包含标签:Java 的文章
-
Tomcat startup project reports an error Java lang.OutOfMemoryError: Java heap space
Recently, when deploying a web project using MyEclipse and starting tomcat, an error is reported: Solution: add config…… -
Integration of Tomcat and Apache server under Windows system
Note: This article is a successful real experiment in reading. The book mentioned the incompatibility of different ver…… -
How to find the implementation class of the mybatis mapper interface – source code analysis
Keywords: mybatis principle, source code, mybatis mapper interface implementation class, proxy mode, dynamic proxy, Ja…… -
How to find your favorite girlfriend with java8 stream API
The traditional Java collection operation is a little verbose. When we need to filter and sort the combined elements, …… -
Java generics, understanding these is enough.
Contents of this document: 1、 What are Java generics? 2、 Common generic writing examples Generic class definition: D…… -
Use and comparison of countdownlatch and cyclicbarrier in Java
Countdownlatch and cyclicbarrier are both Java 1 5 began to introduce a tool used in multithreaded programming. They h…… -
Cookie instance, understanding cookies
1、 Understand what cookies are in one sentence Cookies are small documents sent by the server to the client to record…… -
ThreadLocal detailed explanation, ThreadLocal source code analysis, ThreadLocal diagram
This article is about: Concept explanation ----- principle illustration ----- source code analysis ----- thought arran…… -
Java generates compressed packages, and zipoutputstream is used
Case: obtain network resources a, B and C according to the URL, and put resources a and C together to generate a XXX z…… -
Introduction principle and practice of spring security
In web application development, security is undoubtedly very important. Choosing spring security to protect web applic…… -
Factorization using tail recursion
Usually, when calculating the factorial of a number, we will use the recursive algorithm. The recursive book program c…… -
Using scheduled tasks in spring projects
When we want to execute some business methods at a certain point in time, we use timed tasks. It is very simple to use…… -
BF algorithm
BF algorithm, short for brute force algorithm. Used to detect whether a string is a substring of another string. Conce…… -
Spring source code analysis – 1 – start
Spring source code analysis - 1 - start @ h_ 403_ 1 @ when using spring in web projects, we will Add the following con…… -
Dependency, association, aggregation, combination
Excerpt from: http://www.iteye.com/topic/632059 rely on It can be simply understood that one class a uses another clas…… -
Java mail
We have used many emails, QQ, 163, Netease, etc. 1、 SMTP protocol should be followed when sending e-mail, and POP3 pr…… -
As you know, Java singleton mode is not singleton mode
When we search the singleton mode, we can see many examples, such as lazy and hungry, as follows: When we write a main…… -
13000 word HashMap interview must ask for detailed explanation of knowledge points
an introduction to Inheritance of hasmap Principle of HashMap Ways to resolve hash conflicts Open addressing This met…… -
Detailed explanation of hashtable in Java
an introduction to Hashtable is a legacy class. The common functions of many mappings are similar to HashMap. The diff…… -
Java de encryption (AES / CBC) exception on Linux: Java Lang. SecurityException: JCE cannot authenticate the provider BC method
When using MapReduce for data cleaning, you need to decrypt the data. The encryption method is AES / CBC / pkcs7paddin…… -
Java web learning notes (6) JSP
Chapter 6. JSP 1. What is JSP 2. JSP essence 1. JSP is essentially a servlet program 3. Three syntax of JSP 3.1. Page …… -
JavaWeb learning notes (IV) jquery
1、 Introduction to jquery 2、 Preparations before using jquery 3、 Core function $() 4、 Differences between jQuery o…… -
Mac OS fast switching JDK version
Recommended management method: be careful! You can view the current version through Java - version on the command line…… -
JavaWeb learning notes (III) JavaScript
1. Introduction to JavaScript 1、 What is JavaScript 2、 JavaScript features 3、 The difference between Java and JavaS…… -
Front end Foundation (1), HTML
1. Foreword 1.1 software architecture 1.2 the page consists of three parts 2. Introduction to HTML 3. Create HTML file…… -
Do you understand distributed transactions? What is your data consistency solution across multiple services?
preface Look at the title. This is another question asked in the interview. In fact, this question was asked several t…… -
It turns out that hot loading is so simple. Write a Java hot loading manually
1. What is hot loading Hot loading means that the changed code can take effect without restarting the service. Hot loa…… -
[source code analysis] how are ArrayList and LinkedList implemented? I think you still have a chance!
preface Seriously, among the collection classes most used in Java, list definitely occupies a place. Like map, it is a…… -
[Java Concurrent Programming] ABA problem of atomic class atomic and CAS for concurrent operation
Atomic atomic class Atomic class is a class with the characteristics of atomic operation. Atomic classes exist in Java…… -
Java concurrent reading notes: lock and reentrantlock
Lock is located in Java util. concurrent. Under the locks package, there is a thread synchronization mechanism, just l…… -
Redis learning notes [interview questions]
Introduction to redis The redis database is different from the traditional database. The data of redis is stored in me…… -
Method rewriting of Java inheritance
In Java inheritance, a subclass can obtain all the structures of the parent class, and can also add properties and met……