包含标签:Java 的文章
-
Java exception handling: a layer of insurance for programs
In one's life, one will always encounter some unexpected troubles, which may give us a heavy blow. In order to reduce …… -
The popular cognition of Java collection classes
To be frank, Java provides a complete set of collection classes (also known as container classes) to manage a group of…… -
To learn java programming well, you must pass the four levels: constructor, method overload, this keyword and garbage collection mechanism!
Some people say that you should pay attention to current affairs, finance and economics, and even popular movies and T…… -
On the importance of Java access control
In front of what is the easiest person to lose resistance? Beauty is a. For example, Xi Shi's contribution is to bear …… -
In depth analysis of the working mechanism of Java I / O — reprint
< H2 id = "1. Basic architecture of Java I / O class library | outline" > basic architecture of Java I / O class…… -
Jmap view memory usage and generate heapdump — conversion
PHP? uid=191&do=blog&id=7572"> http://www.webspherechina.net/home/space.PHP?uid=191&do=blog&id=7572…… -
Fork and Join: Java Can Excel at Painless Parallel Programming Too!— turn
Original address: http://www.oracle.com/technetwork/articles/java/fork-join-422606.html Concurrent Programming in Java…… -
Simple session shared encapsulation
objective The session is stored on the cache server (all kinds of cache servers can be used. This article takes memcac…… -
Curl request simulates post sending JSON
Example: curl - x post -- header "content type: application / JSON" -- data '{"name": "SSS", "IDnumber": "1111", "appk…… -
Change value of string array at debug eclipse
Question: I have an application,but to test something,I need to change value of a String[]. But when I do it using ch…… -
5 Ways to Use Log Data to Analyze System Performance–reference
Recently we looked across some of the most common behaviors that our community of 25,000 users looked for in their l…… -
Beauty of simplicity jodd — props attribute usage
Prop is a super property; It contains many things missing from JDK: UTF-8 support, macros, partitions, profiles, full …… -
Read the properties file with Java — transfer to
Today, Google took a long time to read the properties file through Java and finally found it. Now I'd like to share it…… -
Detailed explanation of Java serializable and externalizable serialization and deserialization — to
1、 What is serialization? "Object serialization" has been a feature since Java 1.1. In short, it can convert an objec…… -
Basic example of JMX technology — reprint
Original address: http://nick-lab.gs.washington.edu/java/jdk1.5b/guide/jmx/tutorial/connectors.html heading1">2.1 I…… -
JSTL SQL tag usage
1.setDataSource 2.query 3.update 4.transaction Tags are used to establish transaction context for tags and tags. Its s…… -
Understanding JTS–reference
Part I-An introduction to transactions If you look at any introductory article or book on J2EE,you'll find only a smal…… -
Living in the matrix with bytecode regulation
Original address: https://www.infoq.com/articles/Living-Matrix-Bytecode-Manipulation You are probably all too familiar…… -
J2EE security introduction — turn
< H2 id = "1" > I brief introduction Now more and more enterprise applications are built on J2EE platform, which…… -
Implementation principle of JDK dynamic agent — reprint
Although the dynamic agent of JDK was used before, some problems have not been understood. For example: who calls the …… -
Garbage collectors – Serial vs. parallel vs. CMS vs. G1 (and what’s new in Java 8) — to
The 4 Java Garbage Collectors - How the Wrong Choice Dramatically Impacts Performance The year is 2014 and there are t…… -
The past and present life of character coding — turn
Original address: http://gitbook.cn/books/599d075614d1bc13375caeaf/index.html Many programmers don't quite understand …… -
Implementation of Java log caching mechanism — reprint
< H2 id = "major1" > overview Log technology provides important support for product quality and service. JDK add…… -
Try with resources analysis in Java 7 — conversion
Original address: http://blog.csdn.net/hengyunabc/article/details/18459463 The so-called try with resources is a synta…… -
Environment variables of windows DOS command window
When installing Maven today, I encountered MVN - V, which shows that MVN is not the command line and the environment v…… -
Use JSSE to customize the properties of SSL connection — reprint
JSSE provides secure communication for Java applications by encrypting and protecting data over the network using SSL.…… -
JAAS authentication in Tomcat example–reference
In this tutorial you will learn how to configure JAAS authentication in Tomcat using the HTTP Basic authentication …… -
The difference between form data, x-www-form-urlencoded, raw and binary in postman — transfer
Original address: http://blog.csdn.net/ye1992/article/details/49998511 1、form-data: It is the multipart / form data i…… -
In depth analysis of Chinese coding in Java — conversion
< H2 id = "major1" > several common coding formats < H3 id = "minor1.1" > why code I wonder if you have ev…… -
Example of concurrenthashmap in Java — to
Original address: http://www.concretepage.com/java/example_concurrenthashmap_java On this page we will provide example…… -
When using jetty for debugging, eclipse relies on the source code debugging method of the project
[1] Add source eclipse-->debug as-->debug configurations-->source [2] If source does not work Recompile and M……