Recent Posts
-
Java uses reflection
There are two types of objects in Java programs at run time: compile time type and run time type. For example, list = …… -
Loading, connecting and initializing Java classes
JVM and classes When calling a Java command to run a java program, the command will start a Java virtual machine proce…… -
Lightweight Locking
The scenario for lightweight locks is that threads execute synchronization blocks alternately. -
Java Memory Model
The Java Memory Model stipulates that all variables are stored in the main memory; the working memory of a thread stor…… -
About thread pools
Core parameters of thread pool The process of adding threads to the thread pool By default, a thread is created for ea…… -
I use java to realize flying pigeon Book transmission 2 – realize file transmission
Step 2: realize file transfer. In the previous step, only a string was passed from the server to the client. This time…… -
TCP shakes hands three times and waves four times
TCP header The source port and destination port determine the processes of both sides at the TCP layer. The serial num…… -
Java multithreading – control thread
Join thread When the join () method of another thread is invoked in the execution stream of a thread, the calling thre…… -
Get the file character set with jchardet
Some time ago, when learning Lucene, I encountered the problem of reading TXT documents and encountering coding errors…… -
Access rights in Java
There are four access permissions in Java, from large to small: public – > protected – > Default (friendly) – &g…… -
Thread pool provided by Java by default
Java thread pools are built through ThreadPoolExecutor. In the executors factory class, Java provides four types of th…… -
AQS
AQS, the queue synchronizer abstractqueuedsynchronizer (hereinafter referred to as synchronizer), is the basic framewo…… -
Java socket – half closed
Typically, the output stream is closed to indicate that the output has ended. However, this cannot be done during netw…… -
Redis high availability – Master & slave
Master & slave is what we call master-slave replication, that is, after the host data is updated, it is automatica…… -
Computer networks – IP and ports
Hierarchical model of computer network OSI layered model: physical layer, data link layer, network layer, transport la…… -
Session storage
Sessions are actually divided into server-side sessions and client-side sessions. When the user establishes a connecti…… -
About redis
Introduction to redis Redis is an open source in memory data structure storage system, which can be used as database, …… -
JAVA memory analysis 1 – starting with two programs
This time, let's look at some content about JVM memory analysis. Two procedures Procedure I First, let's look at two p…… -
Can the key and value of map be null
Can the key and value of map be null? Write the program directly to verify: Execution results: The conclusions are as …… -
Java socket – use proxy server
There's no need to say more about why you use a proxy server. Using proxy Java provides a proxy class implementation t…… -
Java class loader
Class loader description The class loader is responsible for The class file is loaded into memory, and a Java. Java. X…… -
A novel collection program implemented in Java
Don't scold me if you are attracted by the title. It's just a simple implementation. I wrote it to download a favorite…… -
Servlet and thread safety
Let's start with the conclusion: servlets are not thread safe. Servlet running process The servlet program is called b…… -
Serialization and deserialization of Java objects
The goal of object serialization is to save the object on disk or transfer it over the network. The implementation mec…… -
Lock expansion
If a series of continuous operations repeatedly lock and unlock the same object, or even the lock operation occurs in …… -
Spring IOC principle
Container initialization The initialization of the container is first performed in the corresponding constructor. In t…… -
Clone of Java objects
In the Java language, data types are divided into value types (basic data types) and reference types. Value types incl…… -
Java implementation of simple web page capture
Requirement Description: use java to grab web page information and return it in the form of string. Implemented using …… -
Why is I + + thread unsafe
Mainly because I + + is not atomic, it will be compiled into I = I + 1; In fact, there are three steps. One is read, m…… -
Java multithreading – thread synchronization
When multiple threads operate on the same object, it is easy to cause thread safety problems. In order to solve the pr…… -
Queues available to the java thread pool
Constructor of java thread pool ThreadPoolExecutor: You can see that the queue used by the thread pool is the blocking…… -
Java: the optimization process of exporting large quantities of Excel data
background At present, the team is working on a user data Kanban (hereinafter referred to as Kanban), which basically ……