包含标签:Java 的文章
-
Detailed examples of composite mechanism in Java
Detailed examples of composite mechanism in Java Inherited defects The defect of inheritance is caused by its too powe…… -
An example of using socket to realize chat room function in Java
Recently, I studied the basis of java socket communication, and realized a simple multiplayer chat room function with …… -
Several implementation methods of random number in Java
As we all know, random number is one of the most basic features of any programming language. The basic way to generate…… -
Implementation of wechat java development wechat active push message
1. Pull access_ token 2. Pull user information 3 Active push message 4 The interface seems to apply for permission 5 R…… -
Spring3. 1.1+MyBatis3. 1.1 addition, deletion, query, modification, paging and transaction management of
1. [Code] mybatis global configuration file 2. [file] paginationinterceptor java 3. [file] dialog java 4. [file] mysql…… -
Explain the performance difference between string and StringBuilder in Java in terms of memory
In the past, I often saw discussions on Java string splicing on the Internet. I see that some Java developers write in…… -
Explain the storage mechanism of Java heap memory and stack memory in detail
Heap and memory optimization today tested the automatic data collation function of a project, collating tens of thousa…… -
Summary of Hibernate one to many association mapping learning
One to many association mapping Mapping principle The mapping principles of one to many association mapping and many t…… -
In depth analysis of java reflection mechanism
Java reflection mechanism is to know all the properties and methods of any class in the running state; For any object,…… -
Three methods of instantiating bean in spring IOC
1. Constructor That is, in the example mentioned in the previous article, call the default parameterless constructor 2…… -
PHP laravel realizes file download function
Last lts of laravel (long term support) the version is laravel 5.1, which was released in June 2015. According to the …… -
Detailed examples of composite mechanism in Java
Detailed examples of composite mechanism in Java Inherited defects The defect of inheritance is caused by its too powe…… -
On some basic concepts of GC garbage collector in Java
1、 Basic recycling algorithm 1. Reference counting is an old recycling algorithm. The principle is that this object h…… -
Java method to get yesterday’s date string
This article describes the method of obtaining yesterday's date string in Java. Share with you for your reference, as …… -
Ios10 push complete analysis and precautions
This article aims to make a complete analysis of IOS push. If you know nothing about push before, you will become a pu…… -
Explain the basic principles of hibernate in Java
Before starting to learn hibernate, it has been said that hibernate is not difficult, but a further encapsulation of J…… -
Introduction to SSH Framework
What is SSH SSH is an integration framework of struts + Spring + hibernate. It is a popular open source framework for …… -
Using java to generate two-dimensional code tool class example code
Introduction to QR code Two dimensional bar code was first invented in Japan, It records data symbol information with …… -
Detailed examples of Java constant pool
Detailed examples of Java constant pool The constant pool of java contains a series of constant values such as classes…… -
Learning the basics of JSP custom tags
In the actual development, for example, in order to simplify a large number of JSP scripts in JSP, we need to use stan…… -
Bridge mode in Java — an example of object structured mode
Bridge mode in Java -- an example of object structured mode 1、 Intention Separate the abstract part from its implemen…… -
Java to obtain the signature summary of APK installed on the mobile phone
When publishing APK to the app store or accessing the SDK of a third party, you sometimes need to provide APK signatur…… -
Problems in upgrading xcode8 compatible with IOS 10 and solutions to some adaptation problems
1 push After Xcode is upgraded to 8, many people can't receive push I couldn't get the token. My friend didn't find th…… -
Analysis of checked and non checked exceptions in Java programming
For exceptions caused by programming errors, or exceptions that cannot be expected to be caught by the program (derefe…… -
Explain the array and string related knowledge in Java
Definition and use of Java array if you want to save a group of data with the same type, you can use array. Array defi…… -
Solution to the problem that ftpclient uploads Chinese directory and Chinese file name in Java
Problem Description: Use org apache. commons. net. ftp. When ftpclient creates a Chinese directory and uploads a Chine…… -
Hibernate add, delete, modify and query operation code
Hibernate deletes data To delete a piece of data in the user table, you need to have the primary key ID value of the u…… -
Java socket programming example (I) – basic use of TCP
I Server code: II Client code: The TCP server of the above code is a single thread and can only serve one client at a …… -
Introduction of several properties based on springioc bean
1.lazy-init="false" The default value is false, which means that these classes will be loaded as soon as the spring co…… -
Summary of ios10 adaptation problems
Say in front GM versions of ios10 and xcode8 have been released and downloaded, I updated it with an uneasy heart (I'm…… -
Java clip pictures and save examples to share
We will learn through the following steps: Input the image, specify the image path to be processed, allow the user to …… -
How spring cloud fixes zuul cross domain configuration exceptions
preface This article mainly introduces how to solve the exceptions in zuul's cross domain configuration, and shares th……