Why is it mandatory in Alibaba Java development manual to compare integer wrapper class object values with equals method?

When reading the Alibaba Java development manual, I found that there is a specification for value comparison between integer packaging class objects. The specific content is as follows: This suggestion is worthy of attention, and this problem is very common in Java interview. The following questions need to be considered: If you don't read th ...

Posted on Tue, 29 Oct 2019 04:51:40 -0400 by PhillNeedsHelp

Source code analysis of spring IOC container

spring IOC container source code learning First, I will introduce the overall situation of this article. First, I will introduce the overall framework logic of IOC container, and then analyze the calling process of IOC container step by step through ApplicationContext context = new ClassPathXmlApplicationContext("classpath:applicationfile. ...

Posted on Tue, 29 Oct 2019 04:23:15 -0400 by platnium

Don't look for any more. A thorough analysis of weak references in Java (refer to the official website)

overview This article will start with the definition of weak reference, and then analyze its principle step by step through the use of cases, so that readers can have a deep understanding of what is weak reference, how to use weak reference, what scenarios will use weak reference, what problems weak reference can solve, and how its source code ...

Posted on Tue, 29 Oct 2019 04:19:39 -0400 by activeserver

SpringBoot take off series - data access

I. Preface We have learned some basic development processes. The most important step is how to interact with the database. After all, without data, it is equivalent to doing nothing. In this paper, we will learn how to use springboot to integrate jdbc, mybatis, jpa and other commonly used database persistence technologies. II. Integrate jdbc ...

Posted on Tue, 29 Oct 2019 03:44:50 -0400 by leszczu

Feign of Spring Cloud: load balancing

In the last article, we explained that RestTemplate+Ribbon Consumer services, today we mainly talk about how to consume services through Feign. Feign introduction Feign is a declarative web service client. It makes writing web service clients easier. To use Feign create an interface and annotate it. It has pluggable annotation support includin ...

Posted on Tue, 29 Oct 2019 02:59:16 -0400 by anoopmail

Java self study - I/O cache stream

Java cache stream BufferedReader, PrintWriter For example, if the media is a hard disk, the disadvantages of byte stream and character stream are as follows: Every time you read or write, you will access the hard disk. If the frequency of reading and writing is high, its performance is poor. In order to solve the above problems, cache stream is ...

Posted on Tue, 29 Oct 2019 02:44:31 -0400 by Salkcin

Based on Opentracing+Jaeger full link gray call chain

When the gateway and service are implementing the whole link distributed gray-scale publishing and routing, we need a tracking system to monitor which gray-scale group, which gray-scale version, which gray-scale area the gateway and service are going through, and even monitor the gray-scale rules and routing strategies that are passed from the ...

Posted on Tue, 29 Oct 2019 02:11:22 -0400 by CrowderSoup

Mybaits source code analysis - Mapper interface underlying principle (why Mapper can access the database without writing the implementation class?)

In the previous article, we explained that mapperElement method is used to parse mapper. In this article, we will take a look at the parsing process of mapper.xml. mappers configuration mode There are many mapper tags under the mappers tag. Each mapper tag is configured with a path of an independent mapping configuration file. There are sever ...

Posted on Tue, 29 Oct 2019 00:42:14 -0400 by lafflin

Spring Cloud Gateway - quick start

How Spring Cloud Gateway works The client sends a request to the Spring Cloud Gateway, and if the request matches the route defined by the gateway program, it is sent to the gateway Web handler, which runs a specific request filter chain. The reason the filters are separated by dashes is that they may execute logic before or after sending a p ...

Posted on Mon, 28 Oct 2019 22:18:36 -0400 by bcamp1973

Source code analysis of Eureka self protection mechanism

By default, when EurekaServer does not receive the heartbeat of a client instance within a certain period of time (90 seconds by default), EurekaServer will log off the instance. However, when the network partition fails, the client and EurekaServer cannot communicate normally, and the client should not be logged out at this time. Eureka solve ...

Posted on Mon, 28 Oct 2019 21:47:57 -0400 by hassank1