Spring IOC/AOP use and source code explanation

Spring-IOC Hi! This is the welcome page that you will display for the first time using the Markdown editor. If you want to learn how to use the Markdown editor, you can read this article carefully to understand the basic syntax of Markdown. Use of IOC s Basic use of IOC Import spring's pom configuration <dependencies> &lt ...

Posted by devxtech on Mon, 23 May 2022 21:49:15 +0300

Android dumpSys command usage summary

dumpsys command is a necessary skill for Android developers. It can dump various states of system services and plays a very important role in our development and debugging 1.dumpsys service list Different Android system versions support different commands. You can view the dump service supported by the current mobile phone through the follow ...

Posted by stemp on Mon, 23 May 2022 21:45:47 +0300

Enum source code analysis of Java enumeration class

I. Overview Enumeration type is a very important reference type introduced after JDK 5, which can be used to define a series of enumeration constants. Before the introduction of the enum keyword, to represent enumerable variables, only public static final can be used. public staic final int SPRING = 1; public staic final int SUMMER = 2; public ...

Posted by Amgine on Mon, 23 May 2022 20:14:04 +0300

Java implementation of custom annotation development

First, let's take a look at the standard example of custom annotation. The annotation class is decorated with the @ interface keyword, and the annotation related information is declared above the annotation class, including the following four types of information @Documented – will annotations be included in JavaDoc @Retention – w ...

Posted by rcity on Mon, 23 May 2022 18:30:40 +0300

RocketMQ Architecture Principle

Original address: RocketMQ sample - always on the way 1 basic example In the basic example, we provide the following function scenarios: Use RocketMQ to send three types of messages: synchronous message, asynchronous message and one-way message. The first two messages are reliable because there will be a response whether the transmission is s ...

Posted by joebarker99 on Mon, 23 May 2022 17:27:34 +0300

Mybatis Series Textbook - related concepts - delayed loading

Step 1: run first, see the effect, and then learn Step 2: imitation and troubleshooting Step 3: one to many based on annotation Step 4: add log Step 5: only query the classification without obtaining products Step 6: add the configuration of delayed loading Step 7: only query the classification without obtaining products Step 8: you can ...

Posted by agriz on Mon, 23 May 2022 16:49:16 +0300

ThreadLocal can also be used as a cache

Background description A friend asked me a question about interface optimization. His optimization point is very clear. Because many internal services are called in the interface to form a completed business function. The logic in each service is independent, which leads to many repeated queries. See the figure below. The upper level query is ...

Posted by AJReading on Mon, 23 May 2022 16:17:23 +0300

Dynamic sql tags commonly used by mybatis

explain When we write some sql queries, it is very troublesome and error prone to splice sql according to conditions. The dynamic sql tag of mybatis can solve this annoying problem. The dynamic sql tags commonly used by mybatis are as follows: label effect if Single conditional branch, equivalent to judgment statement choose,when,othe ...

Posted by ysu on Mon, 23 May 2022 14:49:21 +0300

Aha! Algorithm Chapter 2 - Section 1 - decrypt QQ number

Decrypt QQ number - queue The new semester begins. Xiaoha is xiaohum's new deskmate (xiaoha is a little beauty). Xiaohum asks xiaoha about the QQ number. Of course, xiaoha won't tell xiaohum directly. You know the reason. So xiaoha gave xiaohum a string of encrypted numbers, and xiaoha also told xiaohum the decryption rules. The rule is as f ...

Posted by srikanthiv on Mon, 23 May 2022 14:04:57 +0300

Description of modern cryptography

modern cryptography Modern cryptography includes three forms: hash function, symmetric cipher and asymmetric cipher 1. Hash function Hash function, also see hash function, digest function or hash function, can convert messages of any length into fixed length values after operation. The common ones are MD5, SHA-1 and SHA256, which are mostly us ...

Posted by lostincoding on Mon, 23 May 2022 12:52:46 +0300