包含标签:Java 的文章
-
Deep parsing of Java Memory Model: basic part — conversion
Original address: http://www.codeceo.com/article/java-memory-1.html Classification of concurrent programming models In…… -
Visual swing interface editing — reprint
Original address: http://279234058.iteye.com/blog/2200122 Today, I found a WindowBuilder plug-in with powerful functio…… -
How Do Annotations Work in Java?– turn
Original address: https://dzone.com/articles/how-annotations-work-java Annotations have been a very important part of …… -
Executing System commands in Java—ref
One of the nice features of Java language is that it provides you the opportunity to execute native system commands an…… -
How to ignore escape characters in strings in Java — reprint
Original address: http://my.oschina.net/u/1010578/blog/366252 cause In the past few days, I need to debug the rest int…… -
Java theory and practice: Thread pools and work queues–reference
Why thread pools? Many server applications,such as Web servers,database servers,file servers,or mail servers,are orie…… -
Simple beauty jodd HTTP — a basket of applications
Jodd HTTP is a miniature and simple HTTP client, but it is simple and convenient. Using it, you can easily send reques…… -
Servlet implementation of HTTP communication foundation
1. The client sends an HTTP message HTTP protocol is based on TCP / UDP protocol and encapsulates the details of socke…… -
Java theory and practice: correct use of volatile variables — conversion
Original address: http://www.ibm.com/developerworks/cn/java/j-jtp06197.html -
Initialization exception in Maven compilation: COM / sun / tools / javac / code / typetags
Formula jdk11 used Lombok style 1.16 four Error reason: version mismatch Upgrade Lombok to 1.18 four Problem solving -
How and Why Unsafe is Used in Java—reference
By sun. misc. Unsafe has been in Java from at least as far back as Java 1.4 (2004). In Java 9,Unsafe will be hidden al…… -
Jar package dependency query
When you encounter jar package conflicts in the project, you need to understand the dependency of jars before excludin…… -
Base64 is used in cross platform transmission to ensure the integrity of non ASCII code strings
First, let's take an example: In this case, the B and B1 byte arrays are the same. What about the following situation?…… -
Simple beauty jodd HTTP — in-depth understanding of the source code HTTP protocol
Jodd is an open source Java tool set, which contains some practical tool classes and small frameworks. Simple but powe…… -
Understanding extension class loading — Official
http://docs.spring.io/spring-amqp/docs/1.3.6.RELEASE/reference/html/sample-apps.html#d4e1285 http://docs.spring.io/spr…… -
Java permissions and security policy — official document
3 Permissions and Security Policy 3.1 The Permission Classes The permission classes represent access to system resourc…… -
JAAS LOGIN IN WEBLOGIC SERVER–reference
The Java Authentication and Authorization Service (JAAS) is a standard extension to the security in the J2SE Developme…… -
Design and implementation of cache — reprint
This article is compiled from the following two Blogs: http://my.oschina.net/ScottYang/blog/298727http://my.oschina.ne…… -
Handling of inconsistent compiled code when eclipse uses Tomcat for deployment
Operation steps: 1. Add and remove items first 2. Clean clears the directory of the project in Tomcat 3. project-->…… -
Event based NiO multithreaded server — reprint
JDK1. NiO of 4 effectively solves the problem of thread overhead existing in the original streaming io. The main purpo…… -
Glossary of Terms in the JavaTM platform –reference
http://docs.oracle.com/javase/tutorial/information/glossary.html field :A data member of a class. Unless specified oth…… -
Jackson ignores unnecessary fields when deserializing
Sometimes, if a field is added to the database table, but the returned JSON string contains a field we do not need, an…… -
Java annotations: explored & explained — reprinted
Original address: http://www.javacodegeeks.com/2012/08/java-annotations-explored-explained.html One of the many wonder…… -
New function in Java math class — floating point number
Java ™ Language specification version 5 Lang. math and Java Lang. strictmath adds 10 new methods, and Java 6 adds 10 m…… -
In depth analysis of the working mechanism of Java I / O — reprint
< H2 id = "1. Basic architecture of Java I / O class library | outline" > basic architecture of Java I / O class…… -
Jmap view memory usage and generate heapdump — conversion
PHP? uid=191&do=blog&id=7572"> http://www.webspherechina.net/home/space.PHP?uid=191&do=blog&id=7572…… -
Fork and Join: Java Can Excel at Painless Parallel Programming Too!— turn
Original address: http://www.oracle.com/technetwork/articles/java/fork-join-422606.html Concurrent Programming in Java…… -
Simple session shared encapsulation
objective The session is stored on the cache server (all kinds of cache servers can be used. This article takes memcac…… -
Curl request simulates post sending JSON
Example: curl - x post -- header "content type: application / JSON" -- data '{"name": "SSS", "IDnumber": "1111", "appk…… -
Change value of string array at debug eclipse
Question: I have an application,but to test something,I need to change value of a String[]. But when I do it using ch…… -
5 Ways to Use Log Data to Analyze System Performance–reference
Recently we looked across some of the most common behaviors that our community of 25,000 users looked for in their l…… -
Beauty of simplicity jodd — props attribute usage
Prop is a super property; It contains many things missing from JDK: UTF-8 support, macros, partitions, profiles, full ……