SlideShare a Scribd company logo
1 of 33
Download to read offline
Introducing Scala
IQSS Tech-Talk, 2013-06-27
Michael Bar-Sinai
Sunday, 4 August, 13
Based in part on Scala for the impatient, Scala for
java programmers tutorial at Typesafe.com, and Prof.
Mayer Goldberg advanced programming class in
Ben-Gurion university of the Negev, Israel
Sunday, 4 August, 13
In a Few Bullets
Developed in 2001, by Martin Odersky, EPFL Professor
Runs on the JVM (also, CLR)
Statically typed and with concise syntax
Object oriented and functional
Clean and elegant design
Strong collection framework
Expression-only, DSL friendly, advanced features
Sunday, 4 August, 13
In a Few Bullets
Developed in 2001, by Martin Odersky, EPFL Professor
Runs on the JVM (also, CLR)
Statically typed and with concise syntax
Object oriented and functional
Clean and elegant design
Strong collection framework
Expression-only, DSL friendly, advanced features
Sunday, 4 August, 13
In a Few Bullets
Developed in 2001, by Martin Odersky, EPFL Professor
Runs on the JVM (also, CLR)
Statically typed and with concise syntax
Object oriented and functional
Clean and elegant design
Strong collection framework
Expression-only, DSL friendly, advanced features
Sunday, 4 August, 13
Sunday, 4 August, 13
What is a...
Computation?
Sunday, 4 August, 13
What is a computation?
PROCEDURAL
Finite automaton working on
an infinite tape
...0 1 110101110
Sunday, 4 August, 13
What is a computation?
PROCEDURAL FUNCTIONAL
Finite automaton working on
an infinite tape
...0 1 110101110
Data flowing through a
program
f(x) /2 R
f(6) 2 R
Sunday, 4 August, 13
REPL
SEE ACCOMPANYING FILES
Sunday, 4 August, 13
List Operations
Run some binary operator on the list items and an
intermediate results
fold, reduce, scan
Concurrent: aggregate,
reduce
ndlrowolleH
Sunday, 4 August, 13
List Operations
Run some binary operator on the list items and an
intermediate results
fold, reduce, scan
Concurrent: aggregate,
reduce
ndlrowolleH
Sunday, 4 August, 13
Expressions vs. Statements
STATEMENT
if ( map contains x ) {
map(x) = computeNewX(map(x))
} else {
map(x) = computeNewX( 0 )
}
Sunday, 4 August, 13
Expressions vs. Statements
STATEMENT
EXPRESSION
if ( map contains x ) {
map(x) = computeNewX(map(x))
} else {
map(x) = computeNewX( 0 )
}
map(x) = if ( map contains x )
computeNewX( map(x) )
else
computeNewX( 0 )
Sunday, 4 August, 13
Expressions vs. Statements
STATEMENT
EXPRESSION
if ( map contains x ) {
map(x) = computeNewX(map(x))
} else {
map(x) = computeNewX( 0 )
}
map(x) = if ( map contains x )
computeNewX( map(x) )
else
computeNewX( 0 )
ACTUAL SCALA CODE
map(x) = computeNewX( map.getOrElse(x,0) )
Sunday, 4 August, 13
Class Syntax
Classes have a primary constructor that is part of
the class definition
Clients can’t distinguish between getters and
direct field access
Better privacy control
Sunday, 4 August, 13
Classes
class Person( var name:String, val id:Int ) {
! def greet = "Hello, my name is %s".format(name)
}
class Person2( name:String, val id:Int ) {
! def greet = "Hello, my name is %s".format(name)
}
class Person3( name:String, val id:Int ) {
! val greet = "Hello, my name is %s".format(name)
}
Sunday, 4 August, 13
Classes (cont.)
class Person4( aName:String, anId:Int ) {
! private val id = anId
! private[this] var pName = aName
! def name = pName
! def name_=( newName:String ) { pName = newName }
! override def toString = "[Person4 id:%d name:%s]".format(id,name)
}
Sunday, 4 August, 13
Multiple Inheritance
Would have been nice if it worked
It doesn’t
Java allowed only multiple
inheritance of interfaces
JDK8 would update this, slightly
Scala simulates multiple inheritance
using type linearization
Would have been nice if it worked
...it mostly does
A
B1
B2
C
A
B1
B2
C
Sunday, 4 August, 13
Traits
Almost like class:
Can have fields, protocols and behavior
(implementations)
Can’t have constructor parameters
Can require minimal interface from
implementing classes
Class can extend as many as needed
Types are generated at declaration point
Sunday, 4 August, 13
Objects
and the absence of static
Replace the static parts in java
Manual declaration of a runtime singletons
Classes can have “companion objects” that have
the same name
Good place for utility methods or special “apply”
methods
App trait allows script-like behavior
Sunday, 4 August, 13
Pattern Matching
Control structure that allows
switching
type inquiry
variable de-composition
Specialized Classes optimized for this
Sunday, 4 August, 13
Simple Pattern Matching
def toFuzzyStringInt( i:Int ) = i match {
! case 0 => "Nada"
! case 1 => "One"
! case 2 => "A Pair"
! case 12 => "a dozen"
! case _ if i<0 => "Less that zero"
! case _ => "%,d".format(i)
}
Sunday, 4 August, 13
Switch by Type
def prettyPrint( a:Any ) = a match {
! case i:Int => "%,d".format(i)
! case s:String => "[%s]".format(s)
! case sym:Symbol => ":%s".format(sym)
! case _ => a.toString
}
Sunday, 4 August, 13
Decomposition
First, meet the case class:
Regular class, but with immutable declared fields,
toString, equals and hashCode automatically
defined
sealed abstract class Tree
case class Sum( l:Tree, r:Tree ) extends Tree
case class Var( n:String ) extends Tree
case class Con( v:Int ) extends Tree
Sunday, 4 August, 13
Decomposition
def evalTree( t:Tree, e:Map[String,Int] ): Int =
t match {
! case Sum(l,r) => evalTree(l, e) + evalTree(r,e)
! case Var( n ) => e(n)
! case Con( i ) => i
}
Allows downcasting, accessing sub-classes fields and
varying actions based on the class of the parameter, in a
single syntactical maneuver
Sunday, 4 August, 13
... In the real world
(merged,original) match {
case ( Pass(_), ( _, _) ) => true
case ( Unfixable(_), ( _, _) ) => false
case ( Fixable(_,t,_), (t1,t2) ) => f.ld<ld(t1)+ld(t2)
}
Given two strings, we need to decide whether it is more likely that they are
two separate words or one broken word
Sunday, 4 August, 13
... In the real world
(merged,original) match {
case ( Pass(_), ( _, _) ) => true
case ( Unfixable(_), ( _, _) ) => false
case ( Fixable(_,t,_), (t1,t2) ) => f.ld<ld(t1)+ld(t2)
}
ere are two ways of constructing a software design: One way is to make it so
simple that there are obviously no deficiencies, and the other way is to make it
so complicated that there are no obvious deficiencies. e first method is far
more difficult.
-- C. A. R. Hoare, Turing Award lecture, 1980
Given two strings, we need to decide whether it is more likely that they are
two separate words or one broken word
Sunday, 4 August, 13
Option[T]
And the death of the NullPointerException
Indicates possibly missing values
Has two implementations: None and Some(t)
“Collection of at most one item”
Convention more than a language feature
Sunday, 4 August, 13
Functions as values
Creating new functions from existing ones
Powerful tool, but can get messy
Allows for DSL creation
def bind1( f:(Int,Int)=>Int, v:Int ) =
(a:Int)=>f(a,v)
Sunday, 4 August, 13
Not Covered
Creation of DSLs
Implicit conversions
Continuations
Frameworks
XML
Parsers/Combinators
Macros
Annotations
Genericity
Type System
Actors
Regular Expressions
Extractors
... many more
Sunday, 4 August, 13
Pointers
www.scala-lang.org
Typesafe.com
Scala for the Impatient, by Cay Horstmann (http://
horstmann.com/scala/)
First chapters available after registering with at Typesafe’s site
(google)
Sunday, 4 August, 13
Introducing Scala
IQSS Tech-Talk, 2013-06-27
Michael Bar-Sinai
THANKS
Sunday, 4 August, 13

More Related Content

What's hot

COCOMO Model in software project management
COCOMO Model in software project managementCOCOMO Model in software project management
COCOMO Model in software project managementSyed Hassan Ali
 
Importance of software architecture 1
Importance of software architecture 1Importance of software architecture 1
Importance of software architecture 1Dr Reeja S R
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and SecurityShreyans Jain
 
Waterfall and spiral model
Waterfall and spiral modelWaterfall and spiral model
Waterfall and spiral modelyenohhoney
 
Pressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-modelsPressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-modelszeal123123
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software EngineeringSibel Kuzgun AKIN
 
Fl 2018 sample questions exam a v1.3 answers
Fl 2018 sample questions exam a v1.3 answersFl 2018 sample questions exam a v1.3 answers
Fl 2018 sample questions exam a v1.3 answersNeeraj Kumar Singh
 
Chapter 2 - Performance Measurement Fundamentals
Chapter 2 - Performance Measurement FundamentalsChapter 2 - Performance Measurement Fundamentals
Chapter 2 - Performance Measurement FundamentalsNeeraj Kumar Singh
 
Ctfl 2018 sample questions exam b v1.1 answers
Ctfl 2018 sample questions exam b v1.1 answersCtfl 2018 sample questions exam b v1.1 answers
Ctfl 2018 sample questions exam b v1.1 answersNeeraj Kumar Singh
 
Ch3 Design Considerations (Steel Bridges تصميم الكباري المعدنية & Prof. Dr. M...
Ch3 Design Considerations (Steel Bridges تصميم الكباري المعدنية & Prof. Dr. M...Ch3 Design Considerations (Steel Bridges تصميم الكباري المعدنية & Prof. Dr. M...
Ch3 Design Considerations (Steel Bridges تصميم الكباري المعدنية & Prof. Dr. M...Hossam Shafiq II
 
Evolutionary process models se.ppt
Evolutionary process models se.pptEvolutionary process models se.ppt
Evolutionary process models se.pptbhadjaashvini1
 
Staad.pro2007 full course
Staad.pro2007 full courseStaad.pro2007 full course
Staad.pro2007 full courseRamil Artates
 

What's hot (20)

CTFL chapter 06
CTFL chapter 06CTFL chapter 06
CTFL chapter 06
 
COCOMO Model in software project management
COCOMO Model in software project managementCOCOMO Model in software project management
COCOMO Model in software project management
 
Software Quality Metrics
Software Quality MetricsSoftware Quality Metrics
Software Quality Metrics
 
Importance of software architecture 1
Importance of software architecture 1Importance of software architecture 1
Importance of software architecture 1
 
Biometric Systems and Security
Biometric Systems and SecurityBiometric Systems and Security
Biometric Systems and Security
 
Waterfall and spiral model
Waterfall and spiral modelWaterfall and spiral model
Waterfall and spiral model
 
Pressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-modelsPressman ch-3-prescriptive-process-models
Pressman ch-3-prescriptive-process-models
 
Introduction to Software Engineering
Introduction to Software EngineeringIntroduction to Software Engineering
Introduction to Software Engineering
 
Software Testing
Software TestingSoftware Testing
Software Testing
 
Fl 2018 sample questions exam a v1.3 answers
Fl 2018 sample questions exam a v1.3 answersFl 2018 sample questions exam a v1.3 answers
Fl 2018 sample questions exam a v1.3 answers
 
Software Engineering.pptx
Software Engineering.pptxSoftware Engineering.pptx
Software Engineering.pptx
 
Chapter 2 - Performance Measurement Fundamentals
Chapter 2 - Performance Measurement FundamentalsChapter 2 - Performance Measurement Fundamentals
Chapter 2 - Performance Measurement Fundamentals
 
Ctfl 2018 sample questions exam b v1.1 answers
Ctfl 2018 sample questions exam b v1.1 answersCtfl 2018 sample questions exam b v1.1 answers
Ctfl 2018 sample questions exam b v1.1 answers
 
Static analysis
Static analysisStatic analysis
Static analysis
 
Quality Assurance in Software Ind.
Quality Assurance in Software Ind.Quality Assurance in Software Ind.
Quality Assurance in Software Ind.
 
Software design
Software designSoftware design
Software design
 
Ch3 Design Considerations (Steel Bridges تصميم الكباري المعدنية & Prof. Dr. M...
Ch3 Design Considerations (Steel Bridges تصميم الكباري المعدنية & Prof. Dr. M...Ch3 Design Considerations (Steel Bridges تصميم الكباري المعدنية & Prof. Dr. M...
Ch3 Design Considerations (Steel Bridges تصميم الكباري المعدنية & Prof. Dr. M...
 
Evolutionary process models se.ppt
Evolutionary process models se.pptEvolutionary process models se.ppt
Evolutionary process models se.ppt
 
Analysis modeling
Analysis modelingAnalysis modeling
Analysis modeling
 
Staad.pro2007 full course
Staad.pro2007 full courseStaad.pro2007 full course
Staad.pro2007 full course
 

Similar to Invitation to Scala

Scala Talk at FOSDEM 2009
Scala Talk at FOSDEM 2009Scala Talk at FOSDEM 2009
Scala Talk at FOSDEM 2009Martin Odersky
 
The Scala Programming Language
The Scala Programming LanguageThe Scala Programming Language
The Scala Programming Languageleague
 
Scala - en bedre og mere effektiv Java?
Scala - en bedre og mere effektiv Java?Scala - en bedre og mere effektiv Java?
Scala - en bedre og mere effektiv Java?Jesper Kamstrup Linnet
 
Introduction to Scala for JCConf Taiwan
Introduction to Scala for JCConf TaiwanIntroduction to Scala for JCConf Taiwan
Introduction to Scala for JCConf TaiwanJimin Hsieh
 
Lambda? You Keep Using that Letter
Lambda? You Keep Using that LetterLambda? You Keep Using that Letter
Lambda? You Keep Using that LetterKevlin Henney
 
2016-11-12 02 Николай Линкер. Чему Java может поучиться у Haskell и наоборот
2016-11-12 02 Николай Линкер. Чему Java может поучиться у Haskell и наоборот2016-11-12 02 Николай Линкер. Чему Java может поучиться у Haskell и наоборот
2016-11-12 02 Николай Линкер. Чему Java может поучиться у Haskell и наоборотОмские ИТ-субботники
 
Stepping Up : A Brief Intro to Scala
Stepping Up : A Brief Intro to ScalaStepping Up : A Brief Intro to Scala
Stepping Up : A Brief Intro to ScalaDerek Chen-Becker
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture ThreeAngelo Corsaro
 
Ajax and JavaScript Bootcamp
Ajax and JavaScript BootcampAjax and JavaScript Bootcamp
Ajax and JavaScript BootcampAndreCharland
 
Data structures cs301 power point slides lecture 01
Data structures   cs301 power point slides lecture 01Data structures   cs301 power point slides lecture 01
Data structures cs301 power point slides lecture 01shaziabibi5
 
A Brief Introduction to Scala for Java Developers
A Brief Introduction to Scala for Java DevelopersA Brief Introduction to Scala for Java Developers
A Brief Introduction to Scala for Java DevelopersMiles Sabin
 
Miles Sabin Introduction To Scala For Java Developers
Miles Sabin Introduction To Scala For Java DevelopersMiles Sabin Introduction To Scala For Java Developers
Miles Sabin Introduction To Scala For Java DevelopersSkills Matter
 
scalaliftoff2009.pdf
scalaliftoff2009.pdfscalaliftoff2009.pdf
scalaliftoff2009.pdfHiroshi Ono
 
scalaliftoff2009.pdf
scalaliftoff2009.pdfscalaliftoff2009.pdf
scalaliftoff2009.pdfHiroshi Ono
 
scalaliftoff2009.pdf
scalaliftoff2009.pdfscalaliftoff2009.pdf
scalaliftoff2009.pdfHiroshi Ono
 
scalaliftoff2009.pdf
scalaliftoff2009.pdfscalaliftoff2009.pdf
scalaliftoff2009.pdfHiroshi Ono
 
Programming in Scala: Notes
Programming in Scala: NotesProgramming in Scala: Notes
Programming in Scala: NotesRoberto Casadei
 

Similar to Invitation to Scala (20)

R language
R languageR language
R language
 
Scala Talk at FOSDEM 2009
Scala Talk at FOSDEM 2009Scala Talk at FOSDEM 2009
Scala Talk at FOSDEM 2009
 
The Scala Programming Language
The Scala Programming LanguageThe Scala Programming Language
The Scala Programming Language
 
Scala - en bedre og mere effektiv Java?
Scala - en bedre og mere effektiv Java?Scala - en bedre og mere effektiv Java?
Scala - en bedre og mere effektiv Java?
 
Scala introduction
Scala introductionScala introduction
Scala introduction
 
Introduction to Scala for JCConf Taiwan
Introduction to Scala for JCConf TaiwanIntroduction to Scala for JCConf Taiwan
Introduction to Scala for JCConf Taiwan
 
Effective Scala @ Jfokus
Effective Scala @ JfokusEffective Scala @ Jfokus
Effective Scala @ Jfokus
 
Lambda? You Keep Using that Letter
Lambda? You Keep Using that LetterLambda? You Keep Using that Letter
Lambda? You Keep Using that Letter
 
2016-11-12 02 Николай Линкер. Чему Java может поучиться у Haskell и наоборот
2016-11-12 02 Николай Линкер. Чему Java может поучиться у Haskell и наоборот2016-11-12 02 Николай Линкер. Чему Java может поучиться у Haskell и наоборот
2016-11-12 02 Николай Линкер. Чему Java может поучиться у Haskell и наоборот
 
Stepping Up : A Brief Intro to Scala
Stepping Up : A Brief Intro to ScalaStepping Up : A Brief Intro to Scala
Stepping Up : A Brief Intro to Scala
 
Programming in Scala - Lecture Three
Programming in Scala - Lecture ThreeProgramming in Scala - Lecture Three
Programming in Scala - Lecture Three
 
Ajax and JavaScript Bootcamp
Ajax and JavaScript BootcampAjax and JavaScript Bootcamp
Ajax and JavaScript Bootcamp
 
Data structures cs301 power point slides lecture 01
Data structures   cs301 power point slides lecture 01Data structures   cs301 power point slides lecture 01
Data structures cs301 power point slides lecture 01
 
A Brief Introduction to Scala for Java Developers
A Brief Introduction to Scala for Java DevelopersA Brief Introduction to Scala for Java Developers
A Brief Introduction to Scala for Java Developers
 
Miles Sabin Introduction To Scala For Java Developers
Miles Sabin Introduction To Scala For Java DevelopersMiles Sabin Introduction To Scala For Java Developers
Miles Sabin Introduction To Scala For Java Developers
 
scalaliftoff2009.pdf
scalaliftoff2009.pdfscalaliftoff2009.pdf
scalaliftoff2009.pdf
 
scalaliftoff2009.pdf
scalaliftoff2009.pdfscalaliftoff2009.pdf
scalaliftoff2009.pdf
 
scalaliftoff2009.pdf
scalaliftoff2009.pdfscalaliftoff2009.pdf
scalaliftoff2009.pdf
 
scalaliftoff2009.pdf
scalaliftoff2009.pdfscalaliftoff2009.pdf
scalaliftoff2009.pdf
 
Programming in Scala: Notes
Programming in Scala: NotesProgramming in Scala: Notes
Programming in Scala: Notes
 

More from Michael Bar-Sinai

Sharing Sensitive Data With Confidence: The DataTags system
Sharing Sensitive Data With Confidence: The DataTags systemSharing Sensitive Data With Confidence: The DataTags system
Sharing Sensitive Data With Confidence: The DataTags systemMichael Bar-Sinai
 
DataTags, The Tags Toolset, and Dataverse Integration
DataTags, The Tags Toolset, and Dataverse IntegrationDataTags, The Tags Toolset, and Dataverse Integration
DataTags, The Tags Toolset, and Dataverse IntegrationMichael Bar-Sinai
 

More from Michael Bar-Sinai (6)

BPjs deep dive 2019
BPjs deep dive 2019BPjs deep dive 2019
BPjs deep dive 2019
 
BPjs for IoT class
BPjs for IoT classBPjs for IoT class
BPjs for IoT class
 
Deep Dive into BPjs
Deep Dive into BPjsDeep Dive into BPjs
Deep Dive into BPjs
 
Sharing Sensitive Data With Confidence: The DataTags system
Sharing Sensitive Data With Confidence: The DataTags systemSharing Sensitive Data With Confidence: The DataTags system
Sharing Sensitive Data With Confidence: The DataTags system
 
DataTags, The Tags Toolset, and Dataverse Integration
DataTags, The Tags Toolset, and Dataverse IntegrationDataTags, The Tags Toolset, and Dataverse Integration
DataTags, The Tags Toolset, and Dataverse Integration
 
Draw More, Work Less
Draw More, Work LessDraw More, Work Less
Draw More, Work Less
 

Recently uploaded

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 

Recently uploaded (20)

Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 

Invitation to Scala

  • 1. Introducing Scala IQSS Tech-Talk, 2013-06-27 Michael Bar-Sinai Sunday, 4 August, 13
  • 2. Based in part on Scala for the impatient, Scala for java programmers tutorial at Typesafe.com, and Prof. Mayer Goldberg advanced programming class in Ben-Gurion university of the Negev, Israel Sunday, 4 August, 13
  • 3. In a Few Bullets Developed in 2001, by Martin Odersky, EPFL Professor Runs on the JVM (also, CLR) Statically typed and with concise syntax Object oriented and functional Clean and elegant design Strong collection framework Expression-only, DSL friendly, advanced features Sunday, 4 August, 13
  • 4. In a Few Bullets Developed in 2001, by Martin Odersky, EPFL Professor Runs on the JVM (also, CLR) Statically typed and with concise syntax Object oriented and functional Clean and elegant design Strong collection framework Expression-only, DSL friendly, advanced features Sunday, 4 August, 13
  • 5. In a Few Bullets Developed in 2001, by Martin Odersky, EPFL Professor Runs on the JVM (also, CLR) Statically typed and with concise syntax Object oriented and functional Clean and elegant design Strong collection framework Expression-only, DSL friendly, advanced features Sunday, 4 August, 13
  • 8. What is a computation? PROCEDURAL Finite automaton working on an infinite tape ...0 1 110101110 Sunday, 4 August, 13
  • 9. What is a computation? PROCEDURAL FUNCTIONAL Finite automaton working on an infinite tape ...0 1 110101110 Data flowing through a program f(x) /2 R f(6) 2 R Sunday, 4 August, 13
  • 11. List Operations Run some binary operator on the list items and an intermediate results fold, reduce, scan Concurrent: aggregate, reduce ndlrowolleH Sunday, 4 August, 13
  • 12. List Operations Run some binary operator on the list items and an intermediate results fold, reduce, scan Concurrent: aggregate, reduce ndlrowolleH Sunday, 4 August, 13
  • 13. Expressions vs. Statements STATEMENT if ( map contains x ) { map(x) = computeNewX(map(x)) } else { map(x) = computeNewX( 0 ) } Sunday, 4 August, 13
  • 14. Expressions vs. Statements STATEMENT EXPRESSION if ( map contains x ) { map(x) = computeNewX(map(x)) } else { map(x) = computeNewX( 0 ) } map(x) = if ( map contains x ) computeNewX( map(x) ) else computeNewX( 0 ) Sunday, 4 August, 13
  • 15. Expressions vs. Statements STATEMENT EXPRESSION if ( map contains x ) { map(x) = computeNewX(map(x)) } else { map(x) = computeNewX( 0 ) } map(x) = if ( map contains x ) computeNewX( map(x) ) else computeNewX( 0 ) ACTUAL SCALA CODE map(x) = computeNewX( map.getOrElse(x,0) ) Sunday, 4 August, 13
  • 16. Class Syntax Classes have a primary constructor that is part of the class definition Clients can’t distinguish between getters and direct field access Better privacy control Sunday, 4 August, 13
  • 17. Classes class Person( var name:String, val id:Int ) { ! def greet = "Hello, my name is %s".format(name) } class Person2( name:String, val id:Int ) { ! def greet = "Hello, my name is %s".format(name) } class Person3( name:String, val id:Int ) { ! val greet = "Hello, my name is %s".format(name) } Sunday, 4 August, 13
  • 18. Classes (cont.) class Person4( aName:String, anId:Int ) { ! private val id = anId ! private[this] var pName = aName ! def name = pName ! def name_=( newName:String ) { pName = newName } ! override def toString = "[Person4 id:%d name:%s]".format(id,name) } Sunday, 4 August, 13
  • 19. Multiple Inheritance Would have been nice if it worked It doesn’t Java allowed only multiple inheritance of interfaces JDK8 would update this, slightly Scala simulates multiple inheritance using type linearization Would have been nice if it worked ...it mostly does A B1 B2 C A B1 B2 C Sunday, 4 August, 13
  • 20. Traits Almost like class: Can have fields, protocols and behavior (implementations) Can’t have constructor parameters Can require minimal interface from implementing classes Class can extend as many as needed Types are generated at declaration point Sunday, 4 August, 13
  • 21. Objects and the absence of static Replace the static parts in java Manual declaration of a runtime singletons Classes can have “companion objects” that have the same name Good place for utility methods or special “apply” methods App trait allows script-like behavior Sunday, 4 August, 13
  • 22. Pattern Matching Control structure that allows switching type inquiry variable de-composition Specialized Classes optimized for this Sunday, 4 August, 13
  • 23. Simple Pattern Matching def toFuzzyStringInt( i:Int ) = i match { ! case 0 => "Nada" ! case 1 => "One" ! case 2 => "A Pair" ! case 12 => "a dozen" ! case _ if i<0 => "Less that zero" ! case _ => "%,d".format(i) } Sunday, 4 August, 13
  • 24. Switch by Type def prettyPrint( a:Any ) = a match { ! case i:Int => "%,d".format(i) ! case s:String => "[%s]".format(s) ! case sym:Symbol => ":%s".format(sym) ! case _ => a.toString } Sunday, 4 August, 13
  • 25. Decomposition First, meet the case class: Regular class, but with immutable declared fields, toString, equals and hashCode automatically defined sealed abstract class Tree case class Sum( l:Tree, r:Tree ) extends Tree case class Var( n:String ) extends Tree case class Con( v:Int ) extends Tree Sunday, 4 August, 13
  • 26. Decomposition def evalTree( t:Tree, e:Map[String,Int] ): Int = t match { ! case Sum(l,r) => evalTree(l, e) + evalTree(r,e) ! case Var( n ) => e(n) ! case Con( i ) => i } Allows downcasting, accessing sub-classes fields and varying actions based on the class of the parameter, in a single syntactical maneuver Sunday, 4 August, 13
  • 27. ... In the real world (merged,original) match { case ( Pass(_), ( _, _) ) => true case ( Unfixable(_), ( _, _) ) => false case ( Fixable(_,t,_), (t1,t2) ) => f.ld<ld(t1)+ld(t2) } Given two strings, we need to decide whether it is more likely that they are two separate words or one broken word Sunday, 4 August, 13
  • 28. ... In the real world (merged,original) match { case ( Pass(_), ( _, _) ) => true case ( Unfixable(_), ( _, _) ) => false case ( Fixable(_,t,_), (t1,t2) ) => f.ld<ld(t1)+ld(t2) } ere are two ways of constructing a software design: One way is to make it so simple that there are obviously no deficiencies, and the other way is to make it so complicated that there are no obvious deficiencies. e first method is far more difficult. -- C. A. R. Hoare, Turing Award lecture, 1980 Given two strings, we need to decide whether it is more likely that they are two separate words or one broken word Sunday, 4 August, 13
  • 29. Option[T] And the death of the NullPointerException Indicates possibly missing values Has two implementations: None and Some(t) “Collection of at most one item” Convention more than a language feature Sunday, 4 August, 13
  • 30. Functions as values Creating new functions from existing ones Powerful tool, but can get messy Allows for DSL creation def bind1( f:(Int,Int)=>Int, v:Int ) = (a:Int)=>f(a,v) Sunday, 4 August, 13
  • 31. Not Covered Creation of DSLs Implicit conversions Continuations Frameworks XML Parsers/Combinators Macros Annotations Genericity Type System Actors Regular Expressions Extractors ... many more Sunday, 4 August, 13
  • 32. Pointers www.scala-lang.org Typesafe.com Scala for the Impatient, by Cay Horstmann (http:// horstmann.com/scala/) First chapters available after registering with at Typesafe’s site (google) Sunday, 4 August, 13
  • 33. Introducing Scala IQSS Tech-Talk, 2013-06-27 Michael Bar-Sinai THANKS Sunday, 4 August, 13