-dump:file=test.bin PID3. Analysis dump heap file, can use Jhat:Jhat Test.binAfter the analysis is complete, you can view the heap in a browser. The results of this tool are relatively primitive, you can also use the Eclipse Mat plugin for graphical analysis, or IBM's heap Analyzer.4.JVISUALVM and JCONSOLE:JVM with the performance analysis and monitoring tools, how to use? Please read the documentation yourself.5.jstack: Analyze the thread stack, asJs
Original: Java HTML string Regular expression using the tool classCode: http://www.zuidaima.com/share/1550463453416448.htmHTML-related Regular expression tool classes include filtering HTML tags, converting HTML tags, replacing specific HTML tags Package Com.zuidaima.common.util;import Java.util.regex.Matcher; Import Java.util.regex.Pattern; /** *
Java concurrency: synchronization between threads-conditional queue and synchronization Tool
Synchronization between threads exists in addition to mutex (the mutex lock introduced earlier). Below we will introduce some common collaboration methods between java threads.I. built-in condition queue
Just as each Java Objec
The jasypt development team has released the Java encryption tool jasypt 1.4, which can be integrated with Spring framework, hibernate, and acegi security. A project-related developer said that jasypt is a Java library that allows developers to add basic encryption functions to Java projects without having to know the
Jprotector High-Strength Java application Encryption tool Encryption techniques for Java applications are now prevalent in two types of cryptography: Code obfuscation encryption: Through the source code for the shape confusion, control confusion, data obfuscation and other processing, increased the class file after the anti-compilation of the source code analysi
Examples of some usage of the StringUtils tool class in Java
This article mainly introduces some usage examples of StringUtils tool class in Java. This article focuses on the use of isEmpty and isBlank methods, as well as the use of trim, strip, and other methods, for more information, see
The operation object of the S
supported, the interruptedexception is thrown and the current thread's interrupted state is cleared.1.3. Read-write lockIn addition to adding the lock interface, Java 5 also adds the Readwritelock interface, the read-write lock, which is defined as follows:Public interface Readwritelock { Lock readlock (); Lock Writelock ();}A read-write lock allows multiple read threads to execute concurrently, but does not allow the write thread to execute co
Original: Java read XML file generic tool class (recursive call) source code download address: http://www.zuidaima.com/share/1550463285480448.htm
The Java implementation reads the XML file and gets all the text content under the specified name node, including the node (inverse)
Package com.zuidaima.xml;
Import Java.io.FileInputStream;
Import java.io.FileNotFoun
Introduce a tool I developed, Json-to-java. It can help Java programmers to generate corresponding JavaBean through JSON. This tool is especially useful when you need to invoke the JSON return format API.function IntroductionWe develop Java systems that often need to invoke
the impersonation method callMockito.when (mockedlist.get (0)). Toreturn ("first");Mockito.when (Mockedlist.get (1)). Tothrow (New RuntimeException ());Print out "First"System.out.println (mockedlist.get (0));Throws Exception System.out.println (Mockedlist.get (1));Returns NULL because the return value has not yet been simulatedSystem.out.println (Mockedlist.get (999));3. Parameter matching deviceUse Anyint () to match any int type parameter Mockito.when (Mockedlist.get (Anyint ())). Toreturn (
Original article:
Http://www.infoq.com/cn/news/2011/08/jprofiler7
J-Technologies Co., Ltd. released jprofiler 7.0 some time ago. Jprofiler is a Java SE/EE profiling tool that features CPU analysis, memory analysis, thread analysis, and Vm telemetry. New Features of version 7.0 include:
Analyze the built-in probes for JDBC, JMS, JNDI, Servlet, files, sockets, and processes.
You can use the API to customi
public static
8. Unmodifiable SeriesEnsure that the encapsulated collection cannot be changed.
public static
public static
public static
public static
public static
public static Extends v> m)
9. OtherThe Collections tool class features more than these, as well as methods such as fill (), rotate (), Max (), Min (), and so on. It is not possible to remember all of a sudden, use the time to check the AP
protects the key with a password.
Another tool, Jarsigner, produces or verifies the digital signature in a Java aRchive (JAR file) using the information in KeyStore.
The KeyStore has two different entrances:
1. Key entry: Stores very sensitive encrypted key information and is stored in a protected format to prevent unauthorized access. The key stored in this form is the secret key, or a private key to t
Original: Java object any deep clone clone tool class shareSource code: Http://www.zuidaima.com/share/1550463408114688.htmJava object any deep clone clone tool class sharePackage com.zuidaima.n_app.util; Import Java.lang.reflect.Constructor; Import Java.lang.reflect.Field; Import java.lang.reflect.InvocationTargetException; Import Java.lang.reflect.Modifier;
relationship that is represented in UML with a solid line with arrows pointing to the contained class. In the you may find that there are 1 online. 1, this is a description of the inclusion relationship. There are several types of UML classes.1..1 表示另一个类的一个对象只与该类的一个对象有关系0..* 表示另一个类的一个对象与该类的零个或多个对象有关系1..* 表示另一个类的一个对象与该类的一个或多个对象有关系0..1 表示另一个类的一个对象没有或只与该类的一个对象有关系* 任意多个对象关联Aggregation (Aggregation) relationshipsAn aggregation relationship is a relationship between a whole and a part, but some can e
subtask thread), but cannot be performed until the blocking thread is freed.The following example shows the use of Cyclicbarrier. 1 Import java.util.concurrent.BrokenBarrierException; 2 Import Java.util.concurrent.CyclicBarrier; 3 4/** 5 * @author Bridge 6 */7 public class Cyclicbarriertest {8 9 public static void Main (string[] args) {1 0 int N = 4;11 Cyclicbarrier cyclicbarrier = new Cyclicbarrier (n); (int i = 0; i Execution resultsthread-1 Ready!thread-3 Ready! thread-2 Ready! thread-0 Re
http://www.benf.org/other/cfr/Download the anti-compilation tool@echo OffSET Home=%cd%REM Specifies the directory set that holds the jar package Jar_dir=%home%\jardirrem http://www.benf.org/other/cfr/Download the anti-compilation toolSET cfr_version=cfr_0_132if "%1"=="" ( Echotarget directory not set, use default directory Jardir)Else(SET jar_dir=%1)ifNot exist%jar_dir% ( EchoJardirNot exist:%jar_dir%pause exit) SET Outpath=""CD%jar_dir% for/F"de
); -}------------------------------------------------------------------------------------------------------* Objectmax (Collection): Returns the largest element in a given set based on the natural order of the elementObjectmax (Collection,comparator): Returns the largest element in a given set, based on the order specified by ComparatorObjectmin (Collection)Objectmin (Collection,comparator)Intfrequency (Collection,object): Returns the number of occurrences of the specified element in the specifi
What is SLF4J?SLF4J is a packaging class, a typical facade model of the tool, the user presents a unified operation, compatible with a variety of mainstream logging framework, typical LOG4J/JDK Logging/nop/simple/jakarta commons logging and so on.There is a picture of the image of the visual display of this knowledge:Here are some examples of MAVEN configurationsLogback-classic
dependency> groupid>ch.qos.logbackgroupid> artifactid>logback-clas
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.