Java
-
Five ways to maximize Java NIO and NIO. 2 — turn
Original address: http://www.javaworld.com/article/2078654/java-se/java-se-five-ways-to-maximize-java-nio-and-nio-2.ht…… -
Dynamics of Java programming, Part 3: application reflection — reprint
In, I introduced the java reflection API and briefly described some of its basic functions. I also carefully studied t…… -
Java exception handling best practices — reprint
Original address: http://howtodoinjava.com/2013/04/04/java-exception-handling-best-practices/ This post is another add…… -
Jar package dependency query
When you encounter jar package conflicts in the project, you need to understand the dependency of jars before excludin…… -
Anti if: the missing patterns — turn
@H_ 3010 @ original address: http://code.joejag.com/2016/anti-if-the-missing-patterns.html But then it gets you thinki…… -
Java theory and practice: blocking memory leaks with weak references — reprint
To make objects that are no longer used by the garbage collection (GC) collector, the logical life cycle of the object…… -
Dynamics of Java programming, Part 8: replacing reflection with code generation — reprint
Now that you have seen how to use javassist and BCEL framework for classworking (see), I'll show an actual classworkin…… -
Garbage collection optimization for high throughput and low latency Java applications — reprint
Original address: https://engineering.linkedin.com/garbage-collection/garbage-collection-optimization-high-throughput-…… -
Top 10 Questions about Java Exceptions–reference
reference from: http://www.programcreek.com/2013/10/top-10-questions-about-java-exceptions/ This article summarizes t…… -
java code to byte code–partone–reference
Understanding how Java code is compiled into byte code and executed on a Java Virtual Machine (JVM) is critical beca…… -
Deep parsing of Java Memory Model: final — to
Original address: http://www.codeceo.com/article/java-memory-6.html Compared with the locks and described earlier, rea…… -
< > Chapter 7: cancellation and closure
Java does not provide any mechanism to safely terminate threads, although thread Methods such as stop and suspend prov…… -
JDBC Transaction Management Example—reference
In this post,we want to talk about JDBC Transactions and how we can manage the operations in a database. The most popu…… -
Notes on Java collection — turn
Original address: http://calvin1978.blogcn.com/articles/collection.html In the shortest possible space, the characteri…… -
Java EE 7 / JAX-RS 2.0: Simple REST API Authentication & Authorization with Custom HTTP Header–reference
REST has made a lot of conveniences when it comes to implementing web services with the already available HTTP protoco…… -
Node RSA encryption, Java decryption and debugging
The encryption and decryption with node RSA JS is normal, and the encryption and decryption with Java rsautils tool cl…… -
Java files run under windows without JDK installed.
1. Firstly, the project should be GUI, using swing or AWT. 2. Use eclipse to package jar files. Right click the projec…… -
JDK dynamic agent realizes simple AOP — conversion
JDK dynamic proxy is an important feature of java reflection. In some way, it provides dynamic characteristics for Jav…… -
Java decompress multi directory zip files (solve the problem of Chinese garbled code) — reprint
Original address: http://zhangyongbo.iteye.com/blog/1749439 The method of specifying directory re is as follows: -
Java NiO — source code analysis of selector mechanism — conversion
I haven't understood how pipe wakes up the selector, so I went to see the source code of JDK (openjdk download), and s…… -
JSTL core tag usage
There are 13 Tags in JSTL core tag library, which are functionally divided into 4 categories: 1. Expression control la…… -
Deep parsing of Java Memory Model: basic part — conversion
Original address: http://www.codeceo.com/article/java-memory-1.html Classification of concurrent programming models In…… -
Visual swing interface editing — reprint
Original address: http://279234058.iteye.com/blog/2200122 Today, I found a WindowBuilder plug-in with powerful functio…… -
How Do Annotations Work in Java?– turn
Original address: https://dzone.com/articles/how-annotations-work-java Annotations have been a very important part of …… -
Executing System commands in Java—ref
One of the nice features of Java language is that it provides you the opportunity to execute native system commands an…… -
How to ignore escape characters in strings in Java — reprint
Original address: http://my.oschina.net/u/1010578/blog/366252 cause In the past few days, I need to debug the rest int…… -
Java theory and practice: Thread pools and work queues–reference
Why thread pools? Many server applications,such as Web servers,database servers,file servers,or mail servers,are orie…… -
Simple beauty jodd HTTP — a basket of applications
Jodd HTTP is a miniature and simple HTTP client, but it is simple and convenient. Using it, you can easily send reques…… -
Servlet implementation of HTTP communication foundation
1. The client sends an HTTP message HTTP protocol is based on TCP / UDP protocol and encapsulates the details of socke…… -
Java theory and practice: correct use of volatile variables — conversion
Original address: http://www.ibm.com/developerworks/cn/java/j-jtp06197.html -
Initialization exception in Maven compilation: COM / sun / tools / javac / code / typetags
Formula jdk11 used Lombok style 1.16 four Error reason: version mismatch Upgrade Lombok to 1.18 four Problem solving -
Session
Session 1. Represents a session between the client and the server; 2. The middle end session of the web refers to the ……