包含标签:Java 的文章
-
JAVA memory analysis 1 – starting with two programs
This time, let's look at some content about JVM memory analysis. Two procedures Procedure I First, let's look at two p…… -
Loading, connecting and initializing Java classes
JVM and classes When calling a Java command to run a java program, the command will start a Java virtual machine proce…… -
About redis
Introduction to redis Redis is an open source in memory data structure storage system, which can be used as database, …… -
Java uses reflection
There are two types of objects in Java programs at run time: compile time type and run time type. For example, list = …… -
Session storage
Sessions are actually divided into server-side sessions and client-side sessions. When the user establishes a connecti…… -
Bias lock
In order to reduce the resource overhead of lock competition in the case of no lock competition, biased lock is introd…… -
Queues available to the java thread pool
Constructor of java thread pool ThreadPoolExecutor: You can see that the queue used by the thread pool is the blocking…… -
Computer networks – IP and ports
Hierarchical model of computer network OSI layered model: physical layer, data link layer, network layer, transport la…… -
HashMap put method
The implementation process of the put method of HashMap can be understood through the following figure. If you are int…… -
Java multithreading – thread synchronization
When multiple threads operate on the same object, it is easy to cause thread safety problems. In order to solve the pr…… -
Redis high availability – Master & slave
Master & slave is what we call master-slave replication, that is, after the host data is updated, it is automatica…… -
Java multithreading – callable and future
Known methods for creating multithreading include inheriting the tree class and implementing the runnable method. In a…… -
Why is I + + thread unsafe
Mainly because I + + is not atomic, it will be compiled into I = I + 1; In fact, there are three steps. One is read, m…… -
Java socket – half closed
Typically, the output stream is closed to indicate that the output has ended. However, this cannot be done during netw…… -
How to avoid duplicate form submission
Client scheme Disable the submit button. After the form is submitted, use JavaScript to disable the submit button. Thi…… -
Java implementation of simple web page capture
Requirement Description: use java to grab web page information and return it in the form of string. Implemented using …… -
AQS
AQS, the queue synchronizer abstractqueuedsynchronizer (hereinafter referred to as synchronizer), is the basic framewo…… -
The difference between get and post
The difference between get and post can be seen from three levels: Browser / server level, HTTP protocol level and sem…… -
Clone of Java objects
In the Java language, data types are divided into value types (basic data types) and reference types. Value types incl…… -
Thread pool provided by Java by default
Java thread pools are built through ThreadPoolExecutor. In the executors factory class, Java provides four types of th…… -
Java new IO
Traditional IO Stream oriented input / output systems such as InputStream, OutputStream, reader and writer in Java are…… -
Spring IOC principle
Container initialization The initialization of the container is first performed in the corresponding constructor. In t…… -
Access rights in Java
There are four access permissions in Java, from large to small: public – > protected – > Default (friendly) – &g…… -
Java multithreading – thread pool
The cost of starting a new thread is relatively high. When a large number of threads with short lifetime need to be cr…… -
Lock expansion
If a series of continuous operations repeatedly lock and unlock the same object, or even the lock operation occurs in …… -
Get the file character set with jchardet
Some time ago, when learning Lucene, I encountered the problem of reading TXT documents and encountering coding errors…… -
Java multithreading – the life cycle of threads
The life cycle of a thread is divided into five stages: new, runnable, running, blocked and dead. After the thread is …… -
Java: the optimization process of exporting large quantities of Excel data
background At present, the team is working on a user data Kanban (hereinafter referred to as Kanban), which basically …… -
Pit father’s maven
Maven has not been used before. Recently, when studying cursor, I imported other people's projects, but there is no co…… -
How to reference a third-party jar package when making a jar package
I use eclipse packaging, but when the CMD window is executed, an error "there is no main manifest attribute in activem…… -
(transfer) 13 core technologies of J2EE
1、 JDBC (Java database connectivity) JDBC API provides a unified way to access different databases. Like ODBC, JDBC s…… -
String what is the maximum length of a string?
In the process of learning and development, we often discuss the value range of basic data types such as short, int an……