Java
-
Java stack and heap, static area
The memory of Java JVM can be divided into three areas: heap, stack and method Stacking area: 1. All objects stored ar…… -
Explain the construction of java development environment in detail
For any language development, the primary link must be the construction of the development environment, as is the Java…… -
Detailed analysis of java basic types and wrapper classes
The Java language provides eight basic types. There are six numeric types (four integers, two floating points), one ch…… -
Java collection (data conversion between list collection and map collection)
Specific requirements are as follows: Function 1: define the method public void listtomap() {} to encapsulate the stud…… -
10 common errors when Java developers write SQL statements
The coordination between Java developers' object-oriented programming thinking and command-line programming thinking d…… -
-
Java network programming (TCP explanation)
Network programming details - TCP First, the characteristics of TCP protocol are connection oriented protocol (if ther…… -
Arrays of Java data structures (2)
Bubble sort: /** *To sort n numbers, a total of n-1 times are sorted, and the sorting times of each I time is (n-1). T…… -
Connecting SQL Server 2000 with Java
The first: the cross platform ability of Java language to connect the database through ODBC (write once, run anywhere)…… -
The relationship and difference between Java interface and abstract class.
The relationship and difference between interface and abstract class. 1、 Simple summary 1. Abstract classes and inter…… -
Java connection sqlserver2008 database code
The code of Java connecting to sqlserver2008 database is as follows: -
Java method for converting integer into Chinese capital amount
In our daily life, we often convert Arabic numerals into Chinese capital: "zero", "one", "two", "three", "four", "Five…… -
XML parsing of Java (Dom4j Technology)
Parsing XML files with Dom4j Technology I. Introduction to XML Full name: Extended Markup Language allows programmers …… -
Java connects to MySQL database Java connects to SQL Server database
In Java applications, we often perform necessary operations on the database. Next, we'll learn how to use java to conn…… -
Java – how to use ffmpeg in Android to reduce the video size captured by the default camera?
I am trying to reduce the video size captured by the default camera in Android (it is generating high-resolution video…… -
elasticsearch7. Version 6.1 + jsoup crawl JD commodity data and use it
Actual combat: elasticsearch7 Version 6.1 + jsoup crawl JD commodity data and use it @H_ 404_ 3 @ Preface @H_ 404_ 3 @…… -
Overloading and rewriting in Java
The difference between overloading and rewriting Overloading occurs in the same class, the same method, with different…… -
Daily Note: About arrays Aslist and collections Some understanding of unmodifiable list
1. Create a list normally and operate the list List<Integer> collect = Stream.of(1,3,5,7,9).collect(Collectors.t…… -
String s1 = new String(“abc”); How many string objects will this code create?
String s1 = new String("abc"); How many string objects will this code create? The answer is to create one or two Creat…… -
[design pattern] the design pattern in Hamburg — observer pattern
[design pattern] the design pattern in Hamburg -- observer pattern Scene bring in How can it be? You can't wait until …… -
[actual combat] query millions of data using multithreading optimization
preface Pre preparation Start test First, make sure that there is data in the database. Due to the complexity of the a…… -
Encrypt sensitive data in the configuration file
Encrypt sensitive data in the configuration file Common steps (introducing related dependencies) <dependency> …… -
Super detailed Kafka tutorial coming
Kafka concept and introduction Kafka is a message system. Designed and developed by LinkedIn in 2011. Kafka is a distr…… -
Share a real case of refactoring
Write in front Think about why refactoring? If there is no reason to say, it is recommended not to refactor easily. St…… -
Lock of Java Concurrent Programming
1、 Lock lock java. util. concurrent. locks. Lock Why do I need lock when I have synchronized? 1.1 reentrantlock Simpl…… -
From spring to springboot
1、 From spring to springboot With the growing ecosystem of spring, spring has become more and more complex and bloate…… -
Performance optimization database
Performance optimization - database Part 1 First, what is performance? Generally speaking, the consumption of db / SQL…… -
Distributed cache scheme
1、 Start with data We need to classify the data before caching By frequency of change: By frequency of use: This data…… -
New Java 8 features
A lambda expression is an anonymous function, that is, a function without a function name. From dynamic reference to d…… -
Kafka detailed tutorial plus surface test questions
1、 Deploy Kafka cluster To start the zookeeper service: Modify the configuration file config / server properties #bro…… -
Start with communication and talk about message oriented middleware
1、 Communication mode between systems We can think of ways: Disadvantages of each mode: We expect a way of communicat…… -
Spring cloud and distributed services
1、 Development history of microservices When to use microservices? Zhongtai construction 2、 Best practices for micro……