Java
-
-
Java network programming (TCP explanation)
Network programming details - TCP First, the characteristics of TCP protocol are connection oriented protocol (if ther…… -
Arrays of Java data structures (2)
Bubble sort: /** *To sort n numbers, a total of n-1 times are sorted, and the sorting times of each I time is (n-1). T…… -
Connecting SQL Server 2000 with Java
The first: the cross platform ability of Java language to connect the database through ODBC (write once, run anywhere)…… -
The relationship and difference between Java interface and abstract class.
The relationship and difference between interface and abstract class. 1、 Simple summary 1. Abstract classes and inter…… -
Java connection sqlserver2008 database code
The code of Java connecting to sqlserver2008 database is as follows: -
Java method for converting integer into Chinese capital amount
In our daily life, we often convert Arabic numerals into Chinese capital: "zero", "one", "two", "three", "four", "Five…… -
XML parsing of Java (Dom4j Technology)
Parsing XML files with Dom4j Technology I. Introduction to XML Full name: Extended Markup Language allows programmers …… -
Java connects to MySQL database Java connects to SQL Server database
In Java applications, we often perform necessary operations on the database. Next, we'll learn how to use java to conn…… -
Java stack and heap, static area
The memory of Java JVM can be divided into three areas: heap, stack and method Stacking area: 1. All objects stored ar…… -
Explain the construction of java development environment in detail
For any language development, the primary link must be the construction of the development environment, as is the Java…… -
Detailed analysis of java basic types and wrapper classes
The Java language provides eight basic types. There are six numeric types (four integers, two floating points), one ch…… -
Java collection (data conversion between list collection and map collection)
Specific requirements are as follows: Function 1: define the method public void listtomap() {} to encapsulate the stud…… -
10 common errors when Java developers write SQL statements
The coordination between Java developers' object-oriented programming thinking and command-line programming thinking d…… -
Java – how to use ffmpeg in Android to reduce the video size captured by the default camera?
I am trying to reduce the video size captured by the default camera in Android (it is generating high-resolution video…… -
elasticsearch7. Version 6.1 + jsoup crawl JD commodity data and use it
Actual combat: elasticsearch7 Version 6.1 + jsoup crawl JD commodity data and use it @H_ 404_ 3 @ Preface @H_ 404_ 3 @…… -
Overloading and rewriting in Java
The difference between overloading and rewriting Overloading occurs in the same class, the same method, with different…… -
Daily Note: About arrays Aslist and collections Some understanding of unmodifiable list
1. Create a list normally and operate the list List<Integer> collect = Stream.of(1,3,5,7,9).collect(Collectors.t…… -
String s1 = new String(“abc”); How many string objects will this code create?
String s1 = new String("abc"); How many string objects will this code create? The answer is to create one or two Creat…… -
[design pattern] the design pattern in Hamburg — observer pattern
[design pattern] the design pattern in Hamburg -- observer pattern Scene bring in How can it be? You can't wait until …… -
[actual combat] query millions of data using multithreading optimization
preface Pre preparation Start test First, make sure that there is data in the database. Due to the complexity of the a…… -
Encrypt sensitive data in the configuration file
Encrypt sensitive data in the configuration file Common steps (introducing related dependencies) <dependency> …… -
Distributed cache scheme
1、 Start with data We need to classify the data before caching By frequency of change: By frequency of use: This data…… -
New Java 8 features
A lambda expression is an anonymous function, that is, a function without a function name. From dynamic reference to d…… -
Kafka detailed tutorial plus surface test questions
1、 Deploy Kafka cluster To start the zookeeper service: Modify the configuration file config / server properties #bro…… -
Start with communication and talk about message oriented middleware
1、 Communication mode between systems We can think of ways: Disadvantages of each mode: We expect a way of communicat…… -
Spring cloud and distributed services
1、 Development history of microservices When to use microservices? Zhongtai construction 2、 Best practices for micro…… -
Performance optimized database 3- primary key generation and paging query
Topic 1: generation of primary key ID Database based auto_ The increment self increment ID can be used as a distribute…… -
Other queues of distributed message queue
1、 Rabbitmq 2、 Rocketmq Difference from Kafka: 3、 Pulsar Pulsar is a server to server messaging system, which has t…… -
Let’s talk about second kill
The essence of second kill Business: a promotional marketing activity Technically: an active DDoS attack with technica…… -
Dubbo for distributed services
1、 Dubbo introduction Dubbo is a high-performance, lightweight open source Java service framework. It provides six co…… -
Redis development and use guide
Redis Redis is an open source (BSD licensed) in memory data structure storage, which is used as database, cache and me……