The first day of learning the Silicon Valley version of spring cloud
Miscellaneous knowledge
Parent project development steps
Module writing steps
Business class preparation
The writing steps are as follows
Dependency management knowledge
Maven uses the dependencyManagement element to provide a way to manage dependent version numbers. Usually you will see the dependency management element in the p ...
Posted by covert215 on Thu, 04 Nov 2021 00:13:16 +0100
Android jcenter goes to maven and Nexus Public Libraries
catalogue
background
objective
to configure
achievements
Tutorial start
to configure
First of all, I'll give you an article on git configuration that is worth learning from
https://github.com/KVNR/appnexus_adserver_android/blob/4bf9cd5b7f7d0362dff92edfcde8e1d10b28ac2e/sdk/build.gradle
Then give you a blog worthy of reference
...
Posted by NoName.ba on Sat, 16 Oct 2021 21:18:54 +0200
Common Plugin Configuration Codes for Maven Profile POM
[Instructions]
This article is only about POM code for plugin s in Maven. For Maven's common dependency configuration codes, see my other blog: Common Dependency Configuration Codes for Maven Profile POM:https://blog.csdn.net/wangpaiblog/article/details/112797500
ordinary
Running Environment
JDK 17
Maven 3.6.3
IntelliJ ...
Posted by kornlord283 on Tue, 12 Oct 2021 18:59:33 +0200
Installation, configuration and use of Maven
1. Maven concept
Many times when we are developing a project, we need to import the required jar packages into the project, which can not avoid the conflict between the jar packages we download and the wrong version. maven solves this problem very well.
2.Maven installation and configuration
Download address: http://maven.apache.org/ ...
Posted by joseph on Tue, 12 Oct 2021 08:53:37 +0200
SSM framework integration - achieve basic CURD effect
1. Build environment
Create a basic Maven project and import the dependencies required by the project
<?xml version="1.0" encoding="UTF-8"?>
<project xmlns="http://maven.apache.org/POM/4.0.0"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://maven.apache.org/POM/4.0.0 http://maven. ...
Posted by saronoff on Sun, 03 Oct 2021 21:24:03 +0200
The back-end ideas of the dark horse tourism network project and the summary of common errors need the source code. Please send a private letter
Personally, I suggest this project is quite good. There are many places to think about Introduction to the technology and environment used
Environment configuration
Technical layer selection
Web layer Servlet Front end controller
Html View data display effect display
Filter filter
Beanutils Data encapsulation
Jackson json Serializati ...
Posted by intercampus on Sun, 03 Oct 2021 02:31:18 +0200
MyBatis - many to one & one to many
SQL processing
In practical application, we need not only simple single table query, but also simultaneous query information of other tables by using MyBatis. To solve this problem, a more advanced result mapping is required.
preparation in advance
SQL preparation
We need a student table and a teacher table. The teacher's primary key is id ...
Posted by mcguinkc on Sun, 26 Sep 2021 02:00:29 +0200
Mybatis study notes
brief introduction
What is Mybatis?
MyBatis is an excellent persistence layer framework.It supports custom SQL, stored procedures, and advanced mapping.MyBatis eliminates almost all JDBC code and the work of setting parameters and obtaining result sets.MyBatis can configure and map primitive types, interfaces and Java POJO s (Plain Old Java O ...
Posted by ClyssaN on Wed, 22 Sep 2021 15:44:35 +0200
Idea + Maven implement spring MVC
1, Introduction to spring MVC
Spring MVC is a part of the Spring Framework and a lightweight Web framework based on Java to implement MVC.
MVC is a programming idea (it is divided into three layers, Model View Controller, and each laye ...
Posted by ten31studios on Sun, 19 Sep 2021 12:43:32 +0200
Encryption of login information and access rights
Encryption of user password: during user registration, query whether the user exists in the database according to the transmitted information. If it does not exist, encrypt its password. The encrypted information is stored in the database. When logging in, encrypt the login password again and verify it with the encrypted information in the data ...
Posted by bettydailey on Sat, 18 Sep 2021 15:04:30 +0200