Recent Posts
-
The relationship among database, instance and session in MySQL
1. No suitable driver found for http://127.0.0.1:3306/test jdbc_ URL error. JDBC uses its own protocol. The correct pa…… -
Troubleshooting tools in JDK 7 — reprint
This chapter describes in detail the troubleshooting tools that are available in JDK 7. In addition,the chapter lists …… -
-
java. net. Socketexception four exception solutions – turn
java. net. How can socketexception be better used? This requires us to understand the relevant problems about the lang…… -
-
The past and present life of character coding — turn
Original address: http://gitbook.cn/books/599d075614d1bc13375caeaf/index.html Many programmers don't quite understand …… -
Simple session shared encapsulation
objective The session is stored on the cache server (all kinds of cache servers can be used. This article takes memcac…… -
Simple beauty jodd HTTP — in-depth understanding of the source code HTTP protocol
Jodd is an open source Java tool set, which contains some practical tool classes and small frameworks. Simple but powe…… -
JSTL core tag usage
There are 13 Tags in JSTL core tag library, which are functionally divided into 4 categories: 1. Expression control la…… -
Dynamics of Java programming, Part 8: replacing reflection with code generation — reprint
Now that you have seen how to use javassist and BCEL framework for classworking (see), I'll show an actual classworkin…… -
ReflectionToStringBuilder
1. Use background The background interface needs to record the parameters of the following query (modification) object…… -
Implement castor data binding — turn to
Part 1: installing and setting up castor In XML newsgroups In the discussion forums of mailing lists and websites (whe…… -
Jodd stringtemplateparser uses
Stringtemplateparser is a parser for string templates. Define macros similar to JSP tags in the string template. Durin…… -
This request has been blocked under HTTPS; the content must be served over HTTPS.
How to introduce HTTP resources into HTTPS web pages: mixed content? https://segmentfault.com/q/1010000005872734/a-102…… -
Serialization and deserialization — to
http://www.infoq.com/cn/articles/serialization-and-deserialization brief introduction The author serves meituan recomm…… -
Implementation of MMAP in Java — to
Specific reference Filechannel in Java provides map and force methods. Map creates file and memory mappings, -
java. lang.Long cannot be cast to java. Lang. integer solution
Scenario: Mybatis connecting to Oracle report errors: When the test increases, an error is reported lang.Long cannot b…… -
Use of httpserver
http://docs.oracle.com/javase/8/docs/jre/api/net/httpserver/spec/overview-summary.html Programmers must implement the …… -
Please don’t take “string s = new string (” XYZ “); how many string instances have been created” to the interview — turn
This post is used to answer a question in the circle. Originally because too many have already make complaints about w…… -
Java 7 multithreading – semaphore — reprint
Semaphore is used to save the number of currently available licenses. This is achieved by sharing locks. According to …… -
no awt in java. libary. path
Missing dependent package. Under Linux, enter the JDK installation path / JRE / lib / i386 Use LDD to view dependent p…… -
Garbage collectors – Serial vs. parallel vs. CMS vs. G1 (and what’s new in Java 8) — to
The 4 Java Garbage Collectors - How the Wrong Choice Dramatically Impacts Performance The year is 2014 and there are t…… -
Fork and Join: Java Can Excel at Painless Parallel Programming Too!— turn
Original address: http://www.oracle.com/technetwork/articles/java/fork-join-422606.html Concurrent Programming in Java…… -
Base64 is used in cross platform transmission to ensure the integrity of non ASCII code strings
First, let's take an example: In this case, the B and B1 byte arrays are the same. What about the following situation?…… -
Java NiO — source code analysis of selector mechanism — conversion
I haven't understood how pipe wakes up the selector, so I went to see the source code of JDK (openjdk download), and s…… -
Java theory and practice: blocking memory leaks with weak references — reprint
To make objects that are no longer used by the garbage collection (GC) collector, the logical life cycle of the object…… -
Example of reading configuration file for current project
Example of current project directory read configuration: -
Deep parsing of Java Memory Model: sequence consistency — conversion
Original address: http://www.codeceo.com/article/java-memory-3.html Data competition and sequence consistency assuranc…… -
In depth analysis of the working mechanism of Java I / O — reprint
< H2 id = "1. Basic architecture of Java I / O class library | outline" > basic architecture of Java I / O class…… -
No copy code — eclipse uses git to submit the project – transfer
Original address: http://blog.csdn.net/u014079773/article/details/51595127 preparation: Purpose: Eclipse uses git to s…… -
No enclosing instance of type E is accessible Must qualify the allocation with an enclosing
Original text: http://blog.csdn.net/sunny2038/article/details/6926079 Recently, I was looking at Java. When compiling …… -
Transaction strategy: understand transaction traps — forward
Common errors to pay attention to when implementing transactions in the Java platform Transactions are often used in a……