Java
-
Spring source code analysis – 1 – start
Spring source code analysis - 1 - start @ h_ 403_ 1 @ when using spring in web projects, we will Add the following con…… -
Dependency, association, aggregation, combination
Excerpt from: http://www.iteye.com/topic/632059 rely on It can be simply understood that one class a uses another clas…… -
Java mail
We have used many emails, QQ, 163, Netease, etc. 1、 SMTP protocol should be followed when sending e-mail, and POP3 pr…… -
As you know, Java singleton mode is not singleton mode
When we search the singleton mode, we can see many examples, such as lazy and hungry, as follows: When we write a main…… -
java. lang.NoSuchMethodError: javax. servlet. ServletContext. getContextPath()Ljava/lang/String;
Problem Description: in eclipse 3 This error always occurs when starting Tomcat6 in 7, java. lang.NoSuchMeth…… -
18 ID number verification methods for China’s residents, Java algorithm implementation
public static boolean validate18Idcard(String idcard){ if(idcard == null ) { return false; …… -
Problems caused by cookies containing Chinese
On Friday, after the project test was completed and there was no problem, it went online. After going online, it was f…… -
-
HTTP 403, Tomcat configures HTTPS, unable to access, return status code HTTP 403
In order to access the application started by the local machine (Windows system) in the form of HTTPS, after generatin…… -
Loading of Java classes
Keyworked Java class loading, class loading mechanism, classloader, parent delegation model, parent delegation model W…… -
Java uses zxing to generate QR code bar code
1、 Add the Maven dependency of zxing, or download the zxing jar package This example uses zxing3 Version 2.0 Maven de…… -
Three implementations of Java proxy
The Java proxy mode can be implemented in the following ways: 1. Static proxy. 2. JDK dynamic agent. 3. C…… -
Mybatis source code Learning Series
preface A long time ago, we learned Java from a console of Hello world At the beginning, we entered the object-oriente…… -
The Linux system reports an error when the virtual machine starts. This host supports Intel VT-x, but Intel VT-x is disabled
An error is reported when using the virtual machine to start Linux, as follows: The virtual machine is configured to u…… -
Java program questions
Excerpt from: http://www.cnblogs.com/forlina/archive/2011/08/03/2126292.html 1. Complete quick sorting and bubble …… -
Jedis, spring redis data integrated use, version exceptions and solutions.
Recently, there have been some problems in integrating and using redis spring redis spring:3.2. 4.RELEASE jedis: jedi…… -
The of Java 8 — simple and elegant lambda expressions to explore Java 9 module system and reaction flow
After the release of Java 8, words such as lambda expression, stream and so on slowly appeared in our words. For examp…… -
13000 word HashMap interview must ask for detailed explanation of knowledge points
an introduction to Inheritance of hasmap Principle of HashMap Ways to resolve hash conflicts Open addressing This met…… -
Detailed explanation of hashtable in Java
an introduction to Hashtable is a legacy class. The common functions of many mappings are similar to HashMap. The diff…… -
Java de encryption (AES / CBC) exception on Linux: Java Lang. SecurityException: JCE cannot authenticate the provider BC method
When using MapReduce for data cleaning, you need to decrypt the data. The encryption method is AES / CBC / pkcs7paddin…… -
Front end Foundation (1), HTML
1. Foreword 1.1 software architecture 1.2 the page consists of three parts 2. Introduction to HTML 3. Create HTML file…… -
Java web learning notes (6) JSP
Chapter 6. JSP 1. What is JSP 2. JSP essence 1. JSP is essentially a servlet program 3. Three syntax of JSP 3.1. Page …… -
JavaWeb learning notes (IV) jquery
1、 Introduction to jquery 2、 Preparations before using jquery 3、 Core function $() 4、 Differences between jQuery o…… -
Mac OS fast switching JDK version
Recommended management method: be careful! You can view the current version through Java - version on the command line…… -
JavaWeb learning notes (III) JavaScript
1. Introduction to JavaScript 1、 What is JavaScript 2、 JavaScript features 3、 The difference between Java and JavaS…… -
It turns out that hot loading is so simple. Write a Java hot loading manually
1. What is hot loading Hot loading means that the changed code can take effect without restarting the service. Hot loa…… -
[source code analysis] how are ArrayList and LinkedList implemented? I think you still have a chance!
preface Seriously, among the collection classes most used in Java, list definitely occupies a place. Like map, it is a…… -
Do you understand distributed transactions? What is your data consistency solution across multiple services?
preface Look at the title. This is another question asked in the interview. In fact, this question was asked several t…… -
The file class is used in Java to explain the file operation in detail
We can know that the data stored in the program is temporary. When the program terminates, the data stored in the prog…… -
[deep understanding of Java virtual machine] class loader and parental delegation model
Class loader For any class, the class loader that loads it and the class itself must jointly establish its uniqueness …… -
Xiaobai learns Java: strange randomaccess
Xiaobai learns Java: strange randomaccess When analyzing the source code of the three collections, we said that ArrayL…… -
Have you mastered these collection operations of Java 8?
If you don't know about lambda, you can refer to my previous summary on lambda expression: lambda expression in Java 8……