包含标签:Java 的文章
-
Using scheduled tasks in spring projects
When we want to execute some business methods at a certain point in time, we use timed tasks. It is very simple to use…… -
BF algorithm
BF algorithm, short for brute force algorithm. Used to detect whether a string is a substring of another string. Conce…… -
Spring source code analysis – 1 – start
Spring source code analysis - 1 - start @ h_ 403_ 1 @ when using spring in web projects, we will Add the following con…… -
Dependency, association, aggregation, combination
Excerpt from: http://www.iteye.com/topic/632059 rely on It can be simply understood that one class a uses another clas…… -
Java mail
We have used many emails, QQ, 163, Netease, etc. 1、 SMTP protocol should be followed when sending e-mail, and POP3 pr…… -
As you know, Java singleton mode is not singleton mode
When we search the singleton mode, we can see many examples, such as lazy and hungry, as follows: When we write a main…… -
java. lang.NoSuchMethodError: javax. servlet. ServletContext. getContextPath()Ljava/lang/String;
Problem Description: in eclipse 3 This error always occurs when starting Tomcat6 in 7, java. lang.NoSuchMeth…… -
18 ID number verification methods for China’s residents, Java algorithm implementation
public static boolean validate18Idcard(String idcard){ if(idcard == null ) { return false; …… -
Problems caused by cookies containing Chinese
On Friday, after the project test was completed and there was no problem, it went online. After going online, it was f…… -
-
HTTP 403, Tomcat configures HTTPS, unable to access, return status code HTTP 403
In order to access the application started by the local machine (Windows system) in the form of HTTPS, after generatin…… -
Loading of Java classes
Keyworked Java class loading, class loading mechanism, classloader, parent delegation model, parent delegation model W…… -
Java uses zxing to generate QR code bar code
1、 Add the Maven dependency of zxing, or download the zxing jar package This example uses zxing3 Version 2.0 Maven de…… -
Three implementations of Java proxy
The Java proxy mode can be implemented in the following ways: 1. Static proxy. 2. JDK dynamic agent. 3. C…… -
Mybatis source code Learning Series
preface A long time ago, we learned Java from a console of Hello world At the beginning, we entered the object-oriente…… -
The Linux system reports an error when the virtual machine starts. This host supports Intel VT-x, but Intel VT-x is disabled
An error is reported when using the virtual machine to start Linux, as follows: The virtual machine is configured to u…… -
Java program questions
Excerpt from: http://www.cnblogs.com/forlina/archive/2011/08/03/2126292.html 1. Complete quick sorting and bubble …… -
13000 word HashMap interview must ask for detailed explanation of knowledge points
an introduction to Inheritance of hasmap Principle of HashMap Ways to resolve hash conflicts Open addressing This met…… -
Detailed explanation of hashtable in Java
an introduction to Hashtable is a legacy class. The common functions of many mappings are similar to HashMap. The diff…… -
Java de encryption (AES / CBC) exception on Linux: Java Lang. SecurityException: JCE cannot authenticate the provider BC method
When using MapReduce for data cleaning, you need to decrypt the data. The encryption method is AES / CBC / pkcs7paddin…… -
JavaWeb learning notes (III) JavaScript
1. Introduction to JavaScript 1、 What is JavaScript 2、 JavaScript features 3、 The difference between Java and JavaS…… -
Front end Foundation (1), HTML
1. Foreword 1.1 software architecture 1.2 the page consists of three parts 2. Introduction to HTML 3. Create HTML file…… -
Java web learning notes (6) JSP
Chapter 6. JSP 1. What is JSP 2. JSP essence 1. JSP is essentially a servlet program 3. Three syntax of JSP 3.1. Page …… -
JavaWeb learning notes (IV) jquery
1、 Introduction to jquery 2、 Preparations before using jquery 3、 Core function $() 4、 Differences between jQuery o…… -
Mac OS fast switching JDK version
Recommended management method: be careful! You can view the current version through Java - version on the command line…… -
It turns out that hot loading is so simple. Write a Java hot loading manually
1. What is hot loading Hot loading means that the changed code can take effect without restarting the service. Hot loa…… -
[source code analysis] how are ArrayList and LinkedList implemented? I think you still have a chance!
preface Seriously, among the collection classes most used in Java, list definitely occupies a place. Like map, it is a…… -
Do you understand distributed transactions? What is your data consistency solution across multiple services?
preface Look at the title. This is another question asked in the interview. In fact, this question was asked several t…… -
[JDK1.8] Java Xiaobai’s source code Learning Series: HashMap
Java Xiaobai's source code Learning Series: HashMap The Spring Festival was cancelled. I spent many days at home gnawi…… -
Encapsulation and access control of Java (1)
Encapsulation and access control of Java (1) I always think I understand the concept of encapsulation, but I really ca…… -
Super keyword of Java
Super keyword of Java Don't say much, just go to the code: Super is used to restrict the object to call instance varia…… -
[Java Concurrent Programming] ThreadLocal, which is often tested in the interview, learning the super detailed source code
What is ThreadLocal? For what? public class Thread implements Runnable { //线程内部局部变量 ThreadLocal.ThreadLoc……