Java
-
Detailed examples of Java design pattern (DAO)
Detailed examples of Java design pattern (DAO) Application scenario: in Java programs, it is often necessary to persis…… -
Reentry lock and read-write lock in Java Concurrent Programming
Reentry lock Reentry lock, as its name suggests, is a lock that supports reentry. It means that the lock can support r…… -
Implementation method of cross domain request of CORS in Java
problem When developing projects using the front-end and back-end separation mode, we often encounter such a problem -…… -
Spring MVC file upload sample code
As always, record common and easy to forget things. This blog post is mainly about how spring MVC uploads files. The f…… -
Exception handling method based on Java sub thread (general)
In ordinary single threaded programs, you only need to catch exceptions through try catch ... finally ... Just code bl…… -
Ratelimiter source code analysis
As the saying goes, caching, current limiting and degradation are the three sharp swords of the system. When exporting…… -
Details of spring transaction propagation properties and isolation levels
1 propagation attribute of transaction 1) Required, this is the default attribute Support a current transaction,create…… -
Spring spel expression usage example
Spring in action third edition reading notes spring3. 0 introduces spring expression language (spel), which we can imp…… -
Spring security custom login page
In the project, we certainly can't use the login page generated by spring, but use our own login page. Let's talk abou…… -
Implementation of thread waiting and notification in Java
Implementation of thread waiting and notification in Java preface: The key points to remember about waiting / notifica…… -
In depth understanding of spring MVC data transformation
This article mainly introduces the relevant contents of spring MVC data conversion for your reference and learning. Le…… -
Java spring annotation configuration bean instance code parsing
The previous articles all use XML to configure beans. If there are hundreds of beans, this is unimaginable. Therefore,…… -
Explain how to use spring security for automatic login authentication
In the previous blog's detailed configuration method of using spring MVC to create web projects and using spring secur…… -
An instance of list segmentation in Java
An instance of list segmentation in Java Problem: suppose system a finds a large list, and now system B wants to get t…… -
Detailed explanation of the use of iterators in Java
Detailed explanation of the use of iterators in Java preface: The iterator pattern encapsulates a collection, mainly p…… -
Java array expansion code example
In the process of writing programs, we often encounter that the array space is not enough. For example, I have initial…… -
Detailed explanation of spring boot JPA data deletion and transaction management
Today we'll introduce some pitfalls of JPA deletion and transaction. Let's take a look at the details. Business scenar…… -
Analysis of openfire cluster source code
This article introduces the relevant contents of openfire. It seems that there are not many people using this thing no…… -
Dead loop of Java non static member variables (detailed explanation)
1. Non static member variable 翻译错误 TIMEOUT example: result: Analysis: when new constructorcls() instantiates const…… -
What language is Hadoop
What is Hadoop? Hadoop is a software platform for developing and running large-scale data processing. It is an open-so…… -
Detailed explanation of merge sorting algorithm in Java
Detailed explanation of merge sorting algorithm in Java Merge sorting algorithm, as its name suggests, is an algorithm…… -
Setting up spring security environment
At present, spring officially only provides Maven download methods. But in http://maven.springframework.org There are …… -
Detailed explanation of single example mode of Java design pattern [lazy and hungry]
This article describes the singleton pattern of Java design pattern. Share with you for your reference, as follows: Si…… -
Explain the integration of spring and Shiro in detail
Shiro's components are JavaBean / POJO components, so it is very easy to use spring for component management. It is ve…… -
On spring boot event monitoring
Spring boot event listener: provides support for message communication between beans. When a bean has done something, …… -
Explain the mutex semaphore and multithreading waiting mechanism in Java
Mutex and semaphore are the basic concepts designed for concurrent programming in the operating system. The difference…… -
Struts 2 development process and detailed configuration
1: Struts development steps: 1. Web project, introduce struts - jar package 2. web. The core function of struts is in…… -
Log4j_ Configuration method (comprehensive explanation)
1、 Log4j introduction Log4j has three main components: loggers, Appenders, and layouts. It can be simply understood h…… -
Spring security database table structure instance code
PD modeling diagram Modeling statement summary The above is the example code of spring security database table structu…… -
Java background method to save Base64 string as picture
This paper introduces the method of saving Base64 strings as pictures in the Java background, which is shared with you…… -
Inheritance and abstract code examples of beans in spring
When we apply spring, we must use abstract classes in general design. How to configure these abstract beans in spring.…… -
Implementation steps of sending SMS in Java
1、 Registering users in China Netcom: This program is implemented through the SMS platform provided by China Netcom. ……