Java
-
Why is I + + thread unsafe
Mainly because I + + is not atomic, it will be compiled into I = I + 1; In fact, there are three steps. One is read, m…… -
AQS
AQS, the queue synchronizer abstractqueuedsynchronizer (hereinafter referred to as synchronizer), is the basic framewo…… -
The difference between get and post
The difference between get and post can be seen from three levels: Browser / server level, HTTP protocol level and sem…… -
Java implementation of simple web page capture
Requirement Description: use java to grab web page information and return it in the form of string. Implemented using …… -
Thread pool provided by Java by default
Java thread pools are built through ThreadPoolExecutor. In the executors factory class, Java provides four types of th…… -
Java new IO
Traditional IO Stream oriented input / output systems such as InputStream, OutputStream, reader and writer in Java are…… -
Clone of Java objects
In the Java language, data types are divided into value types (basic data types) and reference types. Value types incl…… -
Access rights in Java
There are four access permissions in Java, from large to small: public – > protected – > Default (friendly) – &g…… -
Java multithreading – thread pool
The cost of starting a new thread is relatively high. When a large number of threads with short lifetime need to be cr…… -
Spring IOC principle
Container initialization The initialization of the container is first performed in the corresponding constructor. In t…… -
Get the file character set with jchardet
Some time ago, when learning Lucene, I encountered the problem of reading TXT documents and encountering coding errors…… -
Java multithreading – the life cycle of threads
The life cycle of a thread is divided into five stages: new, runnable, running, blocked and dead. After the thread is …… -
Lock expansion
If a series of continuous operations repeatedly lock and unlock the same object, or even the lock operation occurs in …… -
Java multithreading – control thread
Join thread When the join () method of another thread is invoked in the execution stream of a thread, the calling thre…… -
Java simulates HTTP get and post requests
As shown in the title, use java to simulate get and post requests. Get can be used to capture web pages, and post can …… -
Serialization and deserialization of Java objects
The goal of object serialization is to save the object on disk or transfer it over the network. The implementation mec…… -
TCP shakes hands three times and waves four times
TCP header The source port and destination port determine the processes of both sides at the TCP layer. The serial num…… -
TIME_ Wait and close_ WAIT
First look at the state changes of three handshakes and four waves: There are usually two situations: Because Linux al…… -
Servlet and thread safety
Let's start with the conclusion: servlets are not thread safe. Servlet running process The servlet program is called b…… -
I use java to realize flying pigeon Book transmission 2 – realize file transmission
Step 2: realize file transfer. In the previous step, only a string was passed from the server to the client. This time…… -
A novel collection program implemented in Java
Don't scold me if you are attracted by the title. It's just a simple implementation. I wrote it to download a favorite…… -
About thread pools
Core parameters of thread pool The process of adding threads to the thread pool By default, a thread is created for ea…… -
Java class loader
Class loader description The class loader is responsible for The class file is loaded into memory, and a Java. Java. X…… -
Java Memory Model
The Java Memory Model stipulates that all variables are stored in the main memory; the working memory of a thread stor…… -
Java socket – use proxy server
There's no need to say more about why you use a proxy server. Using proxy Java provides a proxy class implementation t…… -
Lightweight Locking
The scenario for lightweight locks is that threads execute synchronization blocks alternately. -
Can the key and value of map be null
Can the key and value of map be null? Write the program directly to verify: Execution results: The conclusions are as …… -
Java: the optimization process of exporting large quantities of Excel data
background At present, the team is working on a user data Kanban (hereinafter referred to as Kanban), which basically …… -
Pit father’s maven
Maven has not been used before. Recently, when studying cursor, I imported other people's projects, but there is no co…… -
(transfer) 13 core technologies of J2EE
1、 JDBC (Java database connectivity) JDBC API provides a unified way to access different databases. Like ODBC, JDBC s…… -
How to reference a third-party jar package when making a jar package
I use eclipse packaging, but when the CMD window is executed, an error "there is no main manifest attribute in activem…… -
String what is the maximum length of a string?
In the process of learning and development, we often discuss the value range of basic data types such as short, int an……