Brief introduction
I also fret that my blog writing format sucks, title + code format. Because the daily curriculum is relatively large, there is no time to spend on the writing format, such as not accustomed to please forgive me. I insist
It's really hard to get a name that sums up all the content of this blog.Java is a magical language that can be said to be used everywhere as a learningJava can be used to develop mobile PC desktop Terminal Server Web front end programThe other 3
The syntax of crontabin each of these fields, you can also use the following special characters :asterisk (*): represents all possible values, such as the month field if it is an asterisk, the command action is executed monthly after the constraints
public class Test { Private String name;//member variable, also global variable public void ChangeName () { String n = "Tomoya";//n is a local variable name = N; }}In general, defined in the class, that is, the name of the position,
The following is a one-to-two communication programming implementation, and will continue to learn a server to listen to the implementation of multiple clients.The main steps I've learnedFirst step: Create a new socket object with a specific port (e.
Static represents the meaning of "global" or "static", which modifies member variables and member methods, and can also form statically static blocks of code, but there is no concept of global variables in the Java language. member variables and
Java 5.0 adds Concurrenthashmap, a replacement for synchronized hash-based Map implementations, and Copyonwritearraylist, a replacement for synchronized List implementations for cases where traversal is the D Ominant operation. The new
The HashMap and Hashtable two classes implement the map interface, which holds the k-v pair (Key-value pair), and HashSet implements the set interface, which is similar in nature to a setHashtable and HashMap differencesFirst, the inherited parent
Encryption and digital certificates
Encryption and digital certificates
Concept
Digital summary
Key encryption Technology
Private key (symmetric encryption)
Public key (Asymmetric encryption)
Semaphore is a count semaphore. Conceptually, semaphores maintain a set of licenses. If necessary, each one is blocked before the license is available acquire() , and then the license is acquired. Each release() add a license, which may release a
This section is mainly about the implementation of read-write locks.As mentioned in the previous section, Readwritelock appears to have two locks: readlock/writelock. If it's really two locks, how do they affect each other?In fact, the realization
When writing a Java program, a class (or interface) is typically placed in a separate Java file, and the class name is the same as the file name (if the class is public, the class name must be the same as the file name; non-public, no mandatory
Understanding the JVM virtual Machine principle is a necessary step for every Java programmer to practice. But because there are a lot of things in the JVM virtual machine to tell the relatively broad, in the current exposure to the JVM virtual
Face object listener inherit interface settings window set picture Settings button set text box random numberCraps Gambling Game Cast 2 dice, the first round 7, 11 for the player to win, 2,3,12 for the banker win, then the player to lose 7, the same
OverviewLog technology provides an important support for the quality and service of the product. The JDK has been added to the logging mechanism since version 1.4, which facilitates Java developers. However, this logging mechanism is based on the
Serial Old collector for JAVA Garbage Collector and serial for garbage collection
The Serial Old collector is a type of Garbage Collector in Java virtual machines. It is an Old version of the Serial collector. It is also a single-thread collector
[Elasticsearch] adjacent match (3)-performance, associated word query and ShinglesImprove Performance
Phrase and closeness queries are more expensive than simple match queries. The match query only checks whether the entry exists in the Inverted
Java basic knowledge traps (9) and java basic knowledge traps
This article is published on my blog.
Today I want to talk about JAVA multithreading. If you have any errors, please point them out. As we all know, JAVA processing on the server also has
JVM exploration-Memory Management (1), jvm exploration Memory Management
The first article in this series is expected to have two or three cases at the end of this series.
Java is different from C and C ++. Java does not need Coder for manual
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.