排序
Rolling, secure hashes for nodes in a tree / How to reduce on-disk space consumption?
Rolling, secure hashes for nodes in a tree / How to reduce on-disk space consumption?,Hi all, I've implemented the storage of rolling, secure hashes for a temporal document store c...
Inyección de Dependencias en Java
Inyección de Dependencias en Java,English Version: Dependency Injection in Java Carlos Chacin ・ Nov 14 '19 #java #dependencyinjection #di #bestpractices Éste artículo fue origi...
Hazelcast ReplicatedMap replication event
Hazelcast ReplicatedMap replication event, Hazelcast ReplicatedMap replication event Dec 29 '19 Comments: 1 Answers: 0 0 Say I have a cluster of 2 members with a replicated map. Ca...
Using a Vigenere Cipher to Encrypt Text
Using a Vigenere Cipher to Encrypt Text,The vigenere cipher is a way of hiding your messages that has been around for a long, long time. In fact, it was first described by Giovan B...
Java is NOT EASY to learn. But still worth :)
Java is NOT EASY to learn. But still worth :),Here was the post Why should learn Java in 2020 - and it started with: Java is Easy to Learn I'd say this is QUITE NOT TRUE, sorry :) ...
Polyglot inception with GraalVM. Why? Because it’s fun
Polyglot inception with GraalVM. Why? Because it's fun ,Originally published at deepu.tech. Have you heard of GraalVM? If you haven't you should check it out. It is an exciting tec...
ARBOLES BINARIOS DE BÚSQUEDA EN JAVA
ARBOLES BINARIOS DE BÚSQUEDA EN JAVA, 原文链接:ARBOLES BINARIOS DE BÚSQUEDA EN JAVA
Validations in Spring Boot
Validations in Spring Boot,Hello! In this article, I'm gonna cover validations in a Spring Boot app. The only requirement for you to understand this topic is to be able to create c...
Simple Access Control in Vaadin
Simple Access Control in Vaadin,Some things are best kept secret. This goes for data too. In this tutorial, you will learn how to implement a simple access-control system using pla...
Listen to Compiler!
Listen to Compiler!,Many programmers, especially juniors (or while yet studying) tend to ignore compiler warnings :) I'd like to share two examples - first is 'real-life' from some...
Database schema changes with Hibernate and Spring Boot
Database schema changes with Hibernate and Spring Boot, Target audience This article has been written for readers who have experience with Java, Hibernate and Spring Boot. All exam...
Writing Good Tick Limiters
Writing Good Tick Limiters,Something I've seen in sooo many game tutorials at the start is that a lot of people are making a tick limiter much more difficult than it really should ...