Java
-
A civilian application performance optimization Checklist (complete) — turn
Original address: http://calvin1978.blogcn.com/articles/checklist.html 1. General principles Some correct but slightly…… -
In depth understanding of Java G1 garbage collector — to
Original address: http://blog.jobbole.com/109170/?utm_source=hao.jobbole.com&utm_medium=relatedArticle This paper …… -
In depth analysis of the system architecture and mapping principle of ibatis framework — reprint
http://www.ibm.com/developerworks/cn/java/j-lo-ibatis-principle/ Ibatis maps Java objects into SQL statements through …… -
Eclispe uses external Tomcat to summarize
1. Configure Tomcat Servers-->new Configure the path of Tomcat 2. Add / remove application Note: when removing an a…… -
Printwriter out of servlet = response Getwriter() uses
All along, I only know that out can input data (HTML, TXT, etc.) to the client browser page. Today, I found that my un…… -
Java multithreaded programming: volatile solution — turn
http://www.infoq.com/cn/articles/java-multi-thread-volatile/ 1. Foreword The volatile keyword may be a keyword that Ja…… -
The gradlew wrapper uses the gradlew Zip file assembly — transfer
Original address: http://www.myexception.cn/mobile/1860089.html The gradlew wrapper uses the gradlew Zip file installa…… -
Dynamics of Java programming, Part 5: dynamic conversion classes — reprint
In part 4, "", you learned how to use the javassist framework to convert the Java class file generated by the compiler…… -
Java gets the real IP address — reprint
= request.getHeader("x-forwarded-for" (ip == || ip.length() == 0 || "unkNown"= request.getHeader("Proxy-Client-I…… -
Transaction strategy: understand transaction traps — forward
Common errors to pay attention to when implementing transactions in the Java platform Transactions are often used in a…… -
Implementation of MMAP in Java — to
Specific reference Filechannel in Java provides map and force methods. Map creates file and memory mappings, -
Java performance optimization reading notes (1)
1. Create objects by clone () All classes in the Java language inherit from Java by default Lang. object, there is a c…… -
What is weakhashmap — turn
Original address: http://laravel.iteye.com/blog/2303244 Where is the Java weakhashmap? Is it really weak? What are the…… -
3 Ways of JDK Source Code Attachment in Eclipse—reference
You wanna look at a JVM class while you are coding and you cannot. Here is the solution. First of all, your related JD…… -
Fastjson reads the JSON configuration file
Fastjson read JSON configuration file: Dependency: import org. apache. commons. io. IoUtils; import org. apache. commo…… -
Another way to play serial number generation
Usually, we like to use time as a kind of serial number when generating serial number, but the length of time serial n…… -
Java file reading and writing — reprint
read file http://www.baeldung.com/java-read-file 1. Overview In this tutorial we’ll explore different ways to read fro…… -
Concurrent programming — Concurrent data structure — reprint
Concurrent programming series articles: initial solution thread pool: detailed explanation thread pool: concurrent dat…… -
Thread cooperation based on Java 2 runtime security model — turn
In versions prior to Java 2, the runtime security model used a very strictly restricted sandbox model( Sand@R_172_241…… -
Top 10 Mistakes Java Developers Make–reference
This list summarizes the top 10 mistakes that Java developers frequently make. #1. Convert Array to ArrayList To conve…… -
Improve I / O performance by extending RandomAccessFile class with buffer — reprint
< H3 id = "n1002e" > main body: At present, the most popular J2SDK version is the 1.3 series. Developers using t…… -
Input system variables and operating parameters in eclipse — turn to
Original address: http://chenzhou123520.iteye.com/blog/1931670 During development, sometimes different system paramete…… -
-
No enclosing instance of type E is accessible Must qualify the allocation with an enclosing
Original text: http://blog.csdn.net/sunny2038/article/details/6926079 Recently, I was looking at Java. When compiling …… -
Serialization and deserialization — to
http://www.infoq.com/cn/articles/serialization-and-deserialization brief introduction The author serves meituan recomm…… -
Java implementation of RSA encryption, decryption and digital signature — to
RSA public key encryption algorithm was proposed by Ron Rivest, ADI Shamir and Leonard Adleman in 1977. At that time, …… -
tomcat:there is no resources that can be added or removed from server
reason: 1. Not a web project Solution: Project -- > Property -- create or modify a project facet 2. Incompatible ve…… -
Analysis of servlet working principle — reprint
Original text: http://www.ibm.com/developerworks/cn/java/j-lo-servlet/index.html?ca=drs - Web technology has become on…… -
Detailed explanation of Java 8 stream API — turn to
Original address: http://blog.csdn.net/chszs/article/details/47038607 1、 Stream API introduction 8 introduces a new s…… -
Deep parsing of Java Memory Model: summary — turn
Original address: http://www.codeceo.com/article/java-memory-7.html Processor memory model Sequential consistent memor…… -
Dynamics of Java Programming Part 1: classes and class loading — reprint
Original address: http://www.ibm.com/developerworks/cn/java/j-dyn0429/ This article is the first in a new series that ……