Crawler reverse foundation, understand JavaScript modular programming, webpack
WeChat official account: brother K crawler, QQ exchange group: 808574309, keep sharing crawler advance, JS/ Android reve...
springboot custom starter component - integrated swagger3 documentation
SpringBoot automatic assembly principle The core of springboot is automatic assembly, so why can jar be used out of the ...
Spring Security OAuth2 learning record
1, OAuth2.0 1. Concept OAuth The protocol provides a secure, open and simple platform for user resource authorizat...
Three layers and transaction control of JDBC
Existing problems: user interaction code and business code are mixed together. Changing the interaction mode in the futu...
I heard that ES6 has added a Symbol data type that can be different
preface
Hello, guys. I wonder if you have enc...
Handwritten wheel series - handwritten promise (smooth as silk)
Handwritten wheel series - handwritten promise (smooth as silk) Promise is a solution for JS asynchronous programming, w...
18, Java stream, file and IO of spring cloud distributed microservice Cloud Architecture for Java
Java stream, file, and IO
The Ja...
Java design pattern -- simple factory pattern
1. Simple factory pattern definition Provides a function of creating object instances without caring about their impleme...
One of the best practices of web application development: avoiding large and complex layout and layout jitter
Avoid Large, Complex Layouts and Layout Thrashing Layout is where the browser calculates the geometric information of el...
How to publish Java packages to Maven central warehouse
Original published on https://seriouszyx.com/archives/36/ Recently, I participated in some open source projects, involvi...
[data structure] stack and queue common test interview questions [detailed explanation Part 4]
Stack and queue frequently test interview questions
...
JS output function call stack
Recently, I was writing a JS reverse hook plug-in, and then I need to get the location of the current code execution to ...
Design of different business messages for order receiving
1, Business scenario
Messages are distributed...
Day_12_ Polymorphism, Object, abstraction, interface
1. Six principles of software design: 1) Single responsibility principle: single fu...
The first line of code, Third Edition - Chapter 2 (notes)
Explore new languages and get started with Kotlin programming
...
05 - micro service topic 03 - Introduction to micro Service Framework
1. Monomer architecture vs microservice architecture 1.1 single machine architecture 1.1.1 what is a single architecture...
[crazy God says JAVA notes] P51~P59 Arrays, multidimensional Arrays, Arrays class (to_string, sort, fill)
Video online class: station B, crazy God says JAVA: P51~P59 array array
...
Introduction and implementation of asymmetric encryption algorithm
1, Introduction and implementation of asymmetric encryption algorithm
...
java operation rabbitmq consumer example
rabbitmq, as a message queue, is very common in practical applications. Producers send messages to a queue...
Spring Dependent Injection Details
1.Getting Started with Dependent Injection for Bean Create a UserService that calls the save() method of UserDao inside ...
Introduction to Shiro security framework
I. Shiro overview 1Shiro overview Shiro is an open source security framework under apache. It extracts the functions rel...
[solution] HTTP Status 500 Type Exception ReportMessage Request processing failed; [resolved]
catalogue
Zero. Preface 1, Look at the error prompt 2, An...
[50 commonly used MySQL statements] if you are not familiar with these 50 sql statements, don't say you will MySQL [suggest collection]
This article mainly introduces 50 SQL query skills and query sentence examples. Taking student table, curriculum table, ...
Virtual machine: memory overflow summary (HotSpot)
In the follow-up, I will continuously update the source code, principle and introduction of the virtual machine. If you ...