Java
-
J2EE security introduction — turn
< H2 id = "1" > I brief introduction Now more and more enterprise applications are built on J2EE platform, which…… -
Implementation principle of JDK dynamic agent — reprint
Although the dynamic agent of JDK was used before, some problems have not been understood. For example: who calls the …… -
Garbage collectors – Serial vs. parallel vs. CMS vs. G1 (and what’s new in Java 8) — to
The 4 Java Garbage Collectors - How the Wrong Choice Dramatically Impacts Performance The year is 2014 and there are t…… -
The past and present life of character coding — turn
Original address: http://gitbook.cn/books/599d075614d1bc13375caeaf/index.html Many programmers don't quite understand …… -
Implementation of Java log caching mechanism — reprint
< H2 id = "major1" > overview Log technology provides important support for product quality and service. JDK add…… -
Try with resources analysis in Java 7 — conversion
Original address: http://blog.csdn.net/hengyunabc/article/details/18459463 The so-called try with resources is a synta…… -
Environment variables of windows DOS command window
When installing Maven today, I encountered MVN - V, which shows that MVN is not the command line and the environment v…… -
Use JSSE to customize the properties of SSL connection — reprint
JSSE provides secure communication for Java applications by encrypting and protecting data over the network using SSL.…… -
JAAS authentication in Tomcat example–reference
In this tutorial you will learn how to configure JAAS authentication in Tomcat using the HTTP Basic authentication …… -
The difference between form data, x-www-form-urlencoded, raw and binary in postman — transfer
Original address: http://blog.csdn.net/ye1992/article/details/49998511 1、form-data: It is the multipart / form data i…… -
In depth analysis of Chinese coding in Java — conversion
< H2 id = "major1" > several common coding formats < H3 id = "minor1.1" > why code I wonder if you have ev…… -
Example of concurrenthashmap in Java — to
Original address: http://www.concretepage.com/java/example_concurrenthashmap_java On this page we will provide example…… -
When using jetty for debugging, eclipse relies on the source code debugging method of the project
[1] Add source eclipse-->debug as-->debug configurations-->source [2] If source does not work Recompile and M…… -
Five things you don’t know about the Java collections API — turn
Part 1 http://www.ibm.com/developerworks/cn/java/j-5things2.html For many Java developers, the Java collections API is…… -
no awt in java. libary. path
Missing dependent package. Under Linux, enter the JDK installation path / JRE / lib / i386 Use LDD to view dependent p…… -
-
The windows command calculates MD5 and SHA1 / 256 values
certutil -hashfile file MD5 certutil -hashfile file SHA1 certutil -hashfile file SHA256 Examples are as follows: -
Chinese to Unicode, Chinese to bytes, Unicode to bytes, Java implementation
Encoding format of string: String hex="\u5df2\u5b9e\u540d\u5236";// hexadecimal -
RESTful Web Services: A Tutorial–reference
As REST has become the default for most Web and mobile apps,it's imperative to have the basics at your fingertips. -
Be careful when designing database fields or using boolean type in Java
Boolean variables have only two values: false and true. We will use Boolean when designing database fields or defining…… -
What’s new in Java se 6: compiler API
< H2 id = "n10044" > Introduction to new API functions JDK 6 provides an API to call the compiler at run time. L…… -
BigDecimal division exception
When two BigDecimal numbers are used for division, the following exception message appears: solve: The generated excep…… -
Thread safety
Three types of thread safety: 1. Do not share variable state variables between threads. 2. Change the shared variable …… -
Deep parsing of Java Memory Model: Lock — turn
Original address: http://www.codeceo.com/article/java-memory-5.html Release of lock - acquire the established happens …… -
Keystore vs truststore — reprint
Original text: http://lukejin.iteye.com/blog/605634 Today, a colleague asked me about these two concepts, so I recorde…… -
Java 8 concurrency tutorial — to
Threads and Executors Welcome to the first part of my Java 8 Concurrency tutorial. This guide teaches you in Java 8 w…… -
Java 7 multithreading – semaphore — reprint
Semaphore is used to save the number of currently available licenses. This is achieved by sharing locks. According to …… -
java. net. Socketexception four exception solutions – turn
java. net. How can socketexception be better used? This requires us to understand the relevant problems about the lang…… -
Improving Lock Performance in Java–reference
After we introduced to couple of months ago,we have started to receive queries similar to “hey,great,Now I understand …… -
Integer problem encountered in the project — transfer
Integer type value equal or unequal analysis http://www.cnblogs.com/zzllx/p/5778470.html See the interview question wr……