Code Ape Tech Column
Author

Code Ape Tech Column

Former Ant Group P8 engineer, pure technologist, sharing full‑stack Java, job interview and career advice through a column. Site: java-family.cn

1.1k
Articles
0
Likes
2.5k
Views
0
Comments
Recent Articles

Latest from Code Ape Tech Column

100 recent articles max
Code Ape Tech Column
Code Ape Tech Column
Aug 12, 2025 · Operations

How to Use Meteor for Real-Time Java App Diagnosis and Performance Tuning

Meteor, built on Alibaba's Arthas, is a non‑intrusive Java diagnostic console that lets developers monitor running applications, locate performance bottlenecks, memory leaks, and thread deadlocks without restarting services, offering a SpringBoot‑based architecture, quick start commands, and features such as class inspection, live code editing, method monitoring, thread management, and dashboards.

ArthasJavaPerformance Monitoring
0 likes · 4 min read
How to Use Meteor for Real-Time Java App Diagnosis and Performance Tuning
Code Ape Tech Column
Code Ape Tech Column
Aug 11, 2025 · Backend Development

Why Store All Spring Boot Configurations in a Database? Benefits and Implementation Guide

This article explores the drawbacks of static YAML files in production, compares traditional configuration centers, and presents a database‑driven approach that offers zero extra infrastructure, full control, and simplified architecture, while detailing layered bootstrapping, entity design, dynamic loading, encryption, versioning, and monitoring.

Configuration ManagementDatabase ConfigDynamic Configuration
0 likes · 27 min read
Why Store All Spring Boot Configurations in a Database? Benefits and Implementation Guide
Code Ape Tech Column
Code Ape Tech Column
Aug 7, 2025 · Backend Development

Replace Cluttered if…else with Java 8 Functional Interfaces

This article shows how to eliminate repetitive if…else statements in Java code by leveraging Java 8 functional interfaces such as Supplier, Consumer, Runnable, and custom interfaces for exception handling, branch processing, and null‑value handling, complete with code examples and diagrams.

BackendFunctional InterfaceJava
0 likes · 6 min read
Replace Cluttered if…else with Java 8 Functional Interfaces
Code Ape Tech Column
Code Ape Tech Column
Aug 6, 2025 · Backend Development

Implement Role‑Based Data Permissions in MyBatis‑Plus Using Annotations & Interceptors

This article explains how to enforce data‑access restrictions in MyBatis‑Plus by creating a custom @UserDataPermission annotation, building an InnerInterceptor that rewrites SQL queries, handling role‑based scopes, and integrating the interceptor into the MyBatis‑Plus plugin for both basic and advanced use cases.

Backend DevelopmentData PermissionInterceptor
0 likes · 17 min read
Implement Role‑Based Data Permissions in MyBatis‑Plus Using Annotations & Interceptors
Code Ape Tech Column
Code Ape Tech Column
Aug 5, 2025 · Backend Development

Exploring PowerJob: A Lightweight Distributed Task Scheduler for Java

This article introduces PowerJob, a young yet powerful distributed task scheduling framework, covering its selection reasons, core concepts, high‑availability setup, workflow types, scheduling modes, deployment steps, and detailed code examples for single, broadcast, map, and MapReduce jobs.

JavaMapReduceTask Management
0 likes · 15 min read
Exploring PowerJob: A Lightweight Distributed Task Scheduler for Java
Code Ape Tech Column
Code Ape Tech Column
Jul 24, 2025 · Backend Development

Mastering Redisson Distributed Locks: Deep Dive into Implementation, Reentrancy, and Fairness

This article provides a comprehensive guide to Redisson's distributed lock implementation, covering its architecture, comparison with Jedis and Lettuce, basic lock creation, Lua scripts for atomic operations, reentrant lock handling, watchdog-based lock renewal, RLock usage, and the design of fair locks using Redis data structures.

Redisdistributed lockfair lock
0 likes · 31 min read
Mastering Redisson Distributed Locks: Deep Dive into Implementation, Reentrancy, and Fairness
Code Ape Tech Column
Code Ape Tech Column
Jul 22, 2025 · Information Security

Mastering Access Control: From ACL to RBAC and Beyond

This article explains the fundamentals and practical applications of major permission models—including ACL, DAC, MAC, ABAC, and RBAC—detailing their principles, examples, advantages, drawbacks, and how to implement them effectively in real-world systems.

AuthorizationRBACaccess control
0 likes · 15 min read
Mastering Access Control: From ACL to RBAC and Beyond
Code Ape Tech Column
Code Ape Tech Column
Jul 18, 2025 · Backend Development

Building a Flexible Java Rule Engine: Design, Code, and Tips

This article walks through the design and implementation of a Java rule engine, illustrating how to abstract rules, create a reusable executor with AND/OR logic, and demonstrates the full code, while discussing its advantages, drawbacks, and practical usage in real‑world applications.

Backend DevelopmentDesign PatternsJava
0 likes · 7 min read
Building a Flexible Java Rule Engine: Design, Code, and Tips