Zero basic learning spring framework
Spring framework
1. spring official website
Official website: https://spring.io/
2. Spring framework
Framework: a series of jar packages and the programming method for realizing a certain function are agreed at the same time, which may be different from the original programming method! Each framework solves some specific problems!
Prob ...
Added by ctcmedia on Thu, 10 Feb 2022 05:29:35 +0200
Advanced java -- thread pool, Lambda expression
Advanced java (VII) -- thread pool and Lambda expression
Portal: ·Zhang Qi MAX·
##Learning objectives
-[] able to understand the concept of thread communication -[] be able to understand the waiting wake-up mechanism -[] be able to describe the operation principle of Java thread pool -[] be able to understand the advantag ...
Added by jiggens on Thu, 10 Feb 2022 05:11:11 +0200
Spring cloud - Eureka Registration Center
Eureka principle
eureka comes from ancient Greek words, meaning "discovered"
eureka is divided into two parts, Server side and Client side
Register
Service registration
The instance that wants to participate in service registration discovery needs to register information with Eureka server first
Registration is submitted when th ...
Added by eatfishy on Thu, 10 Feb 2022 04:32:14 +0200
Shiro+JWT realizes authentication and authorization in the front and rear end separation project
Disadvantages of traditional Session authentication
In the last lesson, we used Shiro for user authentication. The internal identification is Subject through Session, and the server identifies cookies that depend on JSESSIONID. However, in the front-end and back-end separated projects, the front-end project will run separately, and the server ...
Added by codebuilder on Thu, 10 Feb 2022 04:31:01 +0200
Thread pool create thread
Definition: using pooling technology to manage and use ready-made technology is called thread pool Advantages of thread pool Generally speaking, thread pool has the following advantages: (1) Reduce resource consumption. Reduce the consumption caused by thread creation and destruction by reusing the created threads. (2) Improve response speed. W ...
Added by stuworx on Thu, 10 Feb 2022 04:19:00 +0200
Deploy APIs IX in K8S (non ingress)
Python wechat ordering applet course video
https://edu.csdn.net/course/detail/36074
Python actual combat quantitative transaction financial management system
https://edu.csdn.net/course/detail/35475
Deploy APIs IX gateway in K8S without using pvc
brief introduction
Because the company's project is ready for reconfiguration, now it make ...
Added by deansaddigh on Thu, 10 Feb 2022 04:07:06 +0200
Redis big key problem and scan command
brief introduction
Didn't you write an article earlier An implementation of like function Your article
Some problems were also raised at that time, and today we will solve some of them
start
Let's talk about the background first to avoid the confusion of not reading the previous article
Let's talk about the like function. Here we mainly so ...
Added by William on Thu, 10 Feb 2022 03:59:38 +0200
7-2 graphic card group game (60 points)
**
7-2 graphic card group game (60 points)
** Master the inheritance of classes, the use of polymorphism and the application of interfaces. Refer to the operation instruction for specific requirements 2021-OO operation-2 instruction for the 7th time v1 0.pdf
Input format:
Enter a string of numbers (1 ~ 4, integer) on one line, where 1 repre ...
Added by slands10 on Thu, 10 Feb 2022 03:24:12 +0200
MyBatis L2 cache Association refresh implementation
1. Introduction to MyBatis cache
Mybatis supports caching, but without configuration, it only enables the L1 cache by default, and the L2 cache needs to be manually enabled.
The L1 cache is only relative to the same SqlSession. That is, for the same transaction, execute the same query method of the same Mapper multiple times. After the fir ...
Added by tready29483 on Thu, 10 Feb 2022 03:20:30 +0200
Java annotation realizes data desensitization - decoupled from the main business and associated with permission control
In recent business requirements, in order to prevent the leakage of sensitive information such as user's mobile phone number, it is necessary to deal with the ciphertext of the mobile phone number, taking into account the following two problems
There are many businesses and complex logic. It is too hard to find and change the code one by o ...
Added by joelhop on Thu, 10 Feb 2022 01:35:14 +0200