Java
-
Spring security developed in Java realizes the authentication function based on mongodb
This paper describes the spring security developed by java to realize the authentication function based on mongodb. Sh…… -
Detailed explanation of spring boot log control
The log processing of spring boot is completely consistent with our usual log processing through logback XML for log m…… -
Basic use of fastjason in Java
Fastjson is a high-performance, fully functional and fully supported Java language http://json.org Standard JSON libra…… -
Detailed explanation of reverse engineering steps based on mybatis
I personally feel that this is the simplest of the detailed steps of generating reverse engineering using mybatis. Alt…… -
23 design patterns (1) Java singleton pattern
23 design patterns Part 4: Java singleton pattern definition: Singleton pattern is a common software design pattern. I…… -
Publish the spring boot project to the Tomcat container (including the methods published to Tomcat6)
Because spring boot is embedded with Tomcat container, the project can be published by packaging it as a jar package, …… -
Solution to the problem of options forbidden 403 in spring cloud
Abstract: This paper briefly describes the problem of options requesting forbidden when bloggers need cross domain deb…… -
Detailed explanation of smooth closing of Message Queue task in Java
preface Message Queuing Middleware is an important component in distributed system. It mainly solves the problems of a…… -
Examples of simple implementation of UDP and TCP in Java
TCP implementation TCP protocol needs to establish a connection between both parties and exchange data through input a…… -
Detailed explanation of variables and constants in Java
variable and constant There are a lot of data in the program to represent the state of the program. Some data will ch…… -
Code examples of seven ways of thread synchronization in Java multithreading
Why use synchronization? Java allows multithreading concurrency control. When multiple threads operate a shareable res…… -
Java designer pattern simple factory pattern parsing
brief introduction Simple factory mode is also called static factory method mode. Simple factory mode usually defines …… -
Method example of solving the problem of losing handkerchief based on bidirectional ring linked list in Java
This paper describes the method of solving the problem of losing handkerchief based on bidirectional ring linked list …… -
An example of paging query implemented by SSM
Implementation of paging query with SSM integration 1、 Pagination is realized through the limit query statement and d…… -
Analysis of purge deadlock in MySQL database
Purge deadlock Scenario description Purge deadlock description There are records (unique keys) 10, 20, 30, 40 (with se…… -
Example code of coding and garbled code when java servlet uses printwriter
In the coding and garbled code series in the previous web pages, the dynamic response stream constructed by servlet ha…… -
Java gets an instance of the relative webapp address of a web project
Examples are as follows: The above example of Java obtaining the relative webapp address of a web project is all that …… -
Java design pattern — detailed explanation of factory design pattern
Factory pattern: it is mainly used to instantiate classes with common interfaces. Factory pattern can dynamically dete…… -
An example of implementing AOP by dynamic agent simulation
AOP implementation code is quite simple The main core is dynamic proxy and reflection I Interface class: II Interface …… -
Method of obtaining path based on Java file and web application
1. Understanding of basic concepts `Absolute path `: the real path of the file or directory on your application on the…… -
Scheduled tasks based on quartz (detailed explanation)
brief introduction Quarzt is an open source project that regularly executes tasks in the project. Quartz is another op…… -
CAS explanation of Java Concurrent Programming
CAS (compare and swap) compare and replace is a technique used in designing concurrent algorithms. In short, compare a…… -
Example of using URL + urlconnection in Java network programming
catalogue HTTP get and post From URLs to local files In Java Net package contains two interesting classes: URL class a…… -
On the usage of = = and equals methods in Java
The equals method is Java Method of lang.Object class. There are two usage instructions: (1) For string variables, the…… -
Struts 2 implements the interception operation method of action request object
The core function of struts 2 is action. For developers, using struts 2 is mainly to write action. Action classes usua…… -
How to create a JDBC program in Java
Introduction to JDBC Before JDBC, we use drivers to establish connections between Java programs and databases such as …… -
Introduction to hashcode method in Java
The data structure of hash table must be familiar to most people, and hash table will be used in many places to improv…… -
Method of creating a server using spring boot embedded container undertow
Undertow is a web server, so it needs to have the basic characteristics of modern web server, such as servlet, JSP, fi…… -
Detailed explanation of Maven configuration dependency of spring boot
This paper introduces the Maven configuration dependency of spring boot and shares it with you as follows: We add spri…… -
The concept, classification and usage of container in java development are explained in detail
This paper describes the concept, classification and usage of container in java development. Share with you for your r…… -
Case analysis of spring boot email sending function
Introduction to mail service Mail service has appeared in the early days of the Internet, and now it has become an ind…… -
Example of application packaging deployment implemented by spring boot
1. Spring boot built-in web Spring boot is integrated into the web container by default. The startup method is started……
