包含标签:Java 的文章
-
Spring boot example tutorial for creating non executable jar packages
We often have this scenario. We just need to turn spring boot into an ordinary jar package without a configuration fil…… -
Migration of GC log parameters in Java 9
order This paper mainly studies the migration of java9 GC log parameters. Unified logging of JVM and GC Java 9 introdu…… -
JSP spring boot / cloud uses filter to prevent XSS
JSP spring boot / cloud uses filter to prevent XSS I preface XSS (cross site scripting attack) Cross site scripting is…… -
Analysis of the starting principle of spring boot jar
1. Preface Recently, when I was free to optimize the company's open API platform, I suddenly thought that I was famili…… -
On Hibernate n + 1 problem
Stored in the session cache are interrelated object graphs. By default, when hibernate loads the customer object from …… -
Implementation example of oauth2 logoff under spring cloud
Following the above implementation of oauth2 based authentication and authorization under spring cloud, we will implem…… -
Spring boot and mybatis configuration methods
1. First, all the dependencies required for configuring mybatis by spring boot are as follows: Here we mainly talk abo…… -
Simple implementation of Java address book system
This example shares the specific code of Java address book system for your reference. The specific contents are as fol…… -
Analysis of Java color tile programming problems
Niuniu likes colored things, especially colored tiles. Niuniu's room is paved with L square tiles. There are four poss…… -
Spring bean load execution order instance parsing
This paper mainly studies the loading and execution sequence of spring beans, as follows. Source of problem: One bean …… -
Introducing com. Com into eclipse sun. image. codec. Perfect solution to JPEG packet error
When developing a java program in eclipse to process images, two packages need to be introduced: However, sometimes er…… -
Implementation method of feign of spring cloud using HTTP to request remote services
1、 Feign introduction In the spring cloud Netflix stack, each micro service exposes its own service in the form of HT…… -
Detailed explanation of the method of using condition class to operate lock in Java multithreaded programming
The function of condition is to control the lock more accurately. The await() method in condition is equivalent to the…… -
Detailed explanation spring boot uses redis cluster to replace mybatis L2 cache
1 . pom. Add dependency to XML 2 . To configure the redis cluster, refer to the official spring data redis documentati…… -
Summary of this escape problem in Java Concurrent Programming
This escape means that other threads hold a reference to the object before the constructor returns Calling methods on …… -
Java 9 distinguishes between opens and exports
order This article focuses on some considerations for migrating to Java 9. Migration type Several precautions Unreadab…… -
Java implementation of simple console address book
The sub menus at all levels are controlled through the main menu, and the functions of adding records, finding records…… -
Java implementation of XML file student address book
Java realizes the student address book, uses XML file as data storage, and realizes the functions of adding, deleting,…… -
Java array permutation and combination problem summary
During the interview or written examination, I have encountered the following four hand tearing algorithms for arrange…… -
Summary of frequently asked questions about feign in spring cloud
1、 Feignclient interface, cannot use composite annotations such as @ gettingmapping Code example: The @ requestmappin…… -
In depth analysis of zuul filter built in spring cloud
preface Spring cloud is written and enabled for zuul by default. What are the functions of these filters? We might as …… -
Experience of escape in Java
It is generally believed that new objects are allocated on the heap, but this is not entirely correct. Through the ana…… -
Introduction to using preconditions to check incoming parameters in Java
Preconditions is a class library in guava, which is used to check the incoming parameters. A common usage is as follow…… -
Java generate graphic verification code tool class
Generate verification code effect ValidateCode. Java verification code generation class ImgFontByte. java ValidateCode…… -
Introduction to some new features of Java 9
Accepted characteristics 1 Jigsaw project; Modular source code Jigsaw project is to modularize java code and divide JR…… -
Explanation of enumset instead of bit field code in Java
This paper mainly studies the related content of enumset instead of bit field in Java, which is introduced as follows.…… -
Method to solve the problem of invalid hibernate 4 execution of save() or update()
Recently, I encountered a problem when writing the online mall project: Hibernate did not have any effect after execut…… -
Introduction to session and persistence classes in the Hibernate framework of Java
The session object is used to obtain a physical connection to the database. The session object is lightweight, and an …… -
Java implementation of string permutation and combination
This paper introduces the string arrangement and combination in Java for your reference. The specific contents are as …… -
Judgment of Java interview question parsing and prevention of SQL injection
This paper mainly studies a common question in Java interview questions, the problem of judging and preventing SQL inj…… -
Example of integrated development of spring boot, spark and Cassandra systems
This article demonstrates an example of using spark as the analysis engine, Cassandra as the data store, and spring bo…… -
Code examples of two ways to obtain session in Hibernate
Session: it is a session between an application and a database. It is the center of Hibernate operation and the basis ……