSS (alicloud) using java
This article describes how Java implements the function of uploading files to OSS (Alibaba cloud). Share with you for …… -
The correct way to implement the exit function of spring security (recommended)
Introduction to spring security The core functions of spring security mainly include: Its core is a set of filter chai…… -
Detailed explanation of the process of building Eureka server port with multiple modules of spring could
This article mainly introduces the detailed process of building Eureka server port with multiple modules in springcour…… -
Java realizes account withdrawal and deposit operations
This article mainly introduces the Java implementation of account withdrawal and deposit operation. The example code i…… -
Benefit analysis of java interface
This article describes the advantages of java interface. Share with you for your reference, as follows: What is the fu…… -
Basic knowledge points of Java language and platform
Before using Java, we should first make clear the difference between the Java language and the Java platform. However,…… -
Writing examples of 7 singleton modes in Java version
preface Today, I saw a sentence in an article. Add V before single example DCL. Let me take a closer look at the singl…… -
Detailed explanation of spring IOC container knowledge points
Spring IOC container can be compared to a restaurant. When you come to a restaurant, you usually directly greet the wa…… -
Simple implementation of Huffman algorithm for Java optimal binary tree
The optimal binary tree is also called Huffman tree. The straight point is that each node has weight. We let the large…… -
Mybatis-Plus3. 2.0 metaobjecthandler cannot globally populate public fields
Problem description Recently, the project architecture team has taken the following measures for the decision of confi…… -
Automatic configuration does not take effect after inheriting webmvcconfigurationsupport and how to configure interceptors
There are many articles on the Internet about spring boot2 After 0, it is recommended to directly implement webmvcconf…… -
Spring security can automatically log in to “remember me” within two weeks
This article is part of the spring security series. In the previous article, we implemented userdetailsservice and use…… -
Spring security dynamically loads user role permissions to realize login and authentication functions
Many people find it difficult to implement login verification with spring security, and I felt the same when I first l…… -
Analysis of the underlying implementation principle of Java serialization and deserialization
1、 Basic concepts 1. What are serialization and deserialization (1) Java serialization refers to the process of conve…… -
Explain the formlogin login authentication mode of spring security in detail
1、 Application scenario of formlogin In the previous articles in this column, we have introduced the httpbasic mode o…… -
Parsing process of creating XML (no Chinese garbled code) based on Java
This article mainly introduces the parsing process of creating XML (no Chinese garbled code) based on Java. It is intr…… -
Methods of using wildcards in struts 2 configuration files (three forms)
Introduction to struts 2 Struts 2 is a web application framework based on MVC design pattern. It is essentially equiva…… -
Java 8 calculation of time difference method example
package insping; import java.time.LocalDate; import java.time.Month; import java.time.Period; public class Test { …… -
Detailed explanation of new I / O knowledge points of java7
This chapter focuses on the changed I / O API in the Java language, which is called "renewed I / O" or NiO 2 (jsr-203)…… -
Spring’s actual operation example of obtaining the ID of the bean itself
This example describes the actual operation of spring to obtain the ID of the bean itself. Share with you for your ref…… -
Detailed explanation of Java multithreaded communication implementation
This article mainly introduces the detailed implementation of Java multi-threaded communication. The example code is i…… -
Log4j novice quick start tutorial
brief introduction Log4j is an open source project of Apache (official website) http://jakarta.apache.org/log4j ), by…… -
Java console to achieve guessing games
This example shares the specific code of Java guessing game for your reference. The specific contents are as follows L…… -
Java implements audio playback code examples by reading and writing
This article mainly introduces the example of audio playback code in Java by reading and writing. The example code is …… -
Spring declarative transaction implementation process parsing
/** * 声明式事务: * * 环境搭建: * 1、导入相关依赖 * 数数据 * 3、给方法上标注 @Transactional 表示当前方法是…… -
Examples and solutions of java thread deadlock
This article mainly introduces java thread deadlock examples and solutions. The example code is introduced in great de……
