包含标签:Java 的文章
-
Problems encountered in deploying the project to Linux
1. Local Navicat for MySQL cannot connect to the server (CentOS 7 x86_64 BBR) 1045 error: Solution steps: 1. Check whe…… -
Developer scheduling software
Developer scheduling software After I finished setting up in school these days, I found a simple array l class project…… -
Springboot “hot” deployment solution
There are two ways of spring boot hot deployment 1. Springloader plug-in Disadvantages: Java code does deployment proc…… -
Air quality management system + SSM (Spring + spring MVC + mybatis) + summary of front and rear end separation
1. Directory structure: 2. Points needing attention 2.1 create a new one under web-info 2.1. 1 springMVC-servlet. xml …… -
IO related demo
I reviewed IO related knowledge these days Just for record, a good memory is better than a bad pen Please correct any …… -
Java implementation of Huffman tree
O(∩_∩)O~~ summary I think everyone who has studied data structure must know Huffman. The great God invented the famous…… -
Java implementation of Huffman tree
O(∩_∩)O~~ summary I think everyone who has studied data structure must know Huffman. The great God invented the famous…… -
Elimination of big data by bit mapping
The problem is: m (such as 1 billion) int integers, only n of which have been repeated, read them into memory and dele…… -
A simple small bookkeeping program (Java)
I feel that I have learned a lot of basic knowledge, but I haven't been able to figure out the actual development proc…… -
Storage of variables in Java notes
1. Java variable storage domain The storage areas of Java variables are mainly placed in the following places: (1) Reg…… -
File replication of IO stream in Java
O (∩ ∩) O ha ha~ 1. Overview A mature language must have several modules: IO, communication, thread, UI As a mature pr…… -
Java parsing XML file encounters special symbols & Solutions for exceptions
Wen / Zhu Jiqian During the development of Java parsing XML files, when Sax parsing is used, such an exception message…… -
Soul torture: do you really understand the system out. Does println () work?
Original / Zhu Jiqian Soul torture, this Duxiu classmate, can you solve this problem? Please talk about the principle …… -
Strategy enumeration: eliminate the elegant gesture of mass use of if else in the project
Wen / Zhu Jiqian When I first came into contact with java object-oriented programming, if I encountered a large number…… -
Summary of java reflection mechanism development experience
I often use the reflection mechanism in practical projects, so I will take some summary notes on the learned reflectio…… -
Java programming skills: summary of if else Optimization Practice
Wen / Zhu Jiqian To tell you the truth, I hate to use if else in my code. Firstly, the execution method of this kind o…… -
Java source code analysis: source code analysis of guava’s immutable set immutable map
1、 Case scenario I have encountered such a scenario. When defining a static modified map, a large number of put () me…… -
Simple thoughts on the implementation of wechat code scanning login Technology
Wechat code scanning login is a common operation. However, many people may not have thought about the idea of its impl…… -
Java multithreading – thread synchronization
When multiple threads operate on the same object, it is easy to cause thread safety problems. In order to solve the pr…… -
Redis high availability – Master & slave
Master & slave is what we call master-slave replication, that is, after the host data is updated, it is automatica…… -
Java multithreading – callable and future
Known methods for creating multithreading include inheriting the tree class and implementing the runnable method. In a…… -
Why is I + + thread unsafe
Mainly because I + + is not atomic, it will be compiled into I = I + 1; In fact, there are three steps. One is read, m…… -
Java socket – half closed
Typically, the output stream is closed to indicate that the output has ended. However, this cannot be done during netw…… -
How to avoid duplicate form submission
Client scheme Disable the submit button. After the form is submitted, use JavaScript to disable the submit button. Thi…… -
Java implementation of simple web page capture
Requirement Description: use java to grab web page information and return it in the form of string. Implemented using …… -
AQS
AQS, the queue synchronizer abstractqueuedsynchronizer (hereinafter referred to as synchronizer), is the basic framewo…… -
The difference between get and post
The difference between get and post can be seen from three levels: Browser / server level, HTTP protocol level and sem…… -
Clone of Java objects
In the Java language, data types are divided into value types (basic data types) and reference types. Value types incl…… -
Thread pool provided by Java by default
Java thread pools are built through ThreadPoolExecutor. In the executors factory class, Java provides four types of th…… -
Java new IO
Traditional IO Stream oriented input / output systems such as InputStream, OutputStream, reader and writer in Java are…… -
Spring IOC principle
Container initialization The initialization of the container is first performed in the corresponding constructor. In t…… -
Access rights in Java
There are four access permissions in Java, from large to small: public – > protected – > Default (friendly) – &g……