包含标签:Java 的文章
-
Brief analysis on the opening and closing of eclipse debug mode
By default, right-click debug in eclipse. When running to the set breakpoint, it will automatically jump to the debug …… -
Introduction to common tool classes under Java language Lang package
No matter where you are developing Java applications, you have to write a lot of tool classes / tool functions. You kn…… -
Java uses future to get multithreading results in time
The future interface is a part of the Java standard API util. In the concurrent package. The future interface is the i…… -
Detailed explanation of Java set class source code analysis
Like list, set inherits from the collection interface. The commonly used implementation classes are HashSet and TreeSe…… -
Java implementation of web page verification code function
This example shares the implementation code of Java Web page verification code for your reference. The specific conten…… -
Example of using JSP in spring boot practice
The front-end and back-end separation architecture has its advantages, but according to the specific situation, it is …… -
Brief introduction to Java singleton mode
1、 Concept Singleton pattern is a common software design pattern. Its core structure contains only a special class ca…… -
On the wonderful use of future in Java multithreading (with source code)
In Java, future is a future object, which stores the processing results of this thread. It is like a delivery voucher.…… -
Decoration pattern of Java design pattern learning
Decoration mode: dynamically add some additional responsibilities to an object. In terms of adding functions, decorati…… -
Strategy model of Java design pattern learning
Policy mode: policy mode is a method to define a series of algorithms. The work completed by the algorithms is the sam…… -
Read the configuration parameter instance in the XML file
paras. XML file SysParam.@ R_ 502_ 1713 @ file use Reference package required The above example of reading configurati…… -
Code example of Java crawling mailbox from the Internet
Web crawler: in fact, it is a program used to obtain data conforming to specified rules on the Internet. summary Jsup …… -
Several ways to implement action in struts 2
Action is used to process user requests, so it is also called business controller. Each action class is a work unit. T…… -
Quickly understand hibernate configuration files and mapping files
Hibernate is a thorough ORM (object relational mapping) open source framework. Let's take a look at the high-level vie…… -
Preventing unlisted users from operating — a simple implementation based on struts 2 interceptor
Generally, our web applications are allowed to operate only after the user logs in, that is, we do not allow non login…… -
Factory method pattern for Java design pattern learning
Factory method: define an interface for creating objects, and let subclasses decide which class to instantiate. Factor…… -
The Jackson entity turns JSON to null or empty and does not participate in serialization (example explanation)
When using Jackson for serialization, we often encounter that the attribute of an entity object in the background is n…… -
Explain in detail how JSTL in Java Web circulates map data in list
Explain in detail how JSTL in Java Web circulates map data in list The first way: 1: Background code (test) 2: Front p…… -
Java implementation of two-dimensional array to JSON method example
This paper describes the method of converting two-dimensional array to JSON in Java. Share with you for your reference…… -
Java implementation of four mixed operation code examples
Using the stack, you can handle the operation priority. Use natural four arithmetic expressions, such as 4 + (3 * (3-1…… -
Java implementation of file encryption and decryption function example
This article describes the encryption and decryption function of Java implementation files for your reference, as foll…… -
Springcloud practical tips: zuul’s path matching
Whether we use the configuration method of traditional routing or service routing, we need to define a matching expres…… -
Fully understand CAS mechanism in Java
preface When I saw the Java lock mechanism, I accidentally saw the word CAS. Then I looked for CAS in Baidu. I read ma…… -
Analysis of common methods of appending content to the end of file in Java
This article describes the common methods of appending content to the end of the file in Java. Share with you for your…… -
Kryo serialization and deserialization usage examples
Kryo is a fast and efficient Java object graphics serialization framework, which is characterized by performance, effi…… -
Kryo framework usage code example
Source of kryo framework has been moved to https://github.com/EsotericSoftware/kryo , enter this page, and then click …… -
Implementation methods of several common comparators in Java
In Java, the sorting of object arrays is often involved, so it involves the comparison between objects. Generally, the…… -
Mybatis L2 cache implementation code
L2 cache needs to be manually configured and enabled, as follows: Set enable L2 cache / mybatis02 / config / mybatis-c…… -
Learning and using servlet listener (3)
This article shares the specific learning contents of servlet listener for your reference. The specific contents are a…… -
Common problems based on Multithreading concurrency (detailed explanation)
I. overview 1.volatile Ensure that once the shared data is modified, it will be synchronized to the shared memory (hea…… -
Implementation code of readwritelock read-write separation of Java multithreading
In multithreaded development, there is often a situation where we want to separate reading and writing. For the read a…… -
Use recursion to delete all child nodes of the tree structure (Java and MySQL Implementation)
1. Business scenario It has the following tree structure: + - 0 + - 1 + - 2 + - 4 + - 5 + - 3 If you delete a parent n……