包含标签:Java 的文章
-
Getting started with easyexcel
Because Alibaba's easy excel has been used in the project recently, and then go to B After studying at the station, I …… -
Java daily side (Part1: computer network) [19 / 11 / 02]
1.1 difference between RTT and RTO RTT: the time taken from sending a packet to receiving the corresponding ack RTO: r…… -
Getting started with easyexcel
Because Alibaba's easy excel has been used in the project recently, and then go to B After studying at the station, I …… -
A pattern triggered by a duck — strategy pattern
Pre knowledge: You need to understand the of Java: 1. Packaging 2. Succession 3. Polymorphism 4. Abstraction The first…… -
Spring boot is packaged into docker (idea + traditional method)
1. Mode 1 Remote publishing via idea 1.1 modify docker Service file vim /usr/lib/systemd/system/docker.service 2. Mod…… -
File replication of IO stream in Java
O (∩ ∩) O ha ha~ 1. Overview A mature language must have several modules: IO, communication, thread, UI As a mature pr…… -
Java implementation of Huffman tree
O(∩_∩)O~~ summary I think everyone who has studied data structure must know Huffman. The great God invented the famous…… -
Java implementation of Huffman tree
O(∩_∩)O~~ summary I think everyone who has studied data structure must know Huffman. The great God invented the famous…… -
Elimination of big data by bit mapping
The problem is: m (such as 1 billion) int integers, only n of which have been repeated, read them into memory and dele…… -
A simple small bookkeeping program (Java)
I feel that I have learned a lot of basic knowledge, but I haven't been able to figure out the actual development proc…… -
Storage of variables in Java notes
1. Java variable storage domain The storage areas of Java variables are mainly placed in the following places: (1) Reg…… -
Strategy enumeration: eliminate the elegant gesture of mass use of if else in the project
Wen / Zhu Jiqian When I first came into contact with java object-oriented programming, if I encountered a large number…… -
Summary of java reflection mechanism development experience
I often use the reflection mechanism in practical projects, so I will take some summary notes on the learned reflectio…… -
Java programming skills: summary of if else Optimization Practice
Wen / Zhu Jiqian To tell you the truth, I hate to use if else in my code. Firstly, the execution method of this kind o…… -
Java source code analysis: source code analysis of guava’s immutable set immutable map
1、 Case scenario I have encountered such a scenario. When defining a static modified map, a large number of put () me…… -
Simple thoughts on the implementation of wechat code scanning login Technology
Wechat code scanning login is a common operation. However, many people may not have thought about the idea of its impl…… -
Java parsing XML file encounters special symbols & Solutions for exceptions
Wen / Zhu Jiqian During the development of Java parsing XML files, when Sax parsing is used, such an exception message…… -
Soul torture: do you really understand the system out. Does println () work?
Original / Zhu Jiqian Soul torture, this Duxiu classmate, can you solve this problem? Please talk about the principle …… -
Java socket – use proxy server
There's no need to say more about why you use a proxy server. Using proxy Java provides a proxy class implementation t…… -
Java Memory Model
The Java Memory Model stipulates that all variables are stored in the main memory; the working memory of a thread stor…… -
Can the key and value of map be null
Can the key and value of map be null? Write the program directly to verify: Execution results: The conclusions are as …… -
Lightweight Locking
The scenario for lightweight locks is that threads execute synchronization blocks alternately. -
JAVA memory analysis 1 – starting with two programs
This time, let's look at some content about JVM memory analysis. Two procedures Procedure I First, let's look at two p…… -
Loading, connecting and initializing Java classes
JVM and classes When calling a Java command to run a java program, the command will start a Java virtual machine proce…… -
About redis
Introduction to redis Redis is an open source in memory data structure storage system, which can be used as database, …… -
Java uses reflection
There are two types of objects in Java programs at run time: compile time type and run time type. For example, list = …… -
Session storage
Sessions are actually divided into server-side sessions and client-side sessions. When the user establishes a connecti…… -
Bias lock
In order to reduce the resource overhead of lock competition in the case of no lock competition, biased lock is introd…… -
Queues available to the java thread pool
Constructor of java thread pool ThreadPoolExecutor: You can see that the queue used by the thread pool is the blocking…… -
Computer networks – IP and ports
Hierarchical model of computer network OSI layered model: physical layer, data link layer, network layer, transport la…… -
HashMap put method
The implementation process of the put method of HashMap can be understood through the following figure. If you are int…… -
Java multithreading – thread synchronization
When multiple threads operate on the same object, it is easy to cause thread safety problems. In order to solve the pr……