Java
-
Java exception handling: a layer of insurance for programs
In one's life, one will always encounter some unexpected troubles, which may give us a heavy blow. In order to reduce …… -
The popular cognition of Java collection classes
To be frank, Java provides a complete set of collection classes (also known as container classes) to manage a group of…… -
To learn java programming well, you must pass the four levels: constructor, method overload, this keyword and garbage collection mechanism!
Some people say that you should pay attention to current affairs, finance and economics, and even popular movies and T…… -
On the importance of Java access control
In front of what is the easiest person to lose resistance? Beauty is a. For example, Xi Shi's contribution is to bear …… -
How and Why Unsafe is Used in Java—reference
By sun. misc. Unsafe has been in Java from at least as far back as Java 1.4 (2004). In Java 9,Unsafe will be hidden al…… -
Jar package dependency query
When you encounter jar package conflicts in the project, you need to understand the dependency of jars before excludin…… -
Base64 is used in cross platform transmission to ensure the integrity of non ASCII code strings
First, let's take an example: In this case, the B and B1 byte arrays are the same. What about the following situation?…… -
Simple beauty jodd HTTP — in-depth understanding of the source code HTTP protocol
Jodd is an open source Java tool set, which contains some practical tool classes and small frameworks. Simple but powe…… -
Understanding extension class loading — Official
http://docs.spring.io/spring-amqp/docs/1.3.6.RELEASE/reference/html/sample-apps.html#d4e1285 http://docs.spring.io/spr…… -
Java permissions and security policy — official document
3 Permissions and Security Policy 3.1 The Permission Classes The permission classes represent access to system resourc…… -
JAAS LOGIN IN WEBLOGIC SERVER–reference
The Java Authentication and Authorization Service (JAAS) is a standard extension to the security in the J2SE Developme…… -
Design and implementation of cache — reprint
This article is compiled from the following two Blogs: http://my.oschina.net/ScottYang/blog/298727http://my.oschina.ne…… -
Handling of inconsistent compiled code when eclipse uses Tomcat for deployment
Operation steps: 1. Add and remove items first 2. Clean clears the directory of the project in Tomcat 3. project-->…… -
Event based NiO multithreaded server — reprint
JDK1. NiO of 4 effectively solves the problem of thread overhead existing in the original streaming io. The main purpo…… -
Glossary of Terms in the JavaTM platform –reference
http://docs.oracle.com/javase/tutorial/information/glossary.html field :A data member of a class. Unless specified oth…… -
Jackson ignores unnecessary fields when deserializing
Sometimes, if a field is added to the database table, but the returned JSON string contains a field we do not need, an…… -
Java annotations: explored & explained — reprinted
Original address: http://www.javacodegeeks.com/2012/08/java-annotations-explored-explained.html One of the many wonder…… -
New function in Java math class — floating point number
Java ™ Language specification version 5 Lang. math and Java Lang. strictmath adds 10 new methods, and Java 6 adds 10 m…… -
In depth analysis of the working mechanism of Java I / O — reprint
< H2 id = "1. Basic architecture of Java I / O class library | outline" > basic architecture of Java I / O class…… -
Jmap view memory usage and generate heapdump — conversion
PHP? uid=191&do=blog&id=7572"> http://www.webspherechina.net/home/space.PHP?uid=191&do=blog&id=7572…… -
Fork and Join: Java Can Excel at Painless Parallel Programming Too!— turn
Original address: http://www.oracle.com/technetwork/articles/java/fork-join-422606.html Concurrent Programming in Java…… -
Simple session shared encapsulation
objective The session is stored on the cache server (all kinds of cache servers can be used. This article takes memcac…… -
Curl request simulates post sending JSON
Example: curl - x post -- header "content type: application / JSON" -- data '{"name": "SSS", "IDnumber": "1111", "appk…… -
Change value of string array at debug eclipse
Question: I have an application,but to test something,I need to change value of a String[]. But when I do it using ch…… -
5 Ways to Use Log Data to Analyze System Performance–reference
Recently we looked across some of the most common behaviors that our community of 25,000 users looked for in their l…… -
Beauty of simplicity jodd — props attribute usage
Prop is a super property; It contains many things missing from JDK: UTF-8 support, macros, partitions, profiles, full …… -
Read the properties file with Java — transfer to
Today, Google took a long time to read the properties file through Java and finally found it. Now I'd like to share it…… -
Detailed explanation of Java serializable and externalizable serialization and deserialization — to
1、 What is serialization? "Object serialization" has been a feature since Java 1.1. In short, it can convert an objec…… -
Basic example of JMX technology — reprint
Original address: http://nick-lab.gs.washington.edu/java/jdk1.5b/guide/jmx/tutorial/connectors.html heading1">2.1 I…… -
JSTL SQL tag usage
1.setDataSource 2.query 3.update 4.transaction Tags are used to establish transaction context for tags and tags. Its s…… -
Understanding JTS–reference
Part I-An introduction to transactions If you look at any introductory article or book on J2EE,you'll find only a smal…… -
Living in the matrix with bytecode regulation
Original address: https://www.infoq.com/articles/Living-Matrix-Bytecode-Manipulation You are probably all too familiar……