When reading the Alibaba Java development manual, I found that there is a specification for value comparison between integer packaging class objects. The specific content is as follows:
This suggestion is worthy of attention, and this problem is very common in Java interview.
The following questions need to be considered:
If you don't read th ...
Posted on Tue, 29 Oct 2019 04:51:40 -0400 by PhillNeedsHelp
spring IOC container source code learning
First, I will introduce the overall situation of this article. First, I will introduce the overall framework logic of IOC container, and then analyze the calling process of IOC container step by step through ApplicationContext context = new ClassPathXmlApplicationContext("classpath:applicationfile. ...
Posted on Tue, 29 Oct 2019 04:23:15 -0400 by platnium
This article will start with the definition of weak reference, and then analyze its principle step by step through the use of cases, so that readers can have a deep understanding of what is weak reference, how to use weak reference, what scenarios will use weak reference, what problems weak reference can solve, and how its source code ...
Posted on Tue, 29 Oct 2019 04:19:39 -0400 by activeserver
We have learned some basic development processes. The most important step is how to interact with the database. After all, without data, it is equivalent to doing nothing. In this paper, we will learn how to use springboot to integrate jdbc, mybatis, jpa and other commonly used database persistence technologies.
II. Integrate jdbc
Posted on Tue, 29 Oct 2019 03:44:50 -0400 by leszczu
In the last article, we explained that RestTemplate+Ribbon Consumer services, today we mainly talk about how to consume services through Feign.
Feign is a declarative web service client. It makes writing web service clients easier. To use Feign create an interface and annotate it. It has pluggable annotation support includin ...
Posted on Tue, 29 Oct 2019 02:59:16 -0400 by anoopmail
Java cache stream BufferedReader, PrintWriter
For example, if the media is a hard disk, the disadvantages of byte stream and character stream are as follows:
Every time you read or write, you will access the hard disk. If the frequency of reading and writing is high, its performance is poor.
In order to solve the above problems, cache stream is ...
Posted on Tue, 29 Oct 2019 02:44:31 -0400 by Salkcin
When the gateway and service are implementing the whole link distributed gray-scale publishing and routing, we need a tracking system to monitor which gray-scale group, which gray-scale version, which gray-scale area the gateway and service are going through, and even monitor the gray-scale rules and routing strategies that are passed from the ...
Posted on Tue, 29 Oct 2019 02:11:22 -0400 by CrowderSoup
In the previous article, we explained that mapperElement method is used to parse mapper. In this article, we will take a look at the parsing process of mapper.xml.
mappers configuration mode
There are many mapper tags under the mappers tag. Each mapper tag is configured with a path of an independent mapping configuration file. There are sever ...
Posted on Tue, 29 Oct 2019 00:42:14 -0400 by lafflin
How Spring Cloud Gateway works
The client sends a request to the Spring Cloud Gateway, and if the request matches the route defined by the gateway program, it is sent to the gateway Web handler, which runs a specific request filter chain.
The reason the filters are separated by dashes is that they may execute logic before or after sending a p ...
Posted on Mon, 28 Oct 2019 22:18:36 -0400 by bcamp1973
By default, when EurekaServer does not receive the heartbeat of a client instance within a certain period of time (90 seconds by default), EurekaServer will log off the instance. However, when the network partition fails, the client and EurekaServer cannot communicate normally, and the client should not be logged out at this time. Eureka solve ...
Posted on Mon, 28 Oct 2019 21:47:57 -0400 by hassank1