包含标签:Java 的文章
-
Transfer the jar package of springboot to war and put it into Tomcat
1. Modify the POM file and change the packaging form to war war 2. Remove the embedded Tomcat module, but we ne…… -
The simplified construction process of springcloud + Eureka + feign + ribbon includes fuse, gateway and redis cache [2]
Simplified construction process and crud exercise of springcloud + Eureka + feign + ribbon [1] Modification and expans…… -
Getting started with easyexcel
Because Alibaba's easy excel has been used in the project recently, and then go to B After studying at the station, I …… -
Java daily side (Part1: computer network) [19 / 11 / 02]
1.1 difference between RTT and RTO RTT: the time taken from sending a packet to receiving the corresponding ack RTO: r…… -
Getting started with easyexcel
Because Alibaba's easy excel has been used in the project recently, and then go to B After studying at the station, I …… -
File replication of IO stream in Java
O (∩ ∩) O ha ha~ 1. Overview A mature language must have several modules: IO, communication, thread, UI As a mature pr…… -
Java implementation of Huffman tree
O(∩_∩)O~~ summary I think everyone who has studied data structure must know Huffman. The great God invented the famous…… -
Java implementation of Huffman tree
O(∩_∩)O~~ summary I think everyone who has studied data structure must know Huffman. The great God invented the famous…… -
Elimination of big data by bit mapping
The problem is: m (such as 1 billion) int integers, only n of which have been repeated, read them into memory and dele…… -
A simple small bookkeeping program (Java)
I feel that I have learned a lot of basic knowledge, but I haven't been able to figure out the actual development proc…… -
Storage of variables in Java notes
1. Java variable storage domain The storage areas of Java variables are mainly placed in the following places: (1) Reg…… -
Java parsing XML file encounters special symbols & Solutions for exceptions
Wen / Zhu Jiqian During the development of Java parsing XML files, when Sax parsing is used, such an exception message…… -
Soul torture: do you really understand the system out. Does println () work?
Original / Zhu Jiqian Soul torture, this Duxiu classmate, can you solve this problem? Please talk about the principle …… -
Strategy enumeration: eliminate the elegant gesture of mass use of if else in the project
Wen / Zhu Jiqian When I first came into contact with java object-oriented programming, if I encountered a large number…… -
Summary of java reflection mechanism development experience
I often use the reflection mechanism in practical projects, so I will take some summary notes on the learned reflectio…… -
Java programming skills: summary of if else Optimization Practice
Wen / Zhu Jiqian To tell you the truth, I hate to use if else in my code. Firstly, the execution method of this kind o…… -
Java source code analysis: source code analysis of guava’s immutable set immutable map
1、 Case scenario I have encountered such a scenario. When defining a static modified map, a large number of put () me…… -
Simple thoughts on the implementation of wechat code scanning login Technology
Wechat code scanning login is a common operation. However, many people may not have thought about the idea of its impl…… -
A novel collection program implemented in Java
Don't scold me if you are attracted by the title. It's just a simple implementation. I wrote it to download a favorite…… -
I use java to realize flying pigeon Book transmission 2 – realize file transmission
Step 2: realize file transfer. In the previous step, only a string was passed from the server to the client. This time…… -
Java class loader
Class loader description The class loader is responsible for The class file is loaded into memory, and a Java. Java. X…… -
About thread pools
Core parameters of thread pool The process of adding threads to the thread pool By default, a thread is created for ea…… -
Java socket – use proxy server
There's no need to say more about why you use a proxy server. Using proxy Java provides a proxy class implementation t…… -
Java Memory Model
The Java Memory Model stipulates that all variables are stored in the main memory; the working memory of a thread stor…… -
Can the key and value of map be null
Can the key and value of map be null? Write the program directly to verify: Execution results: The conclusions are as …… -
Lightweight Locking
The scenario for lightweight locks is that threads execute synchronization blocks alternately. -
JAVA memory analysis 1 – starting with two programs
This time, let's look at some content about JVM memory analysis. Two procedures Procedure I First, let's look at two p…… -
Loading, connecting and initializing Java classes
JVM and classes When calling a Java command to run a java program, the command will start a Java virtual machine proce…… -
About redis
Introduction to redis Redis is an open source in memory data structure storage system, which can be used as database, …… -
Java uses reflection
There are two types of objects in Java programs at run time: compile time type and run time type. For example, list = …… -
Session storage
Sessions are actually divided into server-side sessions and client-side sessions. When the user establishes a connecti…… -
Bias lock
In order to reduce the resource overhead of lock competition in the case of no lock competition, biased lock is introd……