objects are transmitted in binary mode on the network. so for serialization, different serialization, the transferred object should be a binary stream. then why json and xml are also described as serialization. It is not very clear that both of them ha...
Annotations from the validation framework are used in the entity class, such as @ NotNull. @ Validation User user the entity class in Controller to determine whether it meets the requirements. but if it is a list object, such as @ Validation List < U...
one thing I don t understand when using docker: is there any difference between pull a mysql from an official image and then run it on my machine? is there any difference between using Dockerfile to first pull a centos image and then installing a mysql...
I use the java program request interface encapsulated by okhttp to return a message of type key. I use the same input parameter to get the message returned by the postman request, and this key is of type JSONarray. The postman returned is correct. How d...
freemaker exports word documents in Chinese, and the title will be garbled. If you use letters or numbers, there will be no garbled code. the file name is garbled. Using letters or numbers as the file name is normal . ...
Let s not talk about the principle of the train algorithm here. the train algorithm is the gc algorithm used by the G1 collector D _ C are three objects that need to be called to each other. There are no other citations. But when the algorithm sc...
suppose I deploy the application under test, and the owner and default group of the application are both test,. Why is the owner and default group of the generated path folder created from the application code root? For what reason. drwxrwxr-x 9 test t...
in most cases in JAVA, objects are allocated in Eden by default, and when GC is triggered, if there is not enough space in survivor, it will be put into the old age. suppose the following scenario: eden:80M survivor1:10M survivor2:10M now survivor2 is...
...
when using spring security oauth2 for single sign-on, how can I be redirected back to the client after a successful login? the default configuration redirection path does not take effect. ...
The method add (capture-sharp2-of? Super Integer) in the type List < capture-sharp2-of? Super Integer > is not applicable for the arguments (Number) public static void down(List<? super Integer> numberList) { Number x = 4; num...
in order to decouple, I learned that servlet is required to be separated from Service (jsp servlet presentation layer; service business logic layer; Dao persistence layer), but I feel very uncomfortable when writing practical exercises for small project...
I have a server that tests the wget http: ip: port on the linux service to access the home page normally. but I can t access the home page when I use a browser to access the http: ip: port. Why is this? I looked at the list of open ports and fo...
there are 6 groups {3, "1 ", "2 "}, {4, "3 ", "4 "}, {3, "1 ", "2 "}, {2, "2 "}, {3, "5 ", "2 "}, {2, "one ", "2 "}. Please use Java to store the above six sets of data and print the data that is not repeated with the first group of data to t...
...
when any thread X executes the wait () and notify () methods on any thread Y, it needs to acquire the lock first. it is said that the locking mechanism is to solve the critical resource problem, so does it allow threads to start and pause access to any ...
JAVA_HOME= Library Java JavaVirtualMachines jdk1.8.0_161.jdk Contents Home PATH=$JAVA_HOME bin:$PATH:. CLASSPATH=$JAVA_HOME lib tools.jar:$JAVA_HOME lib dt.jar:. export M2_HOME= " Applications apache-maven-3.5.3 " export PATH= "$M2_HOME bin:$PATH " ex...
Why does java rewrite hashCode? when rewriting equals I think there are two points to pay attention to: whether hashCode rewriting depends on the business. Open developers can rewrite this method. This may be the case. For example, if we compare onl...
for example, they all operate on user data, on order data. App also needs to add, delete, change and check, and the operation backend also needs to add, delete, change and check the interface. Can this set of service services be shared by all, or can the...
I would like to ask how to achieve this effect, QQ chat why sometimes send a link is the first form, sometimes a link is the second form? : : http: tieba.baidu.com p 3746... qq there is a corresponding relationship between the above two parts....
the front-end beginner wrote a simple event handle binding function. <!DOCTYPE html> <html> <head> <title>class operation demo< title> <style type="text css"> .b1{ width: 100px; ...
there are system An and system B. system An owns database An independently, and system B owns database B. system An and system B share a set of user information database, database C. Database C stores all the information about the user, such as name...
the content of the file is obtained through ajax. The response class type is application octet-stream,. The content is garbled. Is there any way to parse it at the front end? ...
has the following code. In my expectation, using two browser windows (A _ Magi B window) to access http: 127.0.0.1:8000 at the same time, the total time to wait for the two pages to load should be close to 10 seconds, but it actually takes 20 seconds,...
var checkCardID = (rule, value, callback) = > { setTimeout(() => { if(this.form.personIdInfoType === 20000 ){ if (idCardNoUtil.checkIdCardNo(value)) { callback(); } else { ...