Java
-
Spring boot using Druid
Druid is the best database connection pool in the Java language and can provide powerful monitoring and extension func…… -
How to use Java array correctly in instance parsing
1、 On the characteristics of arrays 1 In Java, whether you use arrays or collections, there are boundary checks. If t…… -
How does Java create files in a directory where no folder exists
The core code is as follows: 1、 2、 summary The above is what Xiaobian introduced to you about how Java creates files…… -
Summary of four methods of passing multiple parameters in mybatis
preface Now most projects use mybatis, but some companies use hibernate. The biggest feature of using mybatis is that …… -
Spring boot uses Druid for dimension statistics and monitoring
Druid Druid: a database connection pool framework for monitoring. The whole project is composed of database connection…… -
Detailed explanation of mybatis method to prevent SQL injection
SQL injection is a very simple attack, but it is still very common today. The reason is no patch for stupid. Why? Let'…… -
Solutions for mybatis to pass multiple parameters (three)
The editor will share three solutions to the problem of mybatis passing multiple parameters. The details are as follow…… -
Redis introduction and usage scenario explanation
This article mainly introduces the introduction and usage scenarios of redis. Xiaobian thinks it's very good. Now I'll…… -
In depth understanding of cookies and sessions in Java Web Learning
The difference between cookie mechanism and session mechanism Specifically, the cookie mechanism adopts the scheme of …… -
Rxjava + retro fit + MVP realize shopping cart function
This example shares the specific code of rxjava retro to realize the shopping cart for your reference. The specific co…… -
Complete example tutorial of spring MVC + fastjason + Hibernate validator integration
1: Hibernate validator Foundation 1. Introduction: By using annotation annotations to impose constraints on classes o…… -
An instance of mybatis preventing SQL injection
SQL injection is a common attack method, which is familiar to everyone. The attacker enters some strange SQL fragments…… -
Implementation of ordered array merging algorithm for merging algorithm
Implementation of ordered array merging algorithm for merging algorithm A simple ordered array merging algorithm: writ…… -
Java gets all key value pair instances in JSON
As follows: The above example of Java obtaining all key value pairs in JSON is all the content shared by Xiaobian. I h…… -
Analysis of spring declarative transaction management
Cutting edge: through in-depth study of spring transaction management, this article will not do an example, but specif…… -
How to use onetomany in Java
Write at the beginning Onetomany declared using jhipster has no mapping relationship with many's dto in one's dto. In …… -
Solution to list and stream de duplication in Java
problem At present, the Internet technology is mature, and more and more tend to be decentralized, distributed and str…… -
Method of checking QQ number by Java regular expression
Java regular expression Regular expressions define the pattern of strings. Regular expressions can be used to search, …… -
Understanding of hibernate and mybatis in Java Web learning tutorial
preface In Java Web development, the most classic is the SSH framework combination and SSM framework combination. Now …… -
Spring boot integrates Druid database connection pool
1. Preface Druid database connection pool is open source by Alibaba. It is known as the best database connection pool …… -
Java convolutional neural network (Introduction to cupcnn)
preface In machine learning, convolutional neural network is a deep feedforward artificial neural network, which has b…… -
Java custom log output file (log4j log file outputs multiple custom log files)
Log4j outputs multiple custom log files. If you need to output independent log files in practical application, how can…… -
How to write the map parameter of the list array passed in by mybatis
Foreach is mainly used to build in conditions. It can iterate a set in SQL statements. The attributes of foreach eleme…… -
Java development naming specification summary
Precautions before use: 1. Due to the characteristics of java object-oriented programming, nouns should be selected as…… -
Detailed spring cloud Eureka multi network card configuration summary
When deploying Eureka high availability solution on the Linux host, it was found that the service IP registered in the…… -
Explain the implementation principle of spring retry in detail
In the previous blog, I introduced the use of spring retry. This article demonstrates the implementation principle of …… -
Spring cloud Eureka instance code for service registration and discovery of spring cloud
@H_ 502_ 1 @ I. Introduction to spring cloud Spring cloud is a microservice architecture development tool based on the…… -
Java Web project front end specification (deep decoupling of JS with namespace)
An excellent code architecture is not only easy to develop and maintain, but also an art of management and execution. …… -
Spring boot injects configuration properties into bean classes
1、 Use of @ configurationproperties annotation Look at the configuration file. My configuration is in yaml format: Ne…… -
Detailed explanation of spring boot configuration file (summary)
Spring boot provides two common configuration files: properties file and YML file. Their role is to modify the default…… -
English phrases that Java programmers need to master
This article shares the English phrases that Java programmers must master for your reference. The specific contents ar…… -
10 skills you should master as a java programmer
This article lists in detail the 10 skills that a java programmer should master. Share with you for your reference. Th……