Java
-
java. util. Detailed analysis of concurrent package — transfer
Original address: http://blog.csdn.net/windsunmoon/article/details/36903901 summary . util. Concurrent contains many t…… -
Java implementation and comparison of several task scheduling methods — reprint
< H2 id = "major1" > Preface Task scheduling refers to the automatic execution of tasks based on a given time po…… -
Use org apache. jasper. Jspc compiled JSP file — reprint
Jspc. Jspc setArgs(args); Set the required parameters, which is the same as compiling with instructions, Example of us…… -
Encoding and scrambling (05) — conversion between GBK and UTF-8 — reprint
Original address: http://www.blogjava.net/pengpenglin/archive/2010/02/22/313669.html [GBK to UTF-8] On many forums and…… -
No copy code — eclipse uses git to submit the project – transfer
Original address: http://blog.csdn.net/u014079773/article/details/51595127 preparation: Purpose: Eclipse uses git to s…… -
This request has been blocked under HTTPS; the content must be served over HTTPS.
How to introduce HTTP resources into HTTPS web pages: mixed content? https://segmentfault.com/q/1010000005872734/a-102…… -
Full GC experience analysis
Background: Individual machines: memory suddenly rises and CPU utilization increases. Solving process 1. Jmap dump ent…… -
Websocket actual combat — turn
Original address: http://www.ibm.com/developerworks/cn/java/j-lo-WebSocket/ As we all know, the interaction process of…… -
How to Tune Java Garbage Collection–reference
reference: http://architects.dzone.com/articles/how-tune-java-garbage -
How to Read, Write XLSX File in Java – Apach POI Example—reference
No matter how Microsoft is doing in comparison with Google,Microsoft Office is still the most used application in soft…… -
Difference between HashMap and identityhashmap
Original address: https://dzone.com/articles/difference-between-hashmap-and Most of the time I use HashMap whenever a …… -
Using reflection to assign values to JavaBean instances
To simplify and unify, java bean instances need to be uniformly assigned values. The implementation code is as follows…… -
Dynamics of Java programming, Part 7: bytecode design with BCEL — reprint
In the last three articles in this series, I showed how to manipulate classes with the javassist framework. This time …… -
8 great Java features no one’s talking about — reprint
Original address: http://www.infoq.com/articles/Java-8-Quiet-Features If you haven’t seen some of the videos or tutori…… -
Java String Class Example–reference
reference: http://examples.javacodegeeks.com/core-java/lang/string/java-string-class-example/ 1. Introduction In this…… -
Hot replacement of Java classes — reprint
Build an online upgrade system based on Java In this article, we will not explain the details of Java classloader in t…… -
20 very useful java program fragments — to
Original address: http://geek.csdn.net/news/detail/236591 Here are 20 very useful java program fragments. I hope they …… -
The 10 Most Important Security Controls Missing in JavaEE–reference
JavaEE has some excellent built-in security mechanisms,but they don’t come close to covering all the threats that your…… -
In depth analysis of the working mechanism of Java I / O — reprint
< H2 id = "1. Basic architecture of Java I / O class library | outline" > basic architecture of Java I / O class…… -
Jodd stringtemplateparser uses
Stringtemplateparser is a parser for string templates. Define macros similar to JSP tags in the string template. Durin…… -
Java garbage collection basics — reprint
Original address: http://www.oracle.com/webfolder/technetwork/tutorials/obe/java/gc01/index.html -
Jodd cache collection
Jodd cache provides a set of cache implementations. Its hierarchy is as follows: Among them, Abstractcachemap is the d…… -
The declared package does not match the expected package
Eclipse uses import to import the source code into the project or SVN check-out to import the source code into the pro…… -
-
Int, long are heavier, replace with equal==
First of all, there are many restrictions on = =. For example, if the value of integer type is in [- 128127], it is OK…… -
Compiling JSPS using the command line compiler – Official
Web Server provides the following ways of compiling JSP 2.1-compliant source files into servlets: You must disable dyn…… -
An NIO. 2 primer–reference
Part 1: The asynchronous channel APIs The More New I/O APIs for the Java ™ Platform (NIO.2) is one of the major new fu…… -
Debugging to Understand Finalizer–reference
This post is covering one of the Java built-in concepts called Finalizer. This concept is actually both well-hidden an…… -
Special characters encountered when using split for segmentation
When split is used: Let's take a look at the usage of split: You can see that the parameter in split is a regular expr…… -
UNDERSTANDING VOLATILE VIA EXAMPLE–reference
We have spent last couple of months stabilizing the . During this we have stumbled into many tricky concurrency issues…… -
Replace int constant with enum
Benefits of enumeration: 1. Type safety 2. Ease of use 3),BLUE(5),BLACK(8),YELLOW(13),GREEN(28 Color(.colorValue= -
Explore Java Lang.ref package — transfer
< H2 id = "major1" > overview Java. Lang.ref is a special package in the Java class library. It provides referen……