Java
-
A pattern triggered by a duck — strategy pattern
Pre knowledge: You need to understand the of Java: 1. Packaging 2. Succession 3. Polymorphism 4. Abstraction The first…… -
Spring boot is packaged into docker (idea + traditional method)
1. Mode 1 Remote publishing via idea 1.1 modify docker Service file vim /usr/lib/systemd/system/docker.service 2. Mod…… -
Web calculator based on servlet + JSP
Web calculator based on servlet + JSP This time, the boss assigned us a task to review the jump of web pages A big cop…… -
Problems encountered in deploying the project to Linux
1. Local Navicat for MySQL cannot connect to the server (CentOS 7 x86_64 BBR) 1045 error: Solution steps: 1. Check whe…… -
Developer scheduling software
Developer scheduling software After I finished setting up in school these days, I found a simple array l class project…… -
File replication of IO stream in Java
O (∩ ∩) O ha ha~ 1. Overview A mature language must have several modules: IO, communication, thread, UI As a mature pr…… -
Java implementation of Huffman tree
O(∩_∩)O~~ summary I think everyone who has studied data structure must know Huffman. The great God invented the famous…… -
Java implementation of Huffman tree
O(∩_∩)O~~ summary I think everyone who has studied data structure must know Huffman. The great God invented the famous…… -
Elimination of big data by bit mapping
The problem is: m (such as 1 billion) int integers, only n of which have been repeated, read them into memory and dele…… -
A simple small bookkeeping program (Java)
I feel that I have learned a lot of basic knowledge, but I haven't been able to figure out the actual development proc…… -
Storage of variables in Java notes
1. Java variable storage domain The storage areas of Java variables are mainly placed in the following places: (1) Reg…… -
Java source code analysis: source code analysis of guava’s immutable set immutable map
1、 Case scenario I have encountered such a scenario. When defining a static modified map, a large number of put () me…… -
Simple thoughts on the implementation of wechat code scanning login Technology
Wechat code scanning login is a common operation. However, many people may not have thought about the idea of its impl…… -
Java parsing XML file encounters special symbols & Solutions for exceptions
Wen / Zhu Jiqian During the development of Java parsing XML files, when Sax parsing is used, such an exception message…… -
Soul torture: do you really understand the system out. Does println () work?
Original / Zhu Jiqian Soul torture, this Duxiu classmate, can you solve this problem? Please talk about the principle …… -
Strategy enumeration: eliminate the elegant gesture of mass use of if else in the project
Wen / Zhu Jiqian When I first came into contact with java object-oriented programming, if I encountered a large number…… -
Summary of java reflection mechanism development experience
I often use the reflection mechanism in practical projects, so I will take some summary notes on the learned reflectio…… -
Java programming skills: summary of if else Optimization Practice
Wen / Zhu Jiqian To tell you the truth, I hate to use if else in my code. Firstly, the execution method of this kind o…… -
About redis
Introduction to redis Redis is an open source in memory data structure storage system, which can be used as database, …… -
Java uses reflection
There are two types of objects in Java programs at run time: compile time type and run time type. For example, list = …… -
Session storage
Sessions are actually divided into server-side sessions and client-side sessions. When the user establishes a connecti…… -
Bias lock
In order to reduce the resource overhead of lock competition in the case of no lock competition, biased lock is introd…… -
Queues available to the java thread pool
Constructor of java thread pool ThreadPoolExecutor: You can see that the queue used by the thread pool is the blocking…… -
Computer networks – IP and ports
Hierarchical model of computer network OSI layered model: physical layer, data link layer, network layer, transport la…… -
HashMap put method
The implementation process of the put method of HashMap can be understood through the following figure. If you are int…… -
Java multithreading – thread synchronization
When multiple threads operate on the same object, it is easy to cause thread safety problems. In order to solve the pr…… -
Redis high availability – Master & slave
Master & slave is what we call master-slave replication, that is, after the host data is updated, it is automatica…… -
Java multithreading – callable and future
Known methods for creating multithreading include inheriting the tree class and implementing the runnable method. In a…… -
Why is I + + thread unsafe
Mainly because I + + is not atomic, it will be compiled into I = I + 1; In fact, there are three steps. One is read, m…… -
Java socket – half closed
Typically, the output stream is closed to indicate that the output has ended. However, this cannot be done during netw…… -
How to avoid duplicate form submission
Client scheme Disable the submit button. After the form is submitted, use JavaScript to disable the submit button. Thi…… -
Java implementation of simple web page capture
Requirement Description: use java to grab web page information and return it in the form of string. Implemented using ……