Java
-
Spring and mybatis are combined to realize multi data source switching function
Without much nonsense, the key codes are as follows: 1. Code: dbcontextholder 2. Code: dynamicdatasource 3. Code: spri…… -
Java perpetual calendar to obtain the calendar table of the month and year
This article uses Java technology to input the year and month to obtain the calendar table. The following is a code to…… -
Two ways of spring boot Ajax cross domain
preface In most cases, the Java language will be used as a back-end language for the front-end PHP, node JS provides A…… -
Solutions to XML-RPC Chinese problems in PHP and Java
Problem Description: when using PHP and Java to operate XML-RPC, if the request contains Chinese characters, it will b…… -
Java verification code tool instance code
Tools: VerifyCodeServlet: LoginServlet: login. jsp: loginsuccess: Welcome, warm welcome, welcome <% = username% &…… -
Java input a year, a month and a day to judge the day of the year
Title: enter a certain day of a certain month in a certain year to judge the day of the year? Program analysis: take M…… -
Java uses JSON lib to handle JSON details and example code
Java uses JSON lib to handle JSON [project environment] 1. Convert JSON array object to list object; 2. Convert list t…… -
Introduction to ztree
[introduction] Ztree uses the core code of jQuery to implement a set of tree plug-ins that can complete most common fu…… -
String. Format (c# Java)
c#string. format Numeric format of string C or C currency D or D Decimal number E or e Scientific type F or F Fixed po…… -
Example code of spring security picture verification code function
Verification code logic Verification codes have been made in the project before. There are many codes for generating v…… -
Sample code used by the fullcalendar calendar plug-in of the Java Web project
This article introduces the sample code used by the fullcalendar calendar plug-in of the Java Web project and shares i…… -
2017 java development job interview questions worth collecting
The following is my own collection of interview questions for Java posts in 2017, which can be used to prepare for the…… -
Spring Security Oauth2. 0 implementation of SMS verification code login example
This article introduces spring security oauth2 0 realizes the login example of SMS verification code, which is shared …… -
Application code example of Java concurrency condition blocking condition
This paper mainly studies the application example code of Java concurrency condition blocking condition, as follows. C…… -
Explain in detail how to use spring security OAuth to implement OAuth 2.0 authorization
OAuth 2.0 is an industrial level authorization protocol. OAuth 2.0 is inherited from OAuth 1.0, which was created in 2…… -
Hibernate closed instance resolution about session
This paper mainly studies the closing of session in Hibernate, as follows. 1. What is the difference between getcurren…… -
How to install Jenkins on CentOS
Jenkins is an open source continuous integration tool written in Java. It can be installed directly on CentOS through …… -
Spring cloud client load balancing ribbon in-depth understanding
1、 Load balancing load balancing (load balance): Based on the existing network structure, it provides a cheap, effect…… -
Code explanation of traditional thread synchronous communication technology of Java concurrency
This paper mainly studies the code examples of Java Concurrent traditional thread synchronous communication technology…… -
Detailed explanation of spring transaction propagation and its implementation principle
This paper mainly studies the spring transaction propagation and its implementation principle. The details are as foll…… -
Resolve the “XML parser error on line 1: content not allowed in preface” error
When publishing a project with eclipse, if you edit the XML file in the project with the Notepad provided by windows a…… -
Cross domain, custom query and paging of spring boot (5)
Cross domain We have initially made a protected rest API, but we haven't covered a very important issue in the front-e…… -
Introduction and example analysis of spring transaction isolation level
This paper mainly studies the introduction and examples of spring transaction isolation level, as follows. When two tr…… -
Creation and operation of spring boot project (picture and text)
summary I haven't played spring boot yet. Now more and more companies are using it and have to learn. This is the begi…… -
Detailed steps for installing Jenkins under CentOS 7 system
This article mainly introduces the relevant contents about installing Jenkins in CentOS 7 for your reference and learn…… -
How spring boot uses spring security for security control
When writing web applications, we often need to do some security control on the page. For example, users without acces…… -
Java graphic verification code generation tool class web page verification code
Recently, I made a verification code and found many problems with reference to online cases. I specially modified and …… -
Spring boot integration mybatis example code (concise version)
summary Now, most Internet applications still use mybatis to operate databases. This article introduces how to integra…… -
Spring boot example tutorial for creating non executable jar packages
We often have this scenario. We just need to turn spring boot into an ordinary jar package without a configuration fil…… -
Migration of GC log parameters in Java 9
order This paper mainly studies the migration of java9 GC log parameters. Unified logging of JVM and GC Java 9 introdu…… -
JSP spring boot / cloud uses filter to prevent XSS
JSP spring boot / cloud uses filter to prevent XSS I preface XSS (cross site scripting attack) Cross site scripting is…… -
Analysis of the starting principle of spring boot jar
1. Preface Recently, when I was free to optimize the company's open API platform, I suddenly thought that I was famili……