Recent Posts
-
Xiuzhen academy Java task 1 whole process introduction
For a long time, the task of the monastery has been jokingly called "dissuasion task". Task 1 portal: After completing…… -
LinkedHashMap source code analysis of Java collection
summary HashMap is out of order, that is, the put order is not guaranteed to be the same as the traversal order Linked…… -
Analysis of main function in Java
Reprint address: In Java, the main () method is the entry method for Java applications. The Java virtual machine fin…… -
Research on add and remove methods of listiterator interface
Transferred from: The listiterator interface inherits from the iterator interface and adds methods such as add(). -
Why is HashMap thread unsafe?
All along, I only know that HashMap is thread unsafe, but why is HashMap thread unsafe and under what circumstances m…… -
Java8 lambda expression
@H_ 404_ 0 @ overview Lambda expression is a new feature in Java 8. It can be understood as an anonymous function. Lam…… -
Salt password hash: how to use it correctly
< P style = "border: 0px; margin top: 0px; margin bottom: 20px; padding top: 0px; padding bottom: 0px; font size: 1…… -
JDBC connection pool principle
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
MySQL multi table query
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Java internal classes and their principles
Implementing internal classes in Java I believe we have used the internal class many times, let alone how it is used. …… -
Several ways to generate JSON
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Java interface
The concept of interface in Java, an interface is a collection of all abstract methods. An interface needs to be defin…… -
There are several content types for HTTP requests. What is the difference? What scenario is HTTP suitable for? What are the HTTP status codes?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Why is full stack JavaScript often hacked while Java is not?
It's not that JS can't be the back end, but that those who write the front end in JS can't be the back end. Not that J…… -
Short circuit and, logic and, short circuit or, logic or in Java
10) && (b<40)); System.out.println((a++>10) & (a>40)); System.out.println((a<1…… -
What are the disadvantages of self increasing ID? What kind of scenario does not use self incrementing ID?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
HashMap analysis
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Java Dynamic Proxy
< span style="color:rgb(123,12,0);"> 1. What is agency (adsbygoogle = window.adsbygoogle || …… -
Quartz
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Native keyword in Java
< span style="font-size:12px;"> Today, when studying the java basic class library and object class, I found a k…… -
How to call a third-party API to upload pictures?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Simple IO flow
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
HashMap
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
What are the functions of interceptors, filters and listeners
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
How to call a third-party API to upload pictures?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Semaphore source code analysis – java8
1. Characteristic analysis private final Sync sync; All mechanisms are implemented through the subclass AQS, so the im…… -
Simple use of nginx
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an……