Leetcode Brush Title Note - Backpack Problem in Dynamic Planning: 01 Backpack

Catalogue of Series Articles I. Array Type Solution Method I: Dichotomy 2. Array Type Solution Method 2: Double Pointer Method 3. Array Type Solution Method 3: Sliding Window IV. Array Type Solution Method 4: Simulation V. Basic Operation and Classical Title of Chain List in Chain Table Text 6. Classic Title of Hash Table 7. Classic Title ...

Posted by vbzoom.com on Sat, 26 Feb 2022 18:27:33 +0100

Microservice-OpenFeign service interface call

What is OpenFeign Feign is a declarative Web service client that, in other words, lets you invoke a web service as easily as a method. What can Feign do Feign is designed to make writing Java Http clients easier. Previously, when Ribbon+RestTemplate was used, the encapsulation of http requests using RestTemplate formed a set of templated ...

Posted by benwestgarth on Sat, 26 Feb 2022 18:19:47 +0100

Spring Boot @Conditional annotation and conditional implementation

Condition true is returned if the condition is met, and false is returned if the condition is not met @FunctionalInterface public interface Condition { boolean matches(ConditionContext context, AnnotatedTypeMetadata metadata); } Several sub interfaces and classes Condition has several sub interfaces and classes, and its functions are exte ...

Posted by pmaonline on Sat, 26 Feb 2022 17:49:18 +0100

Java basic syntax

Basic Java syntax (2) The wood that embraces is born at the slightest; The nine storey platform starts from the tired soil; A journey of a thousand miles begins with a single step—— Tao Te Ching 10, Scanner class (user interaction data type) From Java 5 to Java util. Scanner is a package. We can get user input through s ...

Posted by scottbarry on Sat, 26 Feb 2022 16:57:59 +0100

Apollo Server server resolution

For reference to source code analysis, please visit: https://gitee.com/lidishan/apollo-code-analysis Statement before reading: This article does not provide relevant usage instructions, but only analyzes the Apollo source code Apollo overall architecture diagram What is the core function of Apollo server? Configuration change and discovery C ...

Posted by nutt318 on Sat, 26 Feb 2022 16:53:05 +0100

Use hibernate validator to complete parameter verification before entering the controller

1, Why use validator? Parameter verification is a very important step in the development process. If the front-end parameter verification is for user experience, the back-end parameter verification is for security. Have you ever done parameter verification? Judge one field by one. The disadvantages of this approach are obvious - code redundanc ...

Posted by binarynomad on Sat, 26 Feb 2022 16:52:02 +0100

Simply use SpringBoot to integrate spring security

Introduction to spring security Spring security is a security framework for spring projects. It is also the default technology type of the underlying security module of spring boot. It can realize powerful Web security control. For security control, it provides Authentication,to grant authorization and Protection against common attacks . It ...

Posted by bahewitt on Sat, 26 Feb 2022 15:53:49 +0100

Control inversion / dependency injection in Spring

Chapter 1 control inversion / dependency injection in Spring review Add, delete, modify and check. Pre class test: Contents of this chapter Spring: Spring IOC: give the power to create objects to the spring core container. Factory mode BeanFactory: lazy man ApplicationContext: hungry man < bean id="" name="" class="" scope="" > T ...

Posted by akufen on Sat, 26 Feb 2022 15:44:43 +0100

Elementary C language - pointer

catalogue I What is the pointer II Pointer and pointer type 3. Field pointer 4. Pointer operation 5. Pointer and array 6. Secondary pointer 7. Pointer array I What is the pointer Understand pointer 1. Pointer is the number of the smallest unit in memory, that is, the address2. The pointer in spoken English usually refers to the p ...

Posted by roldahayes on Sat, 26 Feb 2022 15:41:28 +0100

Day 28 of learning big data - UDP, TCP transmission, classloader, reflection and dynamic proxy

UDP transport 1: Establish udp socket service 2: Receive data through receive method 3: Store the received data in the packet object 4: Analyze the received data through the function of packet object 5: Resources can be closed client /* Add feedback according to our normal thinking, but there is no response. Why The reas ...

Posted by zarp on Sat, 26 Feb 2022 15:23:27 +0100