Java
-
JDBC Transaction Management Example—reference
In this post,we want to talk about JDBC Transactions and how we can manage the operations in a database. The most popu…… -
Notes on Java collection — turn
Original address: http://calvin1978.blogcn.com/articles/collection.html In the shortest possible space, the characteri…… -
Java EE 7 / JAX-RS 2.0: Simple REST API Authentication & Authorization with Custom HTTP Header–reference
REST has made a lot of conveniences when it comes to implementing web services with the already available HTTP protoco…… -
Node RSA encryption, Java decryption and debugging
The encryption and decryption with node RSA JS is normal, and the encryption and decryption with Java rsautils tool cl…… -
Java files run under windows without JDK installed.
1. Firstly, the project should be GUI, using swing or AWT. 2. Use eclipse to package jar files. Right click the projec…… -
Jar package dependency query
When you encounter jar package conflicts in the project, you need to understand the dependency of jars before excludin…… -
Anti if: the missing patterns — turn
@H_ 3010 @ original address: http://code.joejag.com/2016/anti-if-the-missing-patterns.html But then it gets you thinki…… -
Java theory and practice: blocking memory leaks with weak references — reprint
To make objects that are no longer used by the garbage collection (GC) collector, the logical life cycle of the object…… -
JSTL core tag usage
There are 13 Tags in JSTL core tag library, which are functionally divided into 4 categories: 1. Expression control la…… -
Deep parsing of Java Memory Model: basic part — conversion
Original address: http://www.codeceo.com/article/java-memory-1.html Classification of concurrent programming models In…… -
Visual swing interface editing — reprint
Original address: http://279234058.iteye.com/blog/2200122 Today, I found a WindowBuilder plug-in with powerful functio…… -
How Do Annotations Work in Java?– turn
Original address: https://dzone.com/articles/how-annotations-work-java Annotations have been a very important part of …… -
Executing System commands in Java—ref
One of the nice features of Java language is that it provides you the opportunity to execute native system commands an…… -
How to ignore escape characters in strings in Java — reprint
Original address: http://my.oschina.net/u/1010578/blog/366252 cause In the past few days, I need to debug the rest int…… -
Java theory and practice: Thread pools and work queues–reference
Why thread pools? Many server applications,such as Web servers,database servers,file servers,or mail servers,are orie…… -
Simple beauty jodd HTTP — a basket of applications
Jodd HTTP is a miniature and simple HTTP client, but it is simple and convenient. Using it, you can easily send reques…… -
Servlet implementation of HTTP communication foundation
1. The client sends an HTTP message HTTP protocol is based on TCP / UDP protocol and encapsulates the details of socke…… -
Java theory and practice: correct use of volatile variables — conversion
Original address: http://www.ibm.com/developerworks/cn/java/j-jtp06197.html -
Initialization exception in Maven compilation: COM / sun / tools / javac / code / typetags
Formula jdk11 used Lombok style 1.16 four Error reason: version mismatch Upgrade Lombok to 1.18 four Problem solving -
JDK dynamic agent realizes simple AOP — conversion
JDK dynamic proxy is an important feature of java reflection. In some way, it provides dynamic characteristics for Jav…… -
Java decompress multi directory zip files (solve the problem of Chinese garbled code) — reprint
Original address: http://zhangyongbo.iteye.com/blog/1749439 The method of specifying directory re is as follows: -
Java NiO — source code analysis of selector mechanism — conversion
I haven't understood how pipe wakes up the selector, so I went to see the source code of JDK (openjdk download), and s…… -
Simple beauty jodd HTTP — in-depth understanding of the source code HTTP protocol
Jodd is an open source Java tool set, which contains some practical tool classes and small frameworks. Simple but powe…… -
Understanding extension class loading — Official
http://docs.spring.io/spring-amqp/docs/1.3.6.RELEASE/reference/html/sample-apps.html#d4e1285 http://docs.spring.io/spr…… -
Java permissions and security policy — official document
3 Permissions and Security Policy 3.1 The Permission Classes The permission classes represent access to system resourc…… -
JAAS LOGIN IN WEBLOGIC SERVER–reference
The Java Authentication and Authorization Service (JAAS) is a standard extension to the security in the J2SE Developme…… -
Design and implementation of cache — reprint
This article is compiled from the following two Blogs: http://my.oschina.net/ScottYang/blog/298727http://my.oschina.ne…… -
Handling of inconsistent compiled code when eclipse uses Tomcat for deployment
Operation steps: 1. Add and remove items first 2. Clean clears the directory of the project in Tomcat 3. project-->…… -
Event based NiO multithreaded server — reprint
JDK1. NiO of 4 effectively solves the problem of thread overhead existing in the original streaming io. The main purpo…… -
Glossary of Terms in the JavaTM platform –reference
http://docs.oracle.com/javase/tutorial/information/glossary.html field :A data member of a class. Unless specified oth…… -
Jackson ignores unnecessary fields when deserializing
Sometimes, if a field is added to the database table, but the returned JSON string contains a field we do not need, an…… -
Java annotations: explored & explained — reprinted
Original address: http://www.javacodegeeks.com/2012/08/java-annotations-explored-explained.html One of the many wonder……