Java
-
Introduction and example analysis of spring transaction isolation level
This paper mainly studies the introduction and examples of spring transaction isolation level, as follows. When two tr…… -
Creation and operation of spring boot project (picture and text)
summary I haven't played spring boot yet. Now more and more companies are using it and have to learn. This is the begi…… -
Detailed steps for installing Jenkins under CentOS 7 system
This article mainly introduces the relevant contents about installing Jenkins in CentOS 7 for your reference and learn…… -
How spring boot uses spring security for security control
When writing web applications, we often need to do some security control on the page. For example, users without acces…… -
Java graphic verification code generation tool class web page verification code
Recently, I made a verification code and found many problems with reference to online cases. I specially modified and …… -
Spring boot integration mybatis example code (concise version)
summary Now, most Internet applications still use mybatis to operate databases. This article introduces how to integra…… -
Spring boot example tutorial for creating non executable jar packages
We often have this scenario. We just need to turn spring boot into an ordinary jar package without a configuration fil…… -
Migration of GC log parameters in Java 9
order This paper mainly studies the migration of java9 GC log parameters. Unified logging of JVM and GC Java 9 introdu…… -
JSP spring boot / cloud uses filter to prevent XSS
JSP spring boot / cloud uses filter to prevent XSS I preface XSS (cross site scripting attack) Cross site scripting is…… -
Analysis of the starting principle of spring boot jar
1. Preface Recently, when I was free to optimize the company's open API platform, I suddenly thought that I was famili…… -
On Hibernate n + 1 problem
Stored in the session cache are interrelated object graphs. By default, when hibernate loads the customer object from …… -
Implementation example of oauth2 logoff under spring cloud
Following the above implementation of oauth2 based authentication and authorization under spring cloud, we will implem…… -
Java implementation uses FreeMarker to perfectly export word documents (with pictures)
preface Recently, in the project, due to the customer's requirements, the page content (such as contract agreement) wa…… -
It perfectly solves the problem that ports such as 8080 are occupied when deploying Tomcat on eclipse
Problem Description: When deploying Tomcat in eclipse, the following error occurs. The solution is as follows: Method …… -
Java reads the picture from the network and saves it to the local instance
This example shares the specific code that Java reads pictures from the network and saves them locally for your refere…… -
Detailed explanation of communication examples between threads in Java multithreading
Communication between threads in Java multithreading 1、 Use the while mode to realize the communication between threa…… -
Java implementation of fuzzy matching files under a folder and delete function example
This example describes the function of fuzzy matching and deleting files in a folder implemented in Java. Share with y…… -
Sample code for integrating fastdfs using spring boot
In this article, we introduce how to use spring boot to upload files to the distributed file system fastdfs. This proj…… -
Detailed explanation of the method of using condition class to operate lock in Java multithreaded programming
The function of condition is to control the lock more accurately. The await() method in condition is equivalent to the…… -
Detailed explanation spring boot uses redis cluster to replace mybatis L2 cache
1 . pom. Add dependency to XML 2 . To configure the redis cluster, refer to the official spring data redis documentati…… -
Summary of this escape problem in Java Concurrent Programming
This escape means that other threads hold a reference to the object before the constructor returns Calling methods on …… -
Java 9 distinguishes between opens and exports
order This article focuses on some considerations for migrating to Java 9. Migration type Several precautions Unreadab…… -
Java implementation of simple console address book
The sub menus at all levels are controlled through the main menu, and the functions of adding records, finding records…… -
Java implementation of XML file student address book
Java realizes the student address book, uses XML file as data storage, and realizes the functions of adding, deleting,…… -
Java array permutation and combination problem summary
During the interview or written examination, I have encountered the following four hand tearing algorithms for arrange…… -
Summary of frequently asked questions about feign in spring cloud
1、 Feignclient interface, cannot use composite annotations such as @ gettingmapping Code example: The @ requestmappin…… -
In depth analysis of zuul filter built in spring cloud
preface Spring cloud is written and enabled for zuul by default. What are the functions of these filters? We might as …… -
Experience of escape in Java
It is generally believed that new objects are allocated on the heap, but this is not entirely correct. Through the ana…… -
Introduction to using preconditions to check incoming parameters in Java
Preconditions is a class library in guava, which is used to check the incoming parameters. A common usage is as follow…… -
Java generate graphic verification code tool class
Generate verification code effect ValidateCode. Java verification code generation class ImgFontByte. java ValidateCode…… -
Introduction to some new features of Java 9
Accepted characteristics 1 Jigsaw project; Modular source code Jigsaw project is to modularize java code and divide JR…… -
Explanation of enumset instead of bit field code in Java
This paper mainly studies the related content of enumset instead of bit field in Java, which is introduced as follows.……