Java
-
The Java nouns of “cannibalism”: object, reference, heap, stack
I remember that there was a text named "Madman's diary" in the middle school textbook; At that time, I couldn't unders…… -
Java string: a string class that is so important that others can only be the second
String is the most important class in Java. This affirmative inference is not what James Gosling, the father of Java, …… -
Is the inner class of Java really so difficult to understand?
I parked my car and went home last night. When I got home, I found my cell phone in the car, but it was too cold outsi…… -
Three common ways of Java code reuse: inheritance, composition and proxy
Reusing code is one of the most striking features of Java. This sentence is very smooth, no problem, but the problem i…… -
Input system variables and operating parameters in eclipse — turn to
Original address: http://chenzhou123520.iteye.com/blog/1931670 During development, sometimes different system paramete…… -
-
No enclosing instance of type E is accessible Must qualify the allocation with an enclosing
Original text: http://blog.csdn.net/sunny2038/article/details/6926079 Recently, I was looking at Java. When compiling …… -
Serialization and deserialization — to
http://www.infoq.com/cn/articles/serialization-and-deserialization brief introduction The author serves meituan recomm…… -
Java implementation of RSA encryption, decryption and digital signature — to
RSA public key encryption algorithm was proposed by Ron Rivest, ADI Shamir and Leonard Adleman in 1977. At that time, …… -
tomcat:there is no resources that can be added or removed from server
reason: 1. Not a web project Solution: Project -- > Property -- create or modify a project facet 2. Incompatible ve…… -
Analysis of servlet working principle — reprint
Original text: http://www.ibm.com/developerworks/cn/java/j-lo-servlet/index.html?ca=drs - Web technology has become on…… -
Detailed explanation of Java 8 stream API — turn to
Original address: http://blog.csdn.net/chszs/article/details/47038607 1、 Stream API introduction 8 introduces a new s…… -
Deep parsing of Java Memory Model: summary — turn
Original address: http://www.codeceo.com/article/java-memory-7.html Processor memory model Sequential consistent memor…… -
Dynamics of Java Programming Part 1: classes and class loading — reprint
Original address: http://www.ibm.com/developerworks/cn/java/j-dyn0429/ This article is the first in a new series that …… -
Monitor and diagnose performance in Java se 6 — reprint
Java SE 6 provides an in-depth focus on performance,offering expanded tools for managing and monitoring applications a…… -
java. util. Detailed analysis of concurrent package — transfer
Original address: http://blog.csdn.net/windsunmoon/article/details/36903901 summary . util. Concurrent contains many t…… -
Java implementation and comparison of several task scheduling methods — reprint
< H2 id = "major1" > Preface Task scheduling refers to the automatic execution of tasks based on a given time po…… -
Use org apache. jasper. Jspc compiled JSP file — reprint
Jspc. Jspc setArgs(args); Set the required parameters, which is the same as compiling with instructions, Example of us…… -
Encoding and scrambling (05) — conversion between GBK and UTF-8 — reprint
Original address: http://www.blogjava.net/pengpenglin/archive/2010/02/22/313669.html [GBK to UTF-8] On many forums and…… -
No copy code — eclipse uses git to submit the project – transfer
Original address: http://blog.csdn.net/u014079773/article/details/51595127 preparation: Purpose: Eclipse uses git to s…… -
This request has been blocked under HTTPS; the content must be served over HTTPS.
How to introduce HTTP resources into HTTPS web pages: mixed content? https://segmentfault.com/q/1010000005872734/a-102…… -
Full GC experience analysis
Background: Individual machines: memory suddenly rises and CPU utilization increases. Solving process 1. Jmap dump ent…… -
Websocket actual combat — turn
Original address: http://www.ibm.com/developerworks/cn/java/j-lo-WebSocket/ As we all know, the interaction process of…… -
How to Tune Java Garbage Collection–reference
reference: http://architects.dzone.com/articles/how-tune-java-garbage -
How to Read, Write XLSX File in Java – Apach POI Example—reference
No matter how Microsoft is doing in comparison with Google,Microsoft Office is still the most used application in soft…… -
Difference between HashMap and identityhashmap
Original address: https://dzone.com/articles/difference-between-hashmap-and Most of the time I use HashMap whenever a …… -
Using reflection to assign values to JavaBean instances
To simplify and unify, java bean instances need to be uniformly assigned values. The implementation code is as follows…… -
Dynamics of Java programming, Part 7: bytecode design with BCEL — reprint
In the last three articles in this series, I showed how to manipulate classes with the javassist framework. This time …… -
8 great Java features no one’s talking about — reprint
Original address: http://www.infoq.com/articles/Java-8-Quiet-Features If you haven’t seen some of the videos or tutori…… -
Java String Class Example–reference
reference: http://examples.javacodegeeks.com/core-java/lang/string/java-string-class-example/ 1. Introduction In this…… -
Hot replacement of Java classes — reprint
Build an online upgrade system based on Java In this article, we will not explain the details of Java classloader in t……