Zero basic learning spring framework

Spring framework 1. spring official website Official website: https://spring.io/ 2. Spring framework Framework: a series of jar packages and the programming method for realizing a certain function are agreed at the same time, which may be different from the original programming method! Each framework solves some specific problems! Prob ...

Added by ctcmedia on Thu, 10 Feb 2022 05:29:35 +0200

Advanced java -- thread pool, Lambda expression

Advanced java (VII) -- thread pool and Lambda expression Portal: ·Zhang Qi MAX· ##Learning objectives -[] able to understand the concept of thread communication -[] be able to understand the waiting wake-up mechanism -[] be able to describe the operation principle of Java thread pool -[] be able to understand the advantag ...

Added by jiggens on Thu, 10 Feb 2022 05:11:11 +0200

Spring cloud - Eureka Registration Center

Eureka principle eureka comes from ancient Greek words, meaning "discovered" eureka is divided into two parts, Server side and Client side Register Service registration The instance that wants to participate in service registration discovery needs to register information with Eureka server first Registration is submitted when th ...

Added by eatfishy on Thu, 10 Feb 2022 04:32:14 +0200

Shiro+JWT realizes authentication and authorization in the front and rear end separation project

Disadvantages of traditional Session authentication In the last lesson, we used Shiro for user authentication. The internal identification is Subject through Session, and the server identifies cookies that depend on JSESSIONID. However, in the front-end and back-end separated projects, the front-end project will run separately, and the server ...

Added by codebuilder on Thu, 10 Feb 2022 04:31:01 +0200

Thread pool create thread

Definition: using pooling technology to manage and use ready-made technology is called thread pool Advantages of thread pool Generally speaking, thread pool has the following advantages: (1) Reduce resource consumption. Reduce the consumption caused by thread creation and destruction by reusing the created threads. (2) Improve response speed. W ...

Added by stuworx on Thu, 10 Feb 2022 04:19:00 +0200

Deploy APIs IX in K8S (non ingress)

Python wechat ordering applet course video https://edu.csdn.net/course/detail/36074 Python actual combat quantitative transaction financial management system https://edu.csdn.net/course/detail/35475 Deploy APIs IX gateway in K8S without using pvc brief introduction Because the company's project is ready for reconfiguration, now it make ...

Added by deansaddigh on Thu, 10 Feb 2022 04:07:06 +0200

Redis big key problem and scan command

brief introduction Didn't you write an article earlier An implementation of like function Your article Some problems were also raised at that time, and today we will solve some of them start Let's talk about the background first to avoid the confusion of not reading the previous article Let's talk about the like function. Here we mainly so ...

Added by William on Thu, 10 Feb 2022 03:59:38 +0200

7-2 graphic card group game (60 points)

** 7-2 graphic card group game (60 points) ** Master the inheritance of classes, the use of polymorphism and the application of interfaces. Refer to the operation instruction for specific requirements 2021-OO operation-2 instruction for the 7th time v1 0.pdf Input format: Enter a string of numbers (1 ~ 4, integer) on one line, where 1 repre ...

Added by slands10 on Thu, 10 Feb 2022 03:24:12 +0200

MyBatis L2 cache Association refresh implementation

1. Introduction to MyBatis cache Mybatis supports caching, but without configuration, it only enables the L1 cache by default, and the L2 cache needs to be manually enabled. The L1 cache is only relative to the same SqlSession. That is, for the same transaction, execute the same query method of the same Mapper multiple times. After the fir ...

Added by tready29483 on Thu, 10 Feb 2022 03:20:30 +0200

Java annotation realizes data desensitization - decoupled from the main business and associated with permission control

In recent business requirements, in order to prevent the leakage of sensitive information such as user's mobile phone number, it is necessary to deal with the ciphertext of the mobile phone number, taking into account the following two problems There are many businesses and complex logic. It is too hard to find and change the code one by o ...

Added by joelhop on Thu, 10 Feb 2022 01:35:14 +0200