Dubbo process and source code analysis
The previous article explained the use and source code of zookeeper, so this time we continue to understand the relevant contents of dubbo, the golden partner of zookeeper. Of course, dubbo is also a typical rpc framework, so we analyze it one by one from the client and server, and there are a series of subsequent articles. Take your time.
SP ...
Posted by pqdrummer on Tue, 15 Feb 2022 11:49:39 +0100
Blue Bridge Cup Day13 java group pruning
Violence laws are often inefficient and waste time on many unnecessary calculations.
Pruning is a metaphor: to "cut off" branches that will not produce an answer or are unnecessary. The key to pruning lies in the judgment of pruning: what to cut and where to cut. Pruning is a common optimization method in search, which can often op ...
Posted by squizz on Tue, 15 Feb 2022 11:01:07 +0100
Beauty camera (realization of various filter effects in java)
1. Painting of normal pictures
//Function: normal picture painting
public void drawzc(int arr[][],Graphics g)
{
BufferedImage bff =new BufferedImage(arr.length,arr[0].length,BufferedImage.TYPE_INT_RGB);
Graphics ng =bff.getGraphics();
for(int i=0;i<arr.length;i++)
{
for(int j=0;j<arr[0].length; ...
Posted by jateeq on Tue, 15 Feb 2022 10:48:26 +0100
Power node - mother Wang Springboot tutorial Thymeleaf template engine
Chapter 9 Thymeleaf template engineOfficial download addressPower node springboot dataVideo viewing addresshttps://www.bilibili.com/vide...Thymeleaf: it is a template technology developed in java and runs on the server side. Send the processed data to the browser.The template works as a view layer. Displays the of the data. Thymeleaf is based o ...
Posted by sweyhrich on Tue, 15 Feb 2022 10:47:27 +0100
OpenRASP management background installation
1, Install JAVA
Java 1.0 is required to install ElasticSearch in CentOS 8.0, execute the command java -version to view the Java version installed in the current system
openjdk version "1.8.0_212"
OpenJDK Runtime Environment (build 1.8.0_212-b04)
OpenJDK 64-Bit Server VM (build 25.212-b04, mixed mode)
If java is not installed or the version i ...
Posted by jazz_snob on Tue, 15 Feb 2022 10:32:38 +0100
Spring security implements oauth2 0 - separation of authorization service and resource service
How to build OAuth2.0_01_basic edition authorization service by spring security and advanced edition authorization service by spring security are introduced in two articles 0 authorization server and resource server.
This article will continue to optimize, separate the authorization server and resource server, and deploy them on different serv ...
Posted by will35010 on Tue, 15 Feb 2022 09:30:13 +0100
Java foundation super detail
catalogue
preface
1, What is object-oriented?
2, Three characteristics of object-oriented
1. Packaging
2. Succession
3. Polymorphism
1. Heavy load
2. Rewrite
3. Abstract class
4. Interface
summary
preface
Last time we talked about Java's basic data types, operators and permission modifiers. This time, let's learn the most familiar ...
Posted by Ulujain on Tue, 15 Feb 2022 08:37:22 +0100
Platform management background and merchant menu resource management: access control design of platform management background
Access control design of platform management background
The access control design here is implemented by spring security, which is not much different from the implementation method of the access control part in Chapter 10 SSO design. The difference is that OAuth 2 is not required here, and a simpler method is used for the design of permission ...
Posted by arsitek on Tue, 15 Feb 2022 08:10:50 +0100
Certification process analysis
Certification process analysis
3.1 login process analysis
To understand the spring security authentication process, we must first understand the three basic components related to it: AuthenticationManager, ProviderManager and AuthenticationProvider. At the same time, we should also understand the filter of access authentication functio ...
Posted by wsh on Tue, 15 Feb 2022 07:25:41 +0100
Shallow cloning and deep cloning
1, Shallow clone
In shallow cloning, if the member variable of the prototype object is a value type, a copy will be copied to the cloned object; If the member variable of the prototype object is a reference type, copy the address of the reference object to the clone object, that is, the member variables of the prototype object and the clone ob ...
Posted by actionsports on Tue, 15 Feb 2022 07:00:36 +0100