Java
-
Implementation principle of volatile in Java high concurrency
Implementation principle of volatile in Java high concurrency Absrtact: synchronized and volatile play an important ro…… -
Java method for creating and deleting files and directories (recommended)
Methods for creating and deleting file classes commonly used in files / directories 1. Boolean exists(): judge whether…… -
Zuul implementation of API gateway and request filtering in spring cloud introductory tutorial
brief introduction Zuul is Netflix's JVM based router and server-side load balancer. The most common scenario is to re…… -
Quartz method for realizing dynamic configuration of Java timing task
Let's talk about some problems that have nothing to do with this article. This period of time is particularly uncomfor…… -
The Java implementation terminates the running scheduled task in the thread pool
Recently, a new requirement in the project is to realize a function that can dynamically add scheduled tasks. At this …… -
Explain bitwise operators in Java
The bit operator of Java is used to operate on a single "bit" in the basic data type of an integer, that is, the hexad…… -
Rxjava + retro fit + MVP to realize shopping cart
This example shares the specific code of rxjava retro to display the shopping cart for your reference. The specific co…… -
Detailed explanation of spring boot using thymeleaf template
preface Thymeleaf is a template engine similar to velocity and FreeMarker, which can completely replace JSP. Compared …… -
Java 8 functional interface and functional interface examples
A functional interface is an interface that has only one abstract method, but can have multiple non abstract methods. …… -
Explain spring MVC request forwarding and redirection
Comparison between request redirection and request forwarding, httpservletresponse Sendredirect method and requestdisp…… -
spring boot 1.5. 4. Integrate Shiro + CAS to realize single sign on and permission control
1. Add Maven dependency (install cas-server-3.5.2 first. Please refer to the article for the installation steps) 2. Ad…… -
Perfectly solve the problem that spring declarative transactions are not rolled back
The @ transactional annotation is added to the service as usual. Why is there data inconsistency when querying the dat…… -
Detailed explanation of the use and parsing of property placeholder in spring
When we develop applications based on spring, we usually put the database configuration in the properties file Summary…… -
Retrofit + rxjava implementation downloads files with progress
Retrofit + rxjava is already the most mainstream network framework in the market. It is very easy to use it for ordina…… -
Java method example for reading files in the resource directory
This article mainly introduces the method of Java reading files in the resource directory. For example, this is the st…… -
Spring cloud uses zuul to implement API gateway service
Through the previous sharing, we learned about several core facilities of microservice architecture. Through these com…… -
Detailed explanation of mybatis method to prevent SQL injection
SQL injection is a very simple attack, but it is still very common today. The reason is no patch for stupid. Why? Let'…… -
Solutions for mybatis to pass multiple parameters (three)
The editor will share three solutions to the problem of mybatis passing multiple parameters. The details are as follow…… -
Redis introduction and usage scenario explanation
This article mainly introduces the introduction and usage scenarios of redis. Xiaobian thinks it's very good. Now I'll…… -
In depth understanding of cookies and sessions in Java Web Learning
The difference between cookie mechanism and session mechanism Specifically, the cookie mechanism adopts the scheme of …… -
Rxjava + retro fit + MVP realize shopping cart function
This example shares the specific code of rxjava retro to realize the shopping cart for your reference. The specific co…… -
Complete example tutorial of spring MVC + fastjason + Hibernate validator integration
1: Hibernate validator Foundation 1. Introduction: By using annotation annotations to impose constraints on classes o…… -
An instance of mybatis preventing SQL injection
SQL injection is a common attack method, which is familiar to everyone. The attacker enters some strange SQL fragments…… -
Implementation of ordered array merging algorithm for merging algorithm
Implementation of ordered array merging algorithm for merging algorithm A simple ordered array merging algorithm: writ…… -
Java gets all key value pair instances in JSON
As follows: The above example of Java obtaining all key value pairs in JSON is all the content shared by Xiaobian. I h…… -
Analysis of spring declarative transaction management
Cutting edge: through in-depth study of spring transaction management, this article will not do an example, but specif…… -
How to use onetomany in Java
Write at the beginning Onetomany declared using jhipster has no mapping relationship with many's dto in one's dto. In …… -
Solution to list and stream de duplication in Java
problem At present, the Internet technology is mature, and more and more tend to be decentralized, distributed and str…… -
Method of checking QQ number by Java regular expression
Java regular expression Regular expressions define the pattern of strings. Regular expressions can be used to search, …… -
Understanding of hibernate and mybatis in Java Web learning tutorial
preface In Java Web development, the most classic is the SSH framework combination and SSM framework combination. Now …… -
Spring boot integrates Druid database connection pool
1. Preface Druid database connection pool is open source by Alibaba. It is known as the best database connection pool …… -
Java convolutional neural network (Introduction to cupcnn)
preface In machine learning, convolutional neural network is a deep feedforward artificial neural network, which has b……