包含标签:Java 的文章
-
Understanding extension class loading — Official
http://docs.spring.io/spring-amqp/docs/1.3.6.RELEASE/reference/html/sample-apps.html#d4e1285 http://docs.spring.io/spr…… -
Java permissions and security policy — official document
3 Permissions and Security Policy 3.1 The Permission Classes The permission classes represent access to system resourc…… -
JAAS LOGIN IN WEBLOGIC SERVER–reference
The Java Authentication and Authorization Service (JAAS) is a standard extension to the security in the J2SE Developme…… -
Design and implementation of cache — reprint
This article is compiled from the following two Blogs: http://my.oschina.net/ScottYang/blog/298727http://my.oschina.ne…… -
Handling of inconsistent compiled code when eclipse uses Tomcat for deployment
Operation steps: 1. Add and remove items first 2. Clean clears the directory of the project in Tomcat 3. project-->…… -
Event based NiO multithreaded server — reprint
JDK1. NiO of 4 effectively solves the problem of thread overhead existing in the original streaming io. The main purpo…… -
Glossary of Terms in the JavaTM platform –reference
http://docs.oracle.com/javase/tutorial/information/glossary.html field :A data member of a class. Unless specified oth…… -
Jackson ignores unnecessary fields when deserializing
Sometimes, if a field is added to the database table, but the returned JSON string contains a field we do not need, an…… -
Java annotations: explored & explained — reprinted
Original address: http://www.javacodegeeks.com/2012/08/java-annotations-explored-explained.html One of the many wonder…… -
New function in Java math class — floating point number
Java ™ Language specification version 5 Lang. math and Java Lang. strictmath adds 10 new methods, and Java 6 adds 10 m…… -
In depth analysis of the working mechanism of Java I / O — reprint
< H2 id = "1. Basic architecture of Java I / O class library | outline" > basic architecture of Java I / O class…… -
Jmap view memory usage and generate heapdump — conversion
PHP? uid=191&do=blog&id=7572"> http://www.webspherechina.net/home/space.PHP?uid=191&do=blog&id=7572…… -
Fork and Join: Java Can Excel at Painless Parallel Programming Too!— turn
Original address: http://www.oracle.com/technetwork/articles/java/fork-join-422606.html Concurrent Programming in Java…… -
Simple session shared encapsulation
objective The session is stored on the cache server (all kinds of cache servers can be used. This article takes memcac…… -
Curl request simulates post sending JSON
Example: curl - x post -- header "content type: application / JSON" -- data '{"name": "SSS", "IDnumber": "1111", "appk…… -
Change value of string array at debug eclipse
Question: I have an application,but to test something,I need to change value of a String[]. But when I do it using ch…… -
5 Ways to Use Log Data to Analyze System Performance–reference
Recently we looked across some of the most common behaviors that our community of 25,000 users looked for in their l…… -
Beauty of simplicity jodd — props attribute usage
Prop is a super property; It contains many things missing from JDK: UTF-8 support, macros, partitions, profiles, full …… -
Read the properties file with Java — transfer to
Today, Google took a long time to read the properties file through Java and finally found it. Now I'd like to share it…… -
Detailed explanation of Java serializable and externalizable serialization and deserialization — to
1、 What is serialization? "Object serialization" has been a feature since Java 1.1. In short, it can convert an objec…… -
Basic example of JMX technology — reprint
Original address: http://nick-lab.gs.washington.edu/java/jdk1.5b/guide/jmx/tutorial/connectors.html heading1">2.1 I…… -
JSTL SQL tag usage
1.setDataSource 2.query 3.update 4.transaction Tags are used to establish transaction context for tags and tags. Its s…… -
Understanding JTS–reference
Part I-An introduction to transactions If you look at any introductory article or book on J2EE,you'll find only a smal…… -
Living in the matrix with bytecode regulation
Original address: https://www.infoq.com/articles/Living-Matrix-Bytecode-Manipulation You are probably all too familiar…… -
J2EE security introduction — turn
< H2 id = "1" > I brief introduction Now more and more enterprise applications are built on J2EE platform, which…… -
Implementation principle of JDK dynamic agent — reprint
Although the dynamic agent of JDK was used before, some problems have not been understood. For example: who calls the …… -
Garbage collectors – Serial vs. parallel vs. CMS vs. G1 (and what’s new in Java 8) — to
The 4 Java Garbage Collectors - How the Wrong Choice Dramatically Impacts Performance The year is 2014 and there are t…… -
The past and present life of character coding — turn
Original address: http://gitbook.cn/books/599d075614d1bc13375caeaf/index.html Many programmers don't quite understand …… -
Implementation of Java log caching mechanism — reprint
< H2 id = "major1" > overview Log technology provides important support for product quality and service. JDK add…… -
Try with resources analysis in Java 7 — conversion
Original address: http://blog.csdn.net/hengyunabc/article/details/18459463 The so-called try with resources is a synta…… -
Environment variables of windows DOS command window
When installing Maven today, I encountered MVN - V, which shows that MVN is not the command line and the environment v…… -
Use JSSE to customize the properties of SSL connection — reprint
JSSE provides secure communication for Java applications by encrypting and protecting data over the network using SSL.……