包含标签:Java 的文章
-
Reread the differences between public, protected, private and permission without modifier in the series of Java programming ideas
preface I believe you use more modification permissions for public and private in your daily work. Less is used for pr…… -
Factory pattern of Java design pattern
Factory mode (factory pattern) is one of the most commonly used design patterns in Java. This type of design pattern b…… -
Special symbol of split in Java
The problem with points is to use string split("[.]") solve. On the question of vertical lines, use string Split ("\ \…… -
How httpclient sets timeout
Today, I share a huge pit, httpclient. How deep is this thing? Every version changes. Recently, the author has suffere…… -
What is the difference between using synchronized to decorate static methods and non static methods
preface Recently, I was asked this question, and the first answer was also very bad. Here, I refer to the online answe…… -
Java error: Java math. BigDecimal cannot be cast to java. lang.String
Take a number from the database and turn it into a string. An error is reported: Java math. BigDecimal cannot be cast …… -
Summary of shallow copy and deep copy of Java
Object copy in Java refers to copying all attributes (member variables) of an object to another object with the same c…… -
Maven project tip: the source value of 1.5 is outdated and will be deleted in future releases
This is because the Maven project compiles using jdk1.0 by default 5。 We can make the following configuration in the …… -
False wakeup of wait and notify in Java
preface This blog is from https://www.cnblogs.com/clover-forever/p/12616869.html Write it down here for future review.…… -
Detailed explanation of Java generics
1. General Generics play an important role in Java and are widely used in object-oriented programming and various desi…… -
Implementation of spring boot sending mail function
background A little friend asked me how you used to do the email function. Then I found a demo for him. I happened to …… -
Implementation of verification code verification in Java Web
Background verification code generation tool and method /* * 设置图片的背景色 */ public static void …… -
Java common date operations
Sort out the date operations commonly used in Java. 1. Date formatting /** date formatting class (must master) * API: …… -
Why is there only value passing in Java?
For beginners, it is difficult to answer this question correctly. When sorting out the answers the next day, I found t…… -
JDK default garbage collector
jdk1. 7. The default garbage collector is parallel scavenge (new generation) + parallel old (old age). jdk1. 8. The de…… -
Summary of JVM class loading mechanism
The loading mechanism of class is divided into the following three stages: loading, connecting and initialization. The…… -
In depth understanding of idempotency and detailed explanation of idempotency of restful style API
What is idempotency The definition of idempotency in http / 1.1 is that a single and multiple requests for a resource …… -
Singleton pattern of Java design pattern
Singleton mode (singleton pattern) is one of the simplest design patterns in Java. This type of design pattern belongs…… -
Development of log interface based on blocking queue
preface Recently, a log interface has been developed for other systems to call through web service. Considering concur…… -
Serialization and deserialization in Java
1、 Serialization and deserialization concepts Serialization is a process of describing objects in a series of bytes; …… -
Shock! Java date formatting pit!
preface Yyyy and YYYY Sample code @Test public void testWeekBasedYear() { Calendar calendar = Calendar…… -
What you don’t know in singleton mode~~
It can be said that the singleton mode can be written as long as it is a qualified development, but if we want to stud…… -
A blog shows you about locks in Java
preface Recently, in reviewing the lock, I sorted out the locks in Java. This paper introduces various locks, hoping t…… -
This article takes you to learn the Java implementation scheme of domestic encryption algorithm SM4
preface Today, we bring you a Java back-end solution of domestic SM4 encryption and decryption algorithm. The code is …… -
Re read the “Java programming ideas” series and other access rights
In Java, we use access modifiers to determine which classes in the library are available to users. Access modifiers in…… -
Principle of single sign on
1、 Single sign on concept 1. What is single sign on Single sign on, referred to as SSO for short, is one of the popul…… -
Why can wait and notify only be in synchronized?
preface Wait and notify must be in the synchronized block, otherwise the illegalmonitorstateexception will be thrown. …… -
Instantly teach you how to use the retainAll method of list in Java
Introduction to retainAll method When we have two list sets, we can use the retainAll method to find the subsets of th…… -
Eclipse solves the problem that there is a jar package, but it can’t be found
First, right-click to prompt the missing jar package project, or the missing Maven dependent project. Right click and …… -
Difference between filter and interceptor
preface Recently, during the interview, I was asked this question and felt that the answer was not very good. I'll sor…… -
Abstract factory pattern of Java design pattern
Abstract factory pattern (abstract factory pattern) is to create other factories around a super factory. This super fa…… -
The Java implementation uploads files to the specified directory of the specified server
Preface requirements The static files generated by freemaker are uniformly stored on a server. It was originally inten……