Recent Posts
-
Mybatis – learning notes
configuration file 1. Properties introduces the contents of the external properties configuration file Resourc…… -
Go deep into the Java core and explore the Java garbage collection mechanism (transferred from http://edu.21cn.com/java/g_189_859836-1.htm )
Garbage collection GC Garbage collection is one of the core technologies of the Java language. Previously, we specific…… -
Java process control
Java's main process control statements include 3 minutes, selection statements, loop statements and jump statements. T…… -
What is a consistent hash
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
What is restful? What are the rest request methods and what are the differences?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Lambda expressions filter songs with a length of less than 1 minute
Filter to find song names with a time length > 60. -
Simple traversal of Java two-dimensional array
< span style="color:#000080;"> 1. The code is as follows: < pre style = "font family: Menlo; font size: 9pt;"…… -
Preliminary study on AOP
Hello, I'm a java student of Shenzhen Branch of it Academy. I'm an honest, pure and kind java programmer. Today, I'd l…… -
The engineers in the whole stack have written in the front and back, and have been working for nearly three years. But recently, I realized that my java foundation is relatively weak, so I’d like to recommend a book to supplement the Java foundation?
Learn from Memcache, redis, elasticsearch, mongodb, Cassandra, ActiveMQ, Tuscany and their internal implementations. L…… -
web. What are the main configuration files in XML and what do they represent?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
To what extent do developers need to master the database? For example, do java developers master MySQL?
The more developers master dB, the more things you can do. Complete business functions and understand basic SQL statem…… -
java8 JDK1. 8 API Chinese translation Java help document
Transferred from: < H3 id = "java-1-6-help document" style = "border: 0px; font family: 'open sans',' Helvetica Neu…… -
Analysis of cookies and sessions
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Comparison between sleep () method and wait () method
< H2 id = "sleep method vs wait method" > sleep() method vs wait() method Nofollow "> reference http://www.cn…… -
Summary of anonymous inner classes in Java
Reprint address: < P style = "margin: 10px Auto; padding top: 0px; padding bottom: 0px; font family: 'Helvetica Neu…… -
Analysis of ArrayList source code of Java collection
summary ArrayList can be understood as a dynamic array. According to MSDN, it is a complex version of array Compared w…… -
Deep and shallow cloning in Java
Why clone First, consider the question, why do you need to clone objects? Can't you just new an object? The cloned obj…… -
Primary key & unique
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
How does return in try, catch and finally affect the word order of code execution
1. If there is no return statement in try, catch and finally, the normal execution sequence is as follows: After the n…… -
Variables in Java (member variables, local variables, class variables)
Transferred from: < span style="font-size:18px;">< a href="%20http://lib.csdn.net/base/java%20" rel="nofollo…… -
What is the difference between jetty, resin and Tomcat? Which web server should be selected for online services?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
What is RMI
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Basic use of reflection
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Exception: the server time zone value ‘Ö Ð¹ ú±ê ×¼ ʱ ¼ ä’ is unrecognized or represents more than one time zone. You must configure either the server or JDBC driver (via the serverTimezone configurat
Exception: The server time zone value 'Ö Ð¹ ú±ê ×¼ ʱ ¼ ä' is unrecognized or represents more than one time zone. You …… -
What is the level of Java proficiency?
It is never recommended to write something on your resume that you know, know, master and master. The academy has alwa…… -
Countdownlatch source code analysis
< H3 id = "1javautilconcurrent middle and advanced tools are divided into three categories" > 1 java. util. The …… -
What is MD5? What is MD5 usually used for? Why is MD5 irreversible? It may still be decrypted when used as password encryption?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Log4j and South
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Basic use of java reflection
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Mybatis generator code generation
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an……