包含标签:Java 的文章
-
How to connect to gromy’s JMX faster
I use the Weblogic example: http://groovy.codehaus.org/Groovy +And + JMX connects JMX to groovy The problem is that th…… -
Java – joda time days since the era
I have a question, @ L_ 419_ The number of days since epoch returned by 0 @ library changes according to the date I en…… -
Cross platform with asynchronous support Net websocket server Library
Are there any cross platform (read: single friendly) libraries that provide websocket server support and allow asynchr…… -
Java – using enumerations in Scala
I have Scala style enumerations object SomeObject { final object SomeEnum extends Enumeration { type SomeEnum =…… -
Usage example of project bean in spring actual combat container
This article describes the usage of project bean in spring container. Share with you for your reference, as follows: O…… -
Joint search set of data structure and algorithm (Disjoint Set)
Recognize and search the set Many people will feel strange to the joint query set (Disjoint Set), have never heard of …… -
Example of uploading files to OSS (alicloud) using java
This article describes how Java implements the function of uploading files to OSS (Alibaba cloud). Share with you for …… -
The correct way to implement the exit function of spring security (recommended)
Introduction to spring security The core functions of spring security mainly include: Its core is a set of filter chai…… -
Detailed explanation of the process of building Eureka server port with multiple modules of spring could
This article mainly introduces the detailed process of building Eureka server port with multiple modules in springcour…… -
Java realizes account withdrawal and deposit operations
This article mainly introduces the Java implementation of account withdrawal and deposit operation. The example code i…… -
Benefit analysis of java interface
This article describes the advantages of java interface. Share with you for your reference, as follows: What is the fu…… -
Spring boot JPA service layer code example
This article mainly introduces the spring boot JPA service layer code examples, which are introduced in great detail t…… -
Parsing process of reading XML file content through Java
This article mainly introduces the content parsing process of reading XML files through Java. It is introduced in grea…… -
Java uses socket to determine whether a service can connect to a code instance
This article mainly introduces how Java uses socket to judge whether a service can be connected. The example code is i…… -
Analysis of PDF file generated by Java based on rich text
This article mainly introduces the process of generating PDF files by Java according to rich text. It is introduced in…… -
Spring boot builds a file server to solve the problem of uploading and downloading multiple pictures at the same time
In normal business scenarios, it is inevitable to build a file upload server as a public service. Generally, only a si…… -
Spring process analysis of ActiveMQ message queue technology integration
This article mainly introduces the integration of ActiveMQ message queue technology and spring process parsing. It is …… -
Basic knowledge points of Java language and platform
Before using Java, we should first make clear the difference between the Java language and the Java platform. However,…… -
Writing examples of 7 singleton modes in Java version
preface Today, I saw a sentence in an article. Add V before single example DCL. Let me take a closer look at the singl…… -
Detailed explanation of spring IOC container knowledge points
Spring IOC container can be compared to a restaurant. When you come to a restaurant, you usually directly greet the wa…… -
Simple implementation of Huffman algorithm for Java optimal binary tree
The optimal binary tree is also called Huffman tree. The straight point is that each node has weight. We let the large…… -
Mybatis-Plus3. 2.0 metaobjecthandler cannot globally populate public fields
Problem description Recently, the project architecture team has taken the following measures for the decision of confi…… -
Automatic configuration does not take effect after inheriting webmvcconfigurationsupport and how to configure interceptors
There are many articles on the Internet about spring boot2 After 0, it is recommended to directly implement webmvcconf…… -
Spring security can automatically log in to “remember me” within two weeks
This article is part of the spring security series. In the previous article, we implemented userdetailsservice and use…… -
Spring security dynamically loads user role permissions to realize login and authentication functions
Many people find it difficult to implement login verification with spring security, and I felt the same when I first l…… -
Analysis of the underlying implementation principle of Java serialization and deserialization
1、 Basic concepts 1. What are serialization and deserialization (1) Java serialization refers to the process of conve…… -
Explain the formlogin login authentication mode of spring security in detail
1、 Application scenario of formlogin In the previous articles in this column, we have introduced the httpbasic mode o…… -
Parsing process of creating XML (no Chinese garbled code) based on Java
This article mainly introduces the parsing process of creating XML (no Chinese garbled code) based on Java. It is intr…… -
Methods of using wildcards in struts 2 configuration files (three forms)
Introduction to struts 2 Struts 2 is a web application framework based on MVC design pattern. It is essentially equiva…… -
Java 8 calculation of time difference method example
package insping; import java.time.LocalDate; import java.time.Month; import java.time.Period; public class Test { …… -
Detailed explanation of new I / O knowledge points of java7
This chapter focuses on the changed I / O API in the Java language, which is called "renewed I / O" or NiO 2 (jsr-203)…… -
Spring’s actual operation example of obtaining the ID of the bean itself
This example describes the actual operation of spring to obtain the ID of the bean itself. Share with you for your ref……