Leetcode Brush Title Note - Backpack Problem in Dynamic Planning: 01 Backpack
Catalogue of Series Articles
I. Array Type Solution Method I: Dichotomy 2. Array Type Solution Method 2: Double Pointer Method 3. Array Type Solution Method 3: Sliding Window IV. Array Type Solution Method 4: Simulation V. Basic Operation and Classical Title of Chain List in Chain Table Text 6. Classic Title of Hash Table 7. Classic Title ...
Posted by vbzoom.com on Sat, 26 Feb 2022 18:27:33 +0100
Microservice-OpenFeign service interface call
What is OpenFeign
Feign is a declarative Web service client that, in other words, lets you invoke a web service as easily as a method.
What can Feign do
Feign is designed to make writing Java Http clients easier. Previously, when Ribbon+RestTemplate was used, the encapsulation of http requests using RestTemplate formed a set of templated ...
Posted by benwestgarth on Sat, 26 Feb 2022 18:19:47 +0100
Spring Boot @Conditional annotation and conditional implementation
Condition
true is returned if the condition is met, and false is returned if the condition is not met
@FunctionalInterface
public interface Condition {
boolean matches(ConditionContext context, AnnotatedTypeMetadata metadata);
}
Several sub interfaces and classes
Condition has several sub interfaces and classes, and its functions are exte ...
Posted by pmaonline on Sat, 26 Feb 2022 17:49:18 +0100
Java basic syntax
Basic Java syntax (2)
The wood that embraces is born at the slightest; The nine storey platform starts from the tired soil; A journey of a thousand miles begins with a single step—— Tao Te Ching
10, Scanner class (user interaction data type)
From Java 5 to Java util. Scanner is a package. We can get user input through s ...
Posted by scottbarry on Sat, 26 Feb 2022 16:57:59 +0100
Apollo Server server resolution
For reference to source code analysis, please visit: https://gitee.com/lidishan/apollo-code-analysis Statement before reading: This article does not provide relevant usage instructions, but only analyzes the Apollo source code
Apollo overall architecture diagram
What is the core function of Apollo server? Configuration change and discovery
C ...
Posted by nutt318 on Sat, 26 Feb 2022 16:53:05 +0100
Use hibernate validator to complete parameter verification before entering the controller
1, Why use validator?
Parameter verification is a very important step in the development process. If the front-end parameter verification is for user experience, the back-end parameter verification is for security. Have you ever done parameter verification? Judge one field by one. The disadvantages of this approach are obvious - code redundanc ...
Posted by binarynomad on Sat, 26 Feb 2022 16:52:02 +0100
Simply use SpringBoot to integrate spring security
Introduction to spring security
Spring security is a security framework for spring projects. It is also the default technology type of the underlying security module of spring boot. It can realize powerful Web security control. For security control, it provides Authentication,to grant authorization and Protection against common attacks . It ...
Posted by bahewitt on Sat, 26 Feb 2022 15:53:49 +0100
Control inversion / dependency injection in Spring
Chapter 1 control inversion / dependency injection in Spring
review
Add, delete, modify and check.
Pre class test:
Contents of this chapter
Spring: Spring IOC: give the power to create objects to the spring core container. Factory mode
BeanFactory: lazy man
ApplicationContext: hungry man
< bean id="" name="" class="" scope="" >
T ...
Posted by akufen on Sat, 26 Feb 2022 15:44:43 +0100
Elementary C language - pointer
catalogue
I What is the pointer
II Pointer and pointer type
3. Field pointer
4. Pointer operation
5. Pointer and array
6. Secondary pointer
7. Pointer array
I What is the pointer
Understand pointer
1. Pointer is the number of the smallest unit in memory, that is, the address2. The pointer in spoken English usually refers to the p ...
Posted by roldahayes on Sat, 26 Feb 2022 15:41:28 +0100
Day 28 of learning big data - UDP, TCP transmission, classloader, reflection and dynamic proxy
UDP transport
1: Establish udp socket service 2: Receive data through receive method 3: Store the received data in the packet object 4: Analyze the received data through the function of packet object 5: Resources can be closed
client
/*
Add feedback according to our normal thinking, but there is no response. Why
The reas ...
Posted by zarp on Sat, 26 Feb 2022 15:23:27 +0100