Java
-
Java security coding guide: thread API call rules
Thread is indispensable in the development of multithreading in Java. What rules should we pay attention to when using…… -
Troubleshooting: analyze outofmemoryerror exceptions
brief introduction java. Lang. outofmemoryerror should be a very common error in Java applications. So what is the cau…… -
Java secure coding guide: number operation
brief introduction In Java, there are byte, short, int, long, float, double and char that can be called number. What s…… -
Jdk14 performance management tool: introduction to jstat
brief introduction As a programmer, I often worry about how to locate problems in Java programs or tune JVM performanc…… -
Introduction to splitter in Java 8 stream
Introduction to splitter in Java 8 stream brief introduction Splitter is an interface introduced in Java 8. It is usua…… -
Java secure coding guide: input verification
brief introduction In order to ensure the security of Java programs, we believe that any input from external users may…… -
Junior sister learning java IO: file file system
brief introduction Younger martial sister has encountered another problem. This time, the problem is about file creati…… -
Spring Boot 2. X Series tutorial: seven days from scratch to master spring boot – continuous update
brief introduction Since the birth of spring, spring has become the de facto J2EE standard. As a lightweight J2EE appl…… -
Detailed explanation of reactive stream protocol
background Everyone should be familiar with stream. Java8 introduces the concept of stream for all collection classes.…… -
Troubleshoot: what exactly is GC tuning
brief introduction We often hear that we even need to do GC tuning ourselves. So what is the purpose of GC tuning? Mak…… -
How to break the foreach of java8 stream
How to break the foreach of java8 stream brief introduction We usually need to traverse and process the data in Java s…… -
Java secure coding guide: the correct use of lock and synchronization
brief introduction In Java multithreading environment, lock and synchronization are functions that we will use. So wha…… -
Junior sister learning java IO: file and path
brief introduction What is the relationship between file and path? What secrets are hidden in files and paths? Under t…… -
Java secure coding guide: string and coding
brief introduction String is the most commonly used Java type in our daily coding process. Languages in different regi…… -
Abstractqueuedsynchronizer (AQS), the base of synchronization class
Abstractqueuedsynchronizer (AQS), the base of synchronization class We introduced many synchronization classes before,…… -
JDK1. 8 new feature lambda expression simplification. There is an optimization method of for loop in if else
In the daily development process, being able to write the code does not necessarily mean being able to write the code …… -
Java method parameters can only be passed by value!
In common parlance, the transfer of method parameters is divided into two types: value transfer and reference transfer…… -
[difficult Java PROBLEMS] the execution sequence of try catch finally when there is a return
There is such a problem that everyone should be familiar with exception handling, similar to the following code: When …… -
[difficult and miscellaneous problems of Java] use Java core library to realize simple AOP
Spring is a very popular open source framework, and AOP (aspect oriented programming) is one of the most important con…… -
[introduction to Java] Day6 Java inner class – member inner class
What the inner class is, in short, is the class defined inside the class (serious nonsense). A serious inner class loo…… -
You must know the type of java reference — a detailed explanation of phantom reference source code
definition Phantom reference is a virtual reference that does not affect the life cycle of an object, nor can it get a…… -
Java zero foundation entry series – day13 inheritance and polymorphism of Java classes
Inheritance is a very important feature of a class. What? You don't even know about inheritance? Are you trying to pis…… -
[introduction to Java] Day9 Java internal class – static internal class
Today, let's talk about the last internal class in Java - static internal class The so-called static inner class is na…… -
[introduction to Java] callback in day4 Java
After another busy week, things have almost been solved. Finally, I can continue to write my blog (you've been waiting…… -
[introduction to Java] day14 a preliminary study on generics in Java
Generics is a very interesting and important concept. This article will briefly introduce the generics feature in Java…… -
[introduction to Java] day34 detailed explanation of Java container class (XV) detailed explanation of weakhashmap
The detailed source code series are analyzed based on jdk8 explain At the end of the Java container explanation series…… -
Java zero foundation entry series – day4 variables and constants
This article mainly explains variables in Java, what variables are, the role of variables, and how to declare and use …… -
[introduction to Java] Day6 Java inner class – member inner class
What the inner class is, in short, is the class defined inside the class (serious nonsense). A serious inner class loo…… -
Java zero foundation entry series – day3 java basic data type
The first two articles have built the development environment. If you have completed the deployment step by step accor…… -
Java collection source code analysis (6): HashMap
summary HashMap is an implementation class based on hash table, which is unsafe for the next thread of map interface. …… -
Java zero foundation entry series – array in Day10 Java
What is an array? As the name suggests, it is a combination of data, putting some numbers of the same type into a grou…… -
Java reference types you must know [Conclusion]
Summary of four reference types Reference level: strong reference > soft reference > weak reference > virtual……