Java
-
Crud practice of Hibernate
As a highly encapsulated persistence layer framework, hibernate used to be very powerful. Now, although it is not wide…… -
Whitelist of microservice internal communication
There are many ways to communicate with microservices. Some use sockets, some use HTTP client tool classes, and some h…… -
Custom events for spring (10)
The simple process of writing custom events is as follows: (1) Write customevent java (2) Write customeventpublisher j…… -
Singleton mode and JDBC
Singleton pattern is a common software design pattern. Its core structure contains only a special class called singlet…… -
Comparative analysis of mybatis + hibernate + jdbc
At present, mybatis is used most as a persistence layer because it meets the variability of Internet development. Ther…… -
Easypoi import Excel
Easypoi's excel export function is as simple as its import function. As I stressed before, the essence of easypoi is P…… -
Spring Boot:The field file exceeds its maximum permitted size of 1048576 bytes
Error message: the field file exceeds its maximum allowed size of 1048576 bytes because Tomcat is embedded in springbo…… -
SSM framework about using JSP as a view to show the problem solution
JSP has been used as a view layer to display data for a long time. No matter studying in school or working in an enter…… -
Multiple versions of spring source code address sharing
The source code address is: http://repo.spring.io/simple/libs-release-local/org/springframework/spring/ For friends wh…… -
Shiro actual combat series (15): Spring integration Shiro
Shiro's JavaBean compatibility makes it ideal for using spring XML or other spring based configuration mechanisms. The…… -
Merge list and de duplication in Java 8
The core code is as follows: The final result output is a B C. Application scenario: sometimes we need to merge two re…… -
Authorization of Shiro actual combat series (6)
Authorization, also known as access control, is the process of resource access management. In other words, control who…… -
Handler message under Android
The implementation principle of handler message in Android is studied: When new handler(), get the data under the curr…… -
There is no normal TM
Error key information: Just add the following code in the configuration file (application. Properties): Error reason: …… -
LCN error: attempts to join the non-existent transaction group
Error message: Solution: configure the following contents in TX LCN project to solve the problem: Repackaging is requi…… -
Multi data source configuration of SSM framework
Application scenario of multiple data sources: mainly how to combine multiple databases to meet business requirements …… -
Subject of Shiro actual combat series (10)
There is no doubt that the most important concept in Apache Shiro is subject. " Subject 'is just a security term, whic…… -
Reflection technology of mybatis + JDK dynamic agent + cglib agent
1、 Reflection Description of Baidu Encyclopedia: -
@Differences between requestparam and @ pathvariable and their application scenarios
@There is little difference between requestparam and @ pathvariable, mainly because the requested URL is different Whe…… -
Architecture sharing of open source projects
This sharing is the idea and style of some open source project architecture I referred to when developing a system. Th…… -
Shiro actual combat series (14) configuration
Shiro is designed to work in any environment, from the simplest command-line application to the largest enterprise clu…… -
Java 5 minutes to insert tens of millions of data
Although the insertion may not be completed in 5 minutes, it depends on the inserted fields. If there are too many fie…… -
Three principles of code abstraction in Java Web interface online configuration code generator programming
For the code generated by directly running the main method, please refer to my article: the code generator of MP pract…… -
Integration of SSM framework (Maven example)
Many friends report errors in Maven because of POM file dependency Today, I quickly set up the SSM framework to ensure…… -
Shiro practical combat series (I): introduction to practical combat
1、 What is Shiro? Apache Shiro is a powerful and flexible open source security framework that cleanly handles authent…… -
Cross domain problem solving of spring cloudgateway gateway
Application scenario: all microservices pass through the gateway. When interfacing with the front end, cross domain is…… -
Httputil of hutool tool class uses HTTPS
For how to use httputil of hutool tool class, please refer to the official document httputil of hutool In fact, HTTP a…… -
Solving the problem of Tomcat running timeout
I've been too lazy to record before, but I think it's better to record recently. Because the project is too large, the…… -
Java obtains virtual machine memory, operating system memory and their threads
Why get virtual machine memory and operating system memory? Virtual machine memory, which mainly refers to JVM. In ord…… -
MVC framework of spring (XVI)
MVC framework tutorial Spring web MVC framework provides a model view control architecture and components that can be …… -
JS to clear cookies
Recently, the new system development uses cookies to store user information and uses DES encryption Tools are as follo…… -
Spring configuring cross domain requests
This article focuses on the Spring + spring MVC + mybatis / mybatis plus framework environment, including springboot. ……