Java
-
Fastjson reads the JSON configuration file
Fastjson read JSON configuration file: Dependency: import org. apache. commons. io. IoUtils; import org. apache. commo…… -
Another way to play serial number generation
Usually, we like to use time as a kind of serial number when generating serial number, but the length of time serial n…… -
Java file reading and writing — reprint
read file http://www.baeldung.com/java-read-file 1. Overview In this tutorial we’ll explore different ways to read fro…… -
Concurrent programming — Concurrent data structure — reprint
Concurrent programming series articles: initial solution thread pool: detailed explanation thread pool: concurrent dat…… -
Thread cooperation based on Java 2 runtime security model — turn
In versions prior to Java 2, the runtime security model used a very strictly restricted sandbox model( Sand@R_172_241…… -
Top 10 Mistakes Java Developers Make–reference
This list summarizes the top 10 mistakes that Java developers frequently make. #1. Convert Array to ArrayList To conve…… -
Improve I / O performance by extending RandomAccessFile class with buffer — reprint
< H3 id = "n1002e" > main body: At present, the most popular J2SDK version is the 1.3 series. Developers using t…… -
Input system variables and operating parameters in eclipse — turn to
Original address: http://chenzhou123520.iteye.com/blog/1931670 During development, sometimes different system paramete…… -
-
No enclosing instance of type E is accessible Must qualify the allocation with an enclosing
Original text: http://blog.csdn.net/sunny2038/article/details/6926079 Recently, I was looking at Java. When compiling …… -
Serialization and deserialization — to
http://www.infoq.com/cn/articles/serialization-and-deserialization brief introduction The author serves meituan recomm…… -
Java implementation of RSA encryption, decryption and digital signature — to
RSA public key encryption algorithm was proposed by Ron Rivest, ADI Shamir and Leonard Adleman in 1977. At that time, …… -
tomcat:there is no resources that can be added or removed from server
reason: 1. Not a web project Solution: Project -- > Property -- create or modify a project facet 2. Incompatible ve…… -
Analysis of servlet working principle — reprint
Original text: http://www.ibm.com/developerworks/cn/java/j-lo-servlet/index.html?ca=drs - Web technology has become on…… -
Detailed explanation of Java 8 stream API — turn to
Original address: http://blog.csdn.net/chszs/article/details/47038607 1、 Stream API introduction 8 introduces a new s…… -
Deep parsing of Java Memory Model: summary — turn
Original address: http://www.codeceo.com/article/java-memory-7.html Processor memory model Sequential consistent memor…… -
Dynamics of Java Programming Part 1: classes and class loading — reprint
Original address: http://www.ibm.com/developerworks/cn/java/j-dyn0429/ This article is the first in a new series that …… -
Monitor and diagnose performance in Java se 6 — reprint
Java SE 6 provides an in-depth focus on performance,offering expanded tools for managing and monitoring applications a…… -
java. util. Detailed analysis of concurrent package — transfer
Original address: http://blog.csdn.net/windsunmoon/article/details/36903901 summary . util. Concurrent contains many t…… -
Java implementation and comparison of several task scheduling methods — reprint
< H2 id = "major1" > Preface Task scheduling refers to the automatic execution of tasks based on a given time po…… -
Use org apache. jasper. Jspc compiled JSP file — reprint
Jspc. Jspc setArgs(args); Set the required parameters, which is the same as compiling with instructions, Example of us…… -
Encoding and scrambling (05) — conversion between GBK and UTF-8 — reprint
Original address: http://www.blogjava.net/pengpenglin/archive/2010/02/22/313669.html [GBK to UTF-8] On many forums and…… -
No copy code — eclipse uses git to submit the project – transfer
Original address: http://blog.csdn.net/u014079773/article/details/51595127 preparation: Purpose: Eclipse uses git to s…… -
This request has been blocked under HTTPS; the content must be served over HTTPS.
How to introduce HTTP resources into HTTPS web pages: mixed content? https://segmentfault.com/q/1010000005872734/a-102…… -
Full GC experience analysis
Background: Individual machines: memory suddenly rises and CPU utilization increases. Solving process 1. Jmap dump ent…… -
Websocket actual combat — turn
Original address: http://www.ibm.com/developerworks/cn/java/j-lo-WebSocket/ As we all know, the interaction process of…… -
How to Tune Java Garbage Collection–reference
reference: http://architects.dzone.com/articles/how-tune-java-garbage -
How to Read, Write XLSX File in Java – Apach POI Example—reference
No matter how Microsoft is doing in comparison with Google,Microsoft Office is still the most used application in soft…… -
Difference between HashMap and identityhashmap
Original address: https://dzone.com/articles/difference-between-hashmap-and Most of the time I use HashMap whenever a …… -
Using reflection to assign values to JavaBean instances
To simplify and unify, java bean instances need to be uniformly assigned values. The implementation code is as follows…… -
Dynamics of Java programming, Part 7: bytecode design with BCEL — reprint
In the last three articles in this series, I showed how to manipulate classes with the javassist framework. This time ……