包含标签:Java 的文章
-
Spring process analysis of ActiveMQ message queue technology integration
This article mainly introduces the integration of ActiveMQ message queue technology and spring process parsing. It is …… -
Basic knowledge points of Java language and platform
Before using Java, we should first make clear the difference between the Java language and the Java platform. However,…… -
Writing examples of 7 singleton modes in Java version
preface Today, I saw a sentence in an article. Add V before single example DCL. Let me take a closer look at the singl…… -
Detailed explanation of spring IOC container knowledge points
Spring IOC container can be compared to a restaurant. When you come to a restaurant, you usually directly greet the wa…… -
Simple implementation of Huffman algorithm for Java optimal binary tree
The optimal binary tree is also called Huffman tree. The straight point is that each node has weight. We let the large…… -
Mybatis-Plus3. 2.0 metaobjecthandler cannot globally populate public fields
Problem description Recently, the project architecture team has taken the following measures for the decision of confi…… -
Automatic configuration does not take effect after inheriting webmvcconfigurationsupport and how to configure interceptors
There are many articles on the Internet about spring boot2 After 0, it is recommended to directly implement webmvcconf…… -
Spring security can automatically log in to “remember me” within two weeks
This article is part of the spring security series. In the previous article, we implemented userdetailsservice and use…… -
Spring security dynamically loads user role permissions to realize login and authentication functions
Many people find it difficult to implement login verification with spring security, and I felt the same when I first l…… -
Analysis of the underlying implementation principle of Java serialization and deserialization
1、 Basic concepts 1. What are serialization and deserialization (1) Java serialization refers to the process of conve…… -
Explain the formlogin login authentication mode of spring security in detail
1、 Application scenario of formlogin In the previous articles in this column, we have introduced the httpbasic mode o…… -
Use of test units in SSM framework spring integration JUnit process details
Problems and solutions in test class problem In the test class, each test method has the following two lines of code: …… -
Spring boot deployment process analysis (jar or war)
preface For the deployment of traditional SSM or SSH projects, they are usually packaged into a war package or a compi…… -
Detailed explanation of the implementation of the rejection policy of java thread pool
1、 Introduction jdk1. Version 5 adds JUC concurrent programming package, which greatly simplifies the traditional mul…… -
Parsing of Java byte stream from file input and output to file
If you need to copy a picture, a word, a RAR package. You can read the file as a byte stream and then output it to the…… -
The principle of future and futuretask in Java and its combination with thread pool
Future and future in Java are usually used together with thread pool to obtain the return value after thread pool retu…… -
Java design simple student management system
This example shares the java student achievement management system for your reference. The specific contents are as fo…… -
Java implements simple checkerboard archiving and reading functions
Recently, the archiving of playing Gobang has been studied. The main implementation is to save the Gobang chessboard o…… -
How does Java use optional and stream to replace if NULL judgment logic (jdk8 and above)
Through this article, you can replace the null check in business logic with very short code, and it is easy to log or …… -
Method and steps of realizing synchronous lock based on string
In some cases, we may want to do something based on strings. For example, it is more reasonable to use lock strings fo…… -
Java uses recursive algorithm to delete folders
Premise: Integrated development environment (IDE): Eclipse JDK version: 8.0 Several methods of file class: 1)isFile()…… -
How to obtain the real IP address of the client in Java interview
preface When developing some small games, we often pay more attention to sharing. For sharing, we hope to have differe…… -
Three ways to reverse the order of Java array elements (summary)
There are many ways to reverse array elements. Here are three common ways Direct array element exchange @Test public v…… -
The principle of future and futuretask in Java and its combination with thread pool
Future and future in Java are usually used together with thread pool to obtain the return value after thread pool retu…… -
Implementation of Java generic extensions keyword setting boundary
This article mainly introduces how the placeholder in < > in the generic definition is used with the extends key…… -
Analysis of single sign on implementation of spring cloud microservice based on redis cluster
brief introduction This paper introduces how to implement single sign on in microservice architecture Create three ser…… -
Java anti lock screen applet code example
To prevent the system desktop from automatically locking the screen, just type a jar package and write a batch program…… -
Java implementation code for array flipping
1. Java provides some toolkits to realize array flipping. I won't repeat reverse here... 2. You can also assign a new …… -
Java array difference instance code
The following example demonstrates how to use the removeAll () method to calculate the difference between two arrays: …… -
Instance implementation of Java array to obtain maximum and minimum values
The following example demonstrates how to use the collections. XML file of the collections class Max () and collection…… -
Adding element instances to Java arrays
The following examples demonstrate how to sort a Java array using the sort () method and insert elements into the arra…… -
Java uses policy patterns to optimize too much if else code
preface Not surprisingly, this should be the last time I shared it years ago. This time, I'll give you some tips that ……