Using Java's own class java.util.zip for file/directory compression, there is a lack of support for Chinese name/directory naming, if there is a Chinese name, then packaging will fail. I after a period of exploration and practice, found in the
1.Duplicated Code
Code repetition is almost the most common odor. He is also one of the main goals of refactoring. Code repetition often comes from the Copy-and-paste programming style. Relative to him oaoo is an important symbol of a good system.
With the gradual increase of software project, software testing is becoming more and more important in software development. If the software project does not have a good testing process, as the system grows, both project managers and software
In the 1th installment of this series on business, we talked about the basics, including what transactions are and why transactions are critical to building reliable, distributed applications. In this section, we'll explore how to build a Java
Java programs can also cause memory leaks are open to the secret of the work need to give full attention to the problem.
There are a number of tools on the market for Java memory detection, and I use JBuilder's optimize tools in my work, and now
When doing a Java Web program, if the error, often printed on the page on the wrong stack memory information, in the development phase of the debugging program is very helpful, but in the operating environment, such a treatment is not friendly, not
Action One: the instance method of the rewrite class
Implementing code reuse through class inheritance is not an accurate code reuse technique, so it is not the ideal code reuse mechanism. In other words, if you do not inherit all the methods and
Shared variables
To make multiple threads useful in a program, they must have some way to communicate with each other or share their results.
The easiest way to let threads share their results is to use shared variables. They should also use
Java™ developers can use objects as a starting point for understanding Scala. This is the second phase of the Scala Guide series for Java developers, and the author Ted Neward follows the basic premise of evaluating a language: the power of a
Linear table, linked list, hash table is a commonly used data structure, in the Java development, JDK has provided us with a series of corresponding classes to achieve the basic data structure.
These classes are in the Java.util package. This paper
Comparison of five open source protocols (Bsd,apache,gpl,lgpl,mit).
When a series of giants such as Adobe, Microsoft and Sun begin to show their preference for "open source", the era of "open source" is coming!
There are many open source protocols
One of the main advantages of using Java is that you don't have to worry about discarding objects, that is, let Java runtime be responsible for memory management of Java objects.
This is accomplished by having the Java runtime do garbage collection
One of the major obstacles to exchanging information among different systems is how to achieve consistency in the precise exchange and formatting of data. The Java Message Service (Java Messaging Services, referred to as JMS) solves this problem by
Background:
In the use of search engines and the power of the electronic business, we must have encountered such a situation: I want to search blog park, can not be careful to lose into the blog, do not worry about the search results you want,
The Bitset is actually a vector composed of "bits". If you want to efficiently save a large number of "open-close" information, you should use Bitset. It only makes sense in terms of size; If you want efficient access, it's slower than using some
In any collection class, you must place the object in one of the methods, and then take the object from another method. After all, accommodating a wide variety of objects is the primary task of the collection. In vectors, addelement () is the method
Historical Collection Classes (before JDK1.1)The containers provided are arrays,vector,stack,hashtable,properties,bitset. It defines a standard way of visiting elements within a cluster, called the enumeration interface, as follows:
Vector v=new
A Implement multithreading
1. The false multithreading
Example 1:
public class TestThread{ int i=0, j=0; public void go(int flag) { while(true) { try{ Thread.sleep(100); } catch(InterruptedException e) {
In the JAVA5, the lock object is specially provided, and the lock can conveniently realize the resource blockade, which is used to control the control of concurrent access to competing resources, which is mainly concentrated under the
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service