Recent Posts
-
Decoration pattern of Java design pattern learning
Decoration mode: dynamically add some additional responsibilities to an object. In terms of adding functions, decorati…… -
Example of using JSP in spring boot practice
The front-end and back-end separation architecture has its advantages, but according to the specific situation, it is …… -
Java uses future to get multithreading results in time
The future interface is a part of the Java standard API util. In the concurrent package. The future interface is the i…… -
Brief analysis on the opening and closing of eclipse debug mode
By default, right-click debug in eclipse. When running to the set breakpoint, it will automatically jump to the debug …… -
On the significance of rewriting toString () method in Java programming
In the previous article, we introduced the code example of Java toString method rewriting. Next, we briefly talk about…… -
Four optimization methods of Java virtual machine for internal lock
Since Java 6 / Java 7, the Java virtual machine has optimized the implementation of internal locks. These optimization…… -
Simple understanding of common tool classes in spring
File resource operation Spring defines an org springframework. core. io. Resource interface. Resource interface is def…… -
On the process of Java recycling object tags and object secondary Tags
1、 Tags for objects 1. What is a tag? How? The first problem, as we all know, is to mark some dead objects to facilit…… -
Java date time and date conversion
Java date, time, and mutual conversion for your reference. The specific contents are as follows The above is the whole…… -
Struts 2 configuration XML action details
When learning struts, we must master the working principle of struts 2. Only when we specify the implementation proces…… -
Struts 2 interceptor about solving login problems
The working principle of the interceptor is shown in the figure. Each action request is wrapped in a series of interce…… -
Influence of synchronized method on non synchronized method
StringBuilder is a thread unsafe class. StringBuffer is thread safe because its methods are synchronized. Today, I wro…… -
Java implementation of web page verification code function
This example shares the implementation code of Java Web page verification code for your reference. The specific conten…… -
The Jackson entity turns JSON to null or empty and does not participate in serialization (example explanation)
When using Jackson for serialization, we often encounter that the attribute of an entity object in the background is n…… -
Quickly understand hibernate configuration files and mapping files
Hibernate is a thorough ORM (object relational mapping) open source framework. Let's take a look at the high-level vie…… -
Read the configuration parameter instance in the XML file
paras. XML file SysParam.@ R_ 502_ 1713 @ file use Reference package required The above example of reading configurati…… -
On the wonderful use of future in Java multithreading (with source code)
In Java, future is a future object, which stores the processing results of this thread. It is like a delivery voucher.…… -
Java implementation of web page verification code function
This example shares the implementation code of Java Web page verification code for your reference. The specific conten…… -
Analysis of internal storage mode of map in Java
Map, that is, map, also known as key value pair, has a key and a value. For example, in groovy language, def map = ['n…… -
Java quicksort (instance)
Quick sort ---------------------------------------------------------------------- thought As shown in the figure above…… -
Use of httpclient in HTTP protocol interface test (detailed explanation)
In the interface test of HTTP protocol, get request and post request are most used. The post request includes form par…… -
Java code for connecting to MySQL database
This example shares the specific code of Java connecting to MySQL database for your reference. The specific contents a…… -
Explain in detail the spring boot + mybatis + freemaker framework built in MyEclipse
1. Create a maven project in MyEclipse. File>New>Maven Project: Check the red part in the figure and click next…… -
Implementation code of readwritelock read-write separation of Java multithreading
In multithreaded development, there is often a situation where we want to separate reading and writing. For the read a…… -
Learning and using servlet listener (3)
This article shares the specific learning contents of servlet listener for your reference. The specific contents are a…… -
Implementation methods of several common comparators in Java
In Java, the sorting of object arrays is often involved, so it involves the comparison between objects. Generally, the…… -
Kryo serialization and deserialization usage examples
Kryo is a fast and efficient Java object graphics serialization framework, which is characterized by performance, effi…… -
Fully understand CAS mechanism in Java
preface When I saw the Java lock mechanism, I accidentally saw the word CAS. Then I looked for CAS in Baidu. I read ma…… -
Java implementation of file encryption and decryption function example
This article describes the encryption and decryption function of Java implementation files for your reference, as foll…… -
Java continue break to make a simple chat room program
Java continue break makes a simple chat room program to shield uncivilized language and display the chat time of each …… -
Quickly create list and map instances with initial values in Java
Initialize a list and map object and add values as follows: This operation can also be implemented with the following …… -
Two methods of generating random string in Java
This example shares the specific code of generating random string in Java for your reference. The specific contents ar……