包含标签:Java 的文章
-
Java gets the real IP address — reprint
= request.getHeader("x-forwarded-for" (ip == || ip.length() == 0 || "unkNown"= request.getHeader("Proxy-Client-I…… -
Transaction strategy: understand transaction traps — forward
Common errors to pay attention to when implementing transactions in the Java platform Transactions are often used in a…… -
Implementation of MMAP in Java — to
Specific reference Filechannel in Java provides map and force methods. Map creates file and memory mappings, -
Java performance optimization reading notes (1)
1. Create objects by clone () All classes in the Java language inherit from Java by default Lang. object, there is a c…… -
What is weakhashmap — turn
Original address: http://laravel.iteye.com/blog/2303244 Where is the Java weakhashmap? Is it really weak? What are the…… -
3 Ways of JDK Source Code Attachment in Eclipse—reference
You wanna look at a JVM class while you are coding and you cannot. Here is the solution. First of all, your related JD…… -
Fastjson reads the JSON configuration file
Fastjson read JSON configuration file: Dependency: import org. apache. commons. io. IoUtils; import org. apache. commo…… -
Another way to play serial number generation
Usually, we like to use time as a kind of serial number when generating serial number, but the length of time serial n…… -
Java file reading and writing — reprint
read file http://www.baeldung.com/java-read-file 1. Overview In this tutorial we’ll explore different ways to read fro…… -
Concurrent programming — Concurrent data structure — reprint
Concurrent programming series articles: initial solution thread pool: detailed explanation thread pool: concurrent dat…… -
Thread cooperation based on Java 2 runtime security model — turn
In versions prior to Java 2, the runtime security model used a very strictly restricted sandbox model( Sand@R_172_241…… -
Top 10 Mistakes Java Developers Make–reference
This list summarizes the top 10 mistakes that Java developers frequently make. #1. Convert Array to ArrayList To conve…… -
Improve I / O performance by extending RandomAccessFile class with buffer — reprint
< H3 id = "n1002e" > main body: At present, the most popular J2SDK version is the 1.3 series. Developers using t…… -
Input system variables and operating parameters in eclipse — turn to
Original address: http://chenzhou123520.iteye.com/blog/1931670 During development, sometimes different system paramete…… -
-
No enclosing instance of type E is accessible Must qualify the allocation with an enclosing
Original text: http://blog.csdn.net/sunny2038/article/details/6926079 Recently, I was looking at Java. When compiling …… -
Serialization and deserialization — to
http://www.infoq.com/cn/articles/serialization-and-deserialization brief introduction The author serves meituan recomm…… -
Java implementation of RSA encryption, decryption and digital signature — to
RSA public key encryption algorithm was proposed by Ron Rivest, ADI Shamir and Leonard Adleman in 1977. At that time, …… -
tomcat:there is no resources that can be added or removed from server
reason: 1. Not a web project Solution: Project -- > Property -- create or modify a project facet 2. Incompatible ve…… -
Analysis of servlet working principle — reprint
Original text: http://www.ibm.com/developerworks/cn/java/j-lo-servlet/index.html?ca=drs - Web technology has become on…… -
Detailed explanation of Java 8 stream API — turn to
Original address: http://blog.csdn.net/chszs/article/details/47038607 1、 Stream API introduction 8 introduces a new s…… -
Deep parsing of Java Memory Model: summary — turn
Original address: http://www.codeceo.com/article/java-memory-7.html Processor memory model Sequential consistent memor…… -
Dynamics of Java Programming Part 1: classes and class loading — reprint
Original address: http://www.ibm.com/developerworks/cn/java/j-dyn0429/ This article is the first in a new series that …… -
Monitor and diagnose performance in Java se 6 — reprint
Java SE 6 provides an in-depth focus on performance,offering expanded tools for managing and monitoring applications a…… -
java. util. Detailed analysis of concurrent package — transfer
Original address: http://blog.csdn.net/windsunmoon/article/details/36903901 summary . util. Concurrent contains many t…… -
Java implementation and comparison of several task scheduling methods — reprint
< H2 id = "major1" > Preface Task scheduling refers to the automatic execution of tasks based on a given time po…… -
Use org apache. jasper. Jspc compiled JSP file — reprint
Jspc. Jspc setArgs(args); Set the required parameters, which is the same as compiling with instructions, Example of us…… -
Encoding and scrambling (05) — conversion between GBK and UTF-8 — reprint
Original address: http://www.blogjava.net/pengpenglin/archive/2010/02/22/313669.html [GBK to UTF-8] On many forums and…… -
No copy code — eclipse uses git to submit the project – transfer
Original address: http://blog.csdn.net/u014079773/article/details/51595127 preparation: Purpose: Eclipse uses git to s…… -
This request has been blocked under HTTPS; the content must be served over HTTPS.
How to introduce HTTP resources into HTTPS web pages: mixed content? https://segmentfault.com/q/1010000005872734/a-102…… -
Full GC experience analysis
Background: Individual machines: memory suddenly rises and CPU utilization increases. Solving process 1. Jmap dump ent……
