Recent Posts
-
Is the inner class of Java really so difficult to understand?
I parked my car and went home last night. When I got home, I found my cell phone in the car, but it was too cold outsi…… -
Java string: a string class that is so important that others can only be the second
String is the most important class in Java. This affirmative inference is not what James Gosling, the father of Java, …… -
The Java nouns of “cannibalism”: object, reference, heap, stack
I remember that there was a text named "Madman's diary" in the middle school textbook; At that time, I couldn't unders…… -
Java: polymorphism is the source of happiness
< H3 class = "heading" > 01 what is polymorphism In my stereotype, the wonderful battle between monkey king and …… -
Array of tasteless food and pitiful discard in Java
Before the emergence of Java generics, only arrays could be used to store objects of specified types; Before the emerg…… -
Living in the matrix with bytecode regulation
Original address: https://www.infoq.com/articles/Living-Matrix-Bytecode-Manipulation You are probably all too familiar…… -
New function in Java math class — floating point number
Java ™ Language specification version 5 Lang. math and Java Lang. strictmath adds 10 new methods, and Java 6 adds 10 m…… -
Initialization exception in Maven compilation: COM / sun / tools / javac / code / typetags
Formula jdk11 used Lombok style 1.16 four Error reason: version mismatch Upgrade Lombok to 1.18 four Problem solving -
Java files run under windows without JDK installed.
1. Firstly, the project should be GUI, using swing or AWT. 2. Use eclipse to package jar files. Right click the projec…… -
Java exception handling best practices — reprint
Original address: http://howtodoinjava.com/2013/04/04/java-exception-handling-best-practices/ This post is another add…… -
In memory of my java posture — turn
Original address: https://segmentfault.com/a/1190000007122432?hmsr=toutiao.io&utm_medium=toutiao.io&utm_source…… -
UNDERSTANDING VOLATILE VIA EXAMPLE–reference
We have spent last couple of months stabilizing the . During this we have stumbled into many tricky concurrency issues…… -
Hot replacement of Java classes — reprint
Build an online upgrade system based on Java In this article, we will not explain the details of Java classloader in t…… -
Java implementation and comparison of several task scheduling methods — reprint
< H2 id = "major1" > Preface Task scheduling refers to the automatic execution of tasks based on a given time po…… -
Improve I / O performance by extending RandomAccessFile class with buffer — reprint
< H3 id = "n1002e" > main body: At present, the most popular J2SDK version is the 1.3 series. Developers using t…… -
The gradlew wrapper uses the gradlew Zip file assembly — transfer
Original address: http://www.myexception.cn/mobile/1860089.html The gradlew wrapper uses the gradlew Zip file installa…… -
Those Java open source libraries worth a try on GitHub — turn
Original address: http://www.jianshu.com/p/ad40e6dd3789 As a programmer, you use those on GitHub almost every day, suc…… -
Deep parsing of Java Memory Model: reordering — to
Original address: http://www.codeceo.com/article/java-memeory-2.html Data dependency If two operations access the same…… -
JMX and system management — transfer
< H2 id = "n10062" > Preface In the running process of Java programs, the monitoring of JVM and system has alway…… -
Keystore vs truststore — reprint
Original text: http://lukejin.iteye.com/blog/605634 Today, a colleague asked me about these two concepts, so I recorde…… -
Example of concurrenthashmap in Java — to
Original address: http://www.concretepage.com/java/example_concurrenthashmap_java On this page we will provide example…… -
Understanding JTS–reference
Part I-An introduction to transactions If you look at any introductory article or book on J2EE,you'll find only a smal…… -
Java annotations: explored & explained — reprinted
Original address: http://www.javacodegeeks.com/2012/08/java-annotations-explored-explained.html One of the many wonder…… -
Java theory and practice: correct use of volatile variables — conversion
Original address: http://www.ibm.com/developerworks/cn/java/j-jtp06197.html -
Node RSA encryption, Java decryption and debugging
The encryption and decryption with node RSA JS is normal, and the encryption and decryption with Java rsautils tool cl…… -
Dynamics of Java programming, Part 3: application reflection — reprint
In, I introduced the java reflection API and briefly described some of its basic functions. I also carefully studied t…… -
Java Performance Optimization Tools and Techniques for Turbocharged Apps–reference
Java Performance Optimization Java is among the most widely used programming languages in the software development wor…… -
Special characters encountered when using split for segmentation
When split is used: Let's take a look at the usage of split: You can see that the parameter in split is a regular expr…… -
Java String Class Example–reference
reference: http://examples.javacodegeeks.com/core-java/lang/string/java-string-class-example/ 1. Introduction In this…… -
java. util. Detailed analysis of concurrent package — transfer
Original address: http://blog.csdn.net/windsunmoon/article/details/36903901 summary . util. Concurrent contains many t…… -
Top 10 Mistakes Java Developers Make–reference
This list summarizes the top 10 mistakes that Java developers frequently make. #1. Convert Array to ArrayList To conve……