Unexpectedly, Java operation Excel is so simple!
preface
In the work, using excel to process d...
Five minutes to integrate elastic search in springboot
Elasticsearch is an open-source distributed RESTful search and analysis engine, which enables you to store, search and a...
SpringCloud version Hoxton SR5 - Lecture 5: zuul routing, filtering, fault tolerance and fallback, clustering, high availability
Port: SpringCloud version Hoxton SR5 - Lesson 1: Understanding First look at what Zuul can do, or his positioning and ro...
Java EE final project assignment management system
Java EE final project - activity management system Based on MyBatis+springboot+jsp 1, About MyBatis MyBatis benefits 2...
Analysis of SpringBoot configuration class
This article starts with WeChat official account of vivo Internet technology. Link: https://mp.weixin.qq.com/s/NvPO5-FWL...
Detailed explanation of Dubbo SPI mechanism
From the principle of java spi in the previous article, we can see that java spi mechanism has the following disadvantag...
Spring AOP Learning Notes 03: Acquisition Enhancer for Core Implementation of AOP
Above Describes how spring opens AOP, simply by registering the AnnotationAwareAspectJAutoProxyCreator class with the co...
SpringMVC Chapter 3 (Request redirection and forwarding, exception handling, interceptor, SSM integration)
I am a sophomore major in Internet of Things Engineering, and a small wave in the Internet. Blogging is to record my lea...
The reentrant distributed lock commanded by the boss was finally perfectly implemented ~
Redo is always easier than transform
Recently...
The reentrant distributed lock commanded by the boss has finally been perfectly implemented!!!
Redo is always easier than transform Recently, I am working on a project to fully integrate an implementation system from another company (hereinafter...
Spring source code analysis 10: automatic configuration of Mybatis in spring boot
Article catalog 1, Foreword 2, MybatisAutoConfiguration 1. Declaration of mybatisautoconfiguration. 2. SqlSessionFacto...
From springboot to proficient in springboot file download
springboot file download catalog 1 IntroductionInitial experience of 2springboot3springboot integrated jsp4springboot attribute injection5 springboot...
Junior sister learning java IO: using Selector to send good person card
brief introduction
NIO has three treasures: B...
spring cloud understands the components and call relations from the perspective of operation and maintenance
summary
Spring cloud developers provide tools...
Stage 5: microservice system development: Spring Cloud getting started operation manual (day01)
Stage 5: distributed system development: microservice system development (day01) http://doc.canglaoshi.org/ Article ca...
Spring Data Elasticsearch4.0.1 Chinese translation document (sections 8-11)
8. Elasticsearch Repositories
This chapter in...
springboot obtains the ip address, access device information and city address information of visitors
1. Get the ip address of the visitor:
Don't t...
druid monitor configuration -- springBoot project
Cause: one day, my colleague's project connection pool burst
...
Responsibility chain model of common design patterns
concept Chain of Responsibility Pattern is to treat each node in the chain as an object, each node processes different r...
[SpringCloud] 12 Hystrix Fuse
1. What is Hystrix and why do I need him? 1. In the micro-service architecture, services are split into individual servi...
springboot-redis spring cache mid-story
1.spring cache parsing 1.1.RedisCache and RedisCache Manager 1.1.1. Structure 1.1.2. Resolution RedisCache uses ...
JPA multi data source distributed transaction processing: two transaction schemes
preface
Transaction processing of multiple da...
Build distributed project practice based on SpringBoot+Dubbo+Zookeeper+Maven+IDEA
1, Explanation of terms (from Baidu Encyclopedia): Spring Boot is a new framework provided by the Pivotal team, which is...
Summary of three cross-domain scenarios in Spring Boot
Article Directory 1. What is cross-domain 2. Solutions 2.1 Problems 3.SpringSecurity 3.1 Mode 1 3.2 Mode 2 4.OAuth2 5...