Distributed | concept | example
In Java, there are three kinds of transactions,
Simple JDBC-level transactions
JTA-In an EJB environment, users get transactions and control
CMP-Controls the transaction entirely by the container, and the user defines the transaction behavior through the bean configuration file
Two or three support distributed transactions, but only distributed transactions in
Java when reading Word documents, although many plug-ins on the web are introduced POI, Java2word, Jacob, Itext, and so on, POI unreadable format (the new API estimate line seems to be in the research and development phase, not too stable, do not dare to use the project); Java2word, Jacob Easy to complain can not find registration, more bizarre, I have tried in different machines, operation method is comple
An example of the principle of encryption and decryption
Package lockunlock;
Import java.awt.*;
Import java.awt.event.*;
Import java. applet.*;
Import javax. swing.*;
Import java.util.*;
public class Lockunlock extends JApplet {
Private Boolean isstandalone = false;
Get a parameter value
public string GetParameter (string key, String def) {
Return Isstandalone? System.getproperty (Key, Def):
(GetParameter
Review1 JDK Installation2 Struts2 Simple Getting Started example
Objective
As entry-level record posts, not too much technical content, simple configuration framework. This time about spring, this should be the heavyweight framework in SSH, which consists of two main things: control inversion \ Dependency injection, and AOP aspect-oriented programming.
1 Control inversion ioc\ Dependency Injection di, because the translation is diffe
combinations can produce 500多亿个 combinations. The combination of numbers and characters to make a certain mapping, you can produce a unique string, such as the 62nd combination is AAAAA9, the 63rd combination is Aaaaba, and then use the shuffle algorithm, the original string is scrambled to save, Then the combined string of the corresponding position will be an unordered combination.Put the long URL into the database, take the returned ID, find the c
page to add the appropriate label, and for the label specified above created by the name of the demo action, and then execute the page can be printed in the console the corresponding interceptor content.
Print output:
Analysis output, the program compilation phase will first read the configuration file Struts.xml, in the profile action in order to find whether the interceptor added, if the interceptor is added according to the interc
0. Suppose an existing project (Duck) encounters an issue that adds functionality to a class, how do I design a class to add new functionality?1. What are the disadvantages of using the duck (duck) provided by inheritance?
(1) Code repeats in multiple subclasses
(2) Many men know the whole behavior of all ducks
(3) The behavior of the operation is not easy to change
(4) Change will lead to the whole body, causing the other ducks do not want to change
"Design Principles"
accessed normally, HTTP ://localhost:8080/demo4ssh-security/admin but not accessible:Spring Security Basic configuration is this, compared to the previous several, Spring security such basic configuration is not much use, now who can still use the plaintext password, MD5 encryption in the way of salt is good configuration (I write by email as salt, But for the sake of simplicity, I have no email in the user table of this demo, so I need to pay attention when using MD5. There is a applicationcon
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.