包含标签:Java 的文章
-
The Java nouns of “cannibalism”: object, reference, heap, stack
I remember that there was a text named "Madman's diary" in the middle school textbook; At that time, I couldn't unders…… -
Java string: a string class that is so important that others can only be the second
String is the most important class in Java. This affirmative inference is not what James Gosling, the father of Java, …… -
Is the inner class of Java really so difficult to understand?
I parked my car and went home last night. When I got home, I found my cell phone in the car, but it was too cold outsi…… -
Dynamics of Java programming, Part 5: dynamic conversion classes — reprint
In part 4, "", you learned how to use the javassist framework to convert the Java class file generated by the compiler…… -
Java gets the real IP address — reprint
= request.getHeader("x-forwarded-for" (ip == || ip.length() == 0 || "unkNown"= request.getHeader("Proxy-Client-I…… -
Transaction strategy: understand transaction traps — forward
Common errors to pay attention to when implementing transactions in the Java platform Transactions are often used in a…… -
Implementation of MMAP in Java — to
Specific reference Filechannel in Java provides map and force methods. Map creates file and memory mappings, -
Java performance optimization reading notes (1)
1. Create objects by clone () All classes in the Java language inherit from Java by default Lang. object, there is a c…… -
What is weakhashmap — turn
Original address: http://laravel.iteye.com/blog/2303244 Where is the Java weakhashmap? Is it really weak? What are the…… -
3 Ways of JDK Source Code Attachment in Eclipse—reference
You wanna look at a JVM class while you are coding and you cannot. Here is the solution. First of all, your related JD…… -
Fastjson reads the JSON configuration file
Fastjson read JSON configuration file: Dependency: import org. apache. commons. io. IoUtils; import org. apache. commo…… -
Another way to play serial number generation
Usually, we like to use time as a kind of serial number when generating serial number, but the length of time serial n…… -
Java file reading and writing — reprint
read file http://www.baeldung.com/java-read-file 1. Overview In this tutorial we’ll explore different ways to read fro…… -
Concurrent programming — Concurrent data structure — reprint
Concurrent programming series articles: initial solution thread pool: detailed explanation thread pool: concurrent dat…… -
Thread cooperation based on Java 2 runtime security model — turn
In versions prior to Java 2, the runtime security model used a very strictly restricted sandbox model( Sand@R_172_241…… -
Top 10 Mistakes Java Developers Make–reference
This list summarizes the top 10 mistakes that Java developers frequently make. #1. Convert Array to ArrayList To conve…… -
Improve I / O performance by extending RandomAccessFile class with buffer — reprint
< H3 id = "n1002e" > main body: At present, the most popular J2SDK version is the 1.3 series. Developers using t…… -
Input system variables and operating parameters in eclipse — turn to
Original address: http://chenzhou123520.iteye.com/blog/1931670 During development, sometimes different system paramete…… -
-
No enclosing instance of type E is accessible Must qualify the allocation with an enclosing
Original text: http://blog.csdn.net/sunny2038/article/details/6926079 Recently, I was looking at Java. When compiling …… -
Serialization and deserialization — to
http://www.infoq.com/cn/articles/serialization-and-deserialization brief introduction The author serves meituan recomm…… -
Java implementation of RSA encryption, decryption and digital signature — to
RSA public key encryption algorithm was proposed by Ron Rivest, ADI Shamir and Leonard Adleman in 1977. At that time, …… -
tomcat:there is no resources that can be added or removed from server
reason: 1. Not a web project Solution: Project -- > Property -- create or modify a project facet 2. Incompatible ve…… -
Analysis of servlet working principle — reprint
Original text: http://www.ibm.com/developerworks/cn/java/j-lo-servlet/index.html?ca=drs - Web technology has become on…… -
Detailed explanation of Java 8 stream API — turn to
Original address: http://blog.csdn.net/chszs/article/details/47038607 1、 Stream API introduction 8 introduces a new s…… -
Deep parsing of Java Memory Model: summary — turn
Original address: http://www.codeceo.com/article/java-memory-7.html Processor memory model Sequential consistent memor…… -
Dynamics of Java Programming Part 1: classes and class loading — reprint
Original address: http://www.ibm.com/developerworks/cn/java/j-dyn0429/ This article is the first in a new series that …… -
Monitor and diagnose performance in Java se 6 — reprint
Java SE 6 provides an in-depth focus on performance,offering expanded tools for managing and monitoring applications a…… -
java. util. Detailed analysis of concurrent package — transfer
Original address: http://blog.csdn.net/windsunmoon/article/details/36903901 summary . util. Concurrent contains many t…… -
Java implementation and comparison of several task scheduling methods — reprint
< H2 id = "major1" > Preface Task scheduling refers to the automatic execution of tasks based on a given time po……