This document provides an overview comparison of key concepts between Java and C# programming languages. It covers differences in language syntax, frameworks, and platforms. Some key differences highlighted include C# using the .NET framework instead of Java's JVM, C# properties instead of getter/setter methods, and C# supporting structs as value types while Java only supports classes as reference types. The document also provides examples of implicit and explicit interface implementation in both languages.
Final requirement in programming niperosmarkings17
Here is an example of a basic for loop in C++:
for (int i = 0; i < 10; i++) {
cout << i << endl;
}
This loop will print the numbers 0 through 9. It initializes the variable i to 0, checks that i is less than 10 for the condition, and increments i by 1 each iteration via i++.
The document discusses implementing new web APIs in Firefox. It outlines how to implement APIs in both JavaScript and C++. For JavaScript implementations, developers need to create interface definition files, manifest files, and JavaScript files. For C++ implementations, developers map interfaces to C++ classes and need to handle memory management using reference counting and the cycle collector. The document provides examples and recommends reaching out to Mozilla developers on IRC for help with implementations.
Cracking JWT tokens: a tale of magic, Node.JS and parallel computingLuciano Mammino
Learn how you can use some JavaScript/Node.js black magic to crack JWT tokens and impersonate other users or escalate privileges. Just add a pinch of ZeroMQ, a dose of parallel computing, a 4 leaf clover, mix everything applying some brute force and you'll get a powerful JWT cracking potion!
This document discusses common concurrency problems in Java and how to address them. It covers issues that can arise from shared mutable data being accessed without proper synchronization between threads, as well as problems related to visibility and atomicity of operations. Specific problems covered include mutable statics, double-checked locking, volatile arrays, and non-atomic operations like incrementing a long. The document provides best practices for locking, wait/notify, thread coordination, and avoiding deadlocks, spin locks, and lock contention.
Final requirement in programming vinsonmonstergeorge
Here are the key steps in a for loop:
1. Initialize a counter variable (often i) to track the number of iterations
2. Define a condition to check on each iteration (often i < 10)
3. Increment/decrement the counter variable after each iteration (often i++)
4. The code block inside the for loop will repeat until the condition is no longer true
So in summary, a for loop allows you to repeat a block of code a specific number of times by initializing/updating a counter variable and checking its value on each iteration.
Недавно работы комитета по стандартизации WG21 были завершены, и документ-черновик C++17 был отправлен на рассмотрение в Международную организацию по стандартизации (ISO). С этого момента технически можно считать, что стандарт C++17 у нас есть. Если вы ещё ознакомились с принятыми изменениями, то сейчас для этого самое время. В докладе будет сделан обзор нововведений. Рассмотрено текущее состояние дел у популярных компиляторов с поддержкой С++17
Final requirement in programming niperosmarkings17
Here is an example of a basic for loop in C++:
for (int i = 0; i < 10; i++) {
cout << i << endl;
}
This loop will print the numbers 0 through 9. It initializes the variable i to 0, checks that i is less than 10 for the condition, and increments i by 1 each iteration via i++.
The document discusses implementing new web APIs in Firefox. It outlines how to implement APIs in both JavaScript and C++. For JavaScript implementations, developers need to create interface definition files, manifest files, and JavaScript files. For C++ implementations, developers map interfaces to C++ classes and need to handle memory management using reference counting and the cycle collector. The document provides examples and recommends reaching out to Mozilla developers on IRC for help with implementations.
Cracking JWT tokens: a tale of magic, Node.JS and parallel computingLuciano Mammino
Learn how you can use some JavaScript/Node.js black magic to crack JWT tokens and impersonate other users or escalate privileges. Just add a pinch of ZeroMQ, a dose of parallel computing, a 4 leaf clover, mix everything applying some brute force and you'll get a powerful JWT cracking potion!
This document discusses common concurrency problems in Java and how to address them. It covers issues that can arise from shared mutable data being accessed without proper synchronization between threads, as well as problems related to visibility and atomicity of operations. Specific problems covered include mutable statics, double-checked locking, volatile arrays, and non-atomic operations like incrementing a long. The document provides best practices for locking, wait/notify, thread coordination, and avoiding deadlocks, spin locks, and lock contention.
Final requirement in programming vinsonmonstergeorge
Here are the key steps in a for loop:
1. Initialize a counter variable (often i) to track the number of iterations
2. Define a condition to check on each iteration (often i < 10)
3. Increment/decrement the counter variable after each iteration (often i++)
4. The code block inside the for loop will repeat until the condition is no longer true
So in summary, a for loop allows you to repeat a block of code a specific number of times by initializing/updating a counter variable and checking its value on each iteration.
Недавно работы комитета по стандартизации WG21 были завершены, и документ-черновик C++17 был отправлен на рассмотрение в Международную организацию по стандартизации (ISO). С этого момента технически можно считать, что стандарт C++17 у нас есть. Если вы ещё ознакомились с принятыми изменениями, то сейчас для этого самое время. В докладе будет сделан обзор нововведений. Рассмотрено текущее состояние дел у популярных компиляторов с поддержкой С++17
After an overview of Qt and its tools, a Hello World application quickly demonstrates the basic principles.
Qt is mainly famous for its intelligent concepts of signals and slots, which is explained together with examples for how to use widgets (UI controls).
At the end, the foundations of the meta-object system and its implications on memory management are explained.
This module follows up the introduction in the "Software Development with Qt" module, plus the Quickstart slides.
Работа с реляционными базами данных в C++corehard_by
The document discusses various C++ libraries for working with relational databases, including native database clients, third-party libraries, and what may be on the horizon. It covers libraries for PostgreSQL, MySQL, Oracle, Microsoft SQL Server, and others. It provides code examples for connecting to a database and executing queries using libraries like QtSQL, Poco::Data, OTL, SOCI, and Sqlpp11. It also mentions a proposed new library called cppstddb that aims to provide a standardized C++ interface for databases.
Braga Blockchain - Ethereum Smart Contracts programmingEmanuel Mota
Intro to blockchain technology. Ethereum differences from Bitcoing. Presentation of some of Ethereum’s smart contracts Programming with its properties and applications on a distributed virtual machine EVM. Demo of solidity programing language. Useful links.
T-121-5300 (2008) User Interface Design 10 - UIMLmniemi
This document discusses user interface markup languages which can be used to describe graphical user interfaces in a declarative way. It provides examples of XUL and WasabiXML, and discusses how markup languages allow user interfaces and tasks to be rendered flexibly across different technologies.
1. The document describes the initialization process of SurfaceFlingerService in Android.
2. SurfaceFlinger is instantiated which creates the main SurfaceFlinger instance. This triggers the initialization of various core Android services.
3. The main display is initialized by creating a DisplayHardware instance and a graphic plane for the display. Shared memory is allocated to share display information.
Rust — это современный, практический, быстрый и безопасный язык программирования. Некоторые говорят, что Rust — это как C++, если бы его писал человек, знающий Haskell.
Система типов Rust решает главную проблему C++ — небезопасность. C++ очень легко сделать ошибки, которые приведут к поломкам (например, use after free). Rust позволяет писать безопасный код, сохраняя при этом выразительность и околонулевые накладные расходы C++. В докладе будут подробно описаны механизмы языка, которые контролируют безопасность программы.
Хотя в данный момент Rust ещё не подходит для использования в продакшне, его всё равно стоит изучать. Во-первых, потому что это очень интересный подход к программированию, а во-вторых, потому что через несколько лет для разработки требовательных к ресурсам программ будет необходим именно Rust или другой похожий инструмент.
The document discusses processes and process interactions. It defines processes as activities executing on a CPU that conceptually run concurrently. Processes can compete for resources or cooperate through synchronization. Basic synchronization techniques discussed include semaphores, which are integers that processes operate on to synchronize access to shared resources through wait and signal operations. Producer-consumer problems are provided as examples where semaphores can be used for processes to cooperate. Event synchronization constructs like wait and post are also summarized for synchronizing on asynchronous events.
OracleCode One 2018: Java 5, 6, 7, 8, 9, 10, 11: What Did You Miss?Henri Tremblay
Those are the slides for my presentation at OracleCode One 2018.
Java is moving faster and faster. A lot of features are not as known as they should be.
Let's review together the ones I think you've missed in old versions.
Then I will kickstart you on 9, 10 and 11 features that you never had time to look at.
The document discusses common concurrency problems in Java like shared mutable state, visibility issues, inconsistent synchronization, and unsafe publication and provides examples of how to properly implement threading concepts like locking, waiting and notifying with synchronization, volatile variables, atomic classes and safe initialization techniques to avoid concurrency bugs. It also cautions against unsafe practices like synchronizing on the wrong objects or misusing threading methods that can lead to deadlocks, race conditions and other concurrency problems.
Kotlin coroutine - the next step for RxJava developer?Artur Latoszewski
Kotlin is a language that is rapidly gaining popularity, among others thanks to cooperation with Java. On the other hand, RxJava has brought us many solutions to problems related to asynchronous code. If everything is so cool, do we need anything else in the Kotlin world? Is Kotlin Coroutine a competition for RxJava?
The document discusses looping statements in programming which allow a block of code to be repeatedly executed until a certain condition is reached. There are three main types of loops: for loops, while loops, and do-while loops. For loops initialize a variable, specify a condition, and update the variable each iteration. While loops continuously execute the code block as long as the condition is true. Do-while loops are similar to while loops but execute the code block at least once even if the condition is false.
This document summarizes Microsoft's Cryptographic API (Crypto API) and techniques for managing session keys. It discusses key concepts like key containers, session keys, and cryptographic service providers (CSPs). It also provides an example of exchanging encrypted session keys between parties and matching session keys to container keys using an exponent-of-one transformation.
- Java RMI allows methods to be called remotely between JVMs on different hosts.
- For an interface to be remote, it must extend the Remote interface. Remote objects implement remote interfaces and extend UnicastRemoteObject.
- Primitive types are passed by value between remote systems, while non-remote objects are serialized and passed by value with references also serialized. Remote objects are passed as remote references called stubs.
The document discusses JavaScript functions and closures. It explains that functions are first-class objects that can be assigned to variables and passed as arguments. Closures allow inner functions to access variables in an outer function's scope even after it has returned. This can be used to emulate private variables or classes. The document provides many examples demonstrating functions, scopes, closures, recursion, and other JavaScript concepts.
JavaFX 8 est disponible depuis mars 2014 et apporte son lot de nouveautés. Gradle est en version 2 depuis juillet 2014. Deux technologies plus que prometteuses: JavaFX donne un coup de jeune au développement d’applications desktop en Java en apportant un navigateur web intégré, le support des WebSockets, de la 3D, et bien d’autres. Gradle est l’outil de d’automatisation de build à la mode, apportant de superbes possibilités par rapport rapport à maven, outil vieillissant, grâce à l’engouement de la communauté vis à vis de cet outil mais aussi par le fait de la technologie utilisée en son sein: groovy. Venez découvrir comment il est possible de réaliser rapidement une application à la mode en JavaFX avec un outil à la mode également. Bref venez à une session trendy.
REX about JavaFX8 used in SlideshowFX. This presentation covers concept from JavaFX as well as technologies like OSGi, Vert.x, LeapMotion, nashorn and friends in order to make them communicate inside one application developed in JavaFX.
This presentation was made at the ElsassJUG
Rust: код может быть одновременно безопасным и быстрым, Степан КольцовYandex
Последние 15 лет между разработчиками на Java и на C++ ведётся спор о том, какой язык программирования хуже — Java или C++. Программы на C++ глючат, падают, и в них утекает память. Программы на Java тормозят и требуют слишком много памяти.
Rust — новый язык программирования, разрабатываемый компанией Mozilla — решает проблемы Java и C++: программы, написанные на Rust, одновременно быстрые и безопасные. Rust является таким же низкоуровневым, close-to-metal языком программирования, как и C++, однако в язык встроены конструкции, позволяющие на этапе компиляции доказывать, что в программе не случится обращения к неинициализированной памяти (механизм borrowed pointers). Большая часть моего рассказа будет посвящена описанию этого механизма.
Treinamento de Qt básico apresentado na semanada de tecnologia do Barão de Mauá (Ribeirão Preto/SP) usando um material provido pela Nokia com modificações.
Being a great engineer is about more than the code you write - working to your strengths and learning from other specialists in your team is what can make you truly shine.
Full Stack Engineering - April 29th, 2014 @ Full Stack Engineering Meetup NYCKarl Stanton
Discussing the nature of Full Stack Engineering practices and standards at Huge. This presentation is focused on web engineers at all points of the spectrum. From seasoned developers through to new comers. Hopefully this provides some interesting insights into how to manage many stacks in an agency world.
After an overview of Qt and its tools, a Hello World application quickly demonstrates the basic principles.
Qt is mainly famous for its intelligent concepts of signals and slots, which is explained together with examples for how to use widgets (UI controls).
At the end, the foundations of the meta-object system and its implications on memory management are explained.
This module follows up the introduction in the "Software Development with Qt" module, plus the Quickstart slides.
Работа с реляционными базами данных в C++corehard_by
The document discusses various C++ libraries for working with relational databases, including native database clients, third-party libraries, and what may be on the horizon. It covers libraries for PostgreSQL, MySQL, Oracle, Microsoft SQL Server, and others. It provides code examples for connecting to a database and executing queries using libraries like QtSQL, Poco::Data, OTL, SOCI, and Sqlpp11. It also mentions a proposed new library called cppstddb that aims to provide a standardized C++ interface for databases.
Braga Blockchain - Ethereum Smart Contracts programmingEmanuel Mota
Intro to blockchain technology. Ethereum differences from Bitcoing. Presentation of some of Ethereum’s smart contracts Programming with its properties and applications on a distributed virtual machine EVM. Demo of solidity programing language. Useful links.
T-121-5300 (2008) User Interface Design 10 - UIMLmniemi
This document discusses user interface markup languages which can be used to describe graphical user interfaces in a declarative way. It provides examples of XUL and WasabiXML, and discusses how markup languages allow user interfaces and tasks to be rendered flexibly across different technologies.
1. The document describes the initialization process of SurfaceFlingerService in Android.
2. SurfaceFlinger is instantiated which creates the main SurfaceFlinger instance. This triggers the initialization of various core Android services.
3. The main display is initialized by creating a DisplayHardware instance and a graphic plane for the display. Shared memory is allocated to share display information.
Rust — это современный, практический, быстрый и безопасный язык программирования. Некоторые говорят, что Rust — это как C++, если бы его писал человек, знающий Haskell.
Система типов Rust решает главную проблему C++ — небезопасность. C++ очень легко сделать ошибки, которые приведут к поломкам (например, use after free). Rust позволяет писать безопасный код, сохраняя при этом выразительность и околонулевые накладные расходы C++. В докладе будут подробно описаны механизмы языка, которые контролируют безопасность программы.
Хотя в данный момент Rust ещё не подходит для использования в продакшне, его всё равно стоит изучать. Во-первых, потому что это очень интересный подход к программированию, а во-вторых, потому что через несколько лет для разработки требовательных к ресурсам программ будет необходим именно Rust или другой похожий инструмент.
The document discusses processes and process interactions. It defines processes as activities executing on a CPU that conceptually run concurrently. Processes can compete for resources or cooperate through synchronization. Basic synchronization techniques discussed include semaphores, which are integers that processes operate on to synchronize access to shared resources through wait and signal operations. Producer-consumer problems are provided as examples where semaphores can be used for processes to cooperate. Event synchronization constructs like wait and post are also summarized for synchronizing on asynchronous events.
OracleCode One 2018: Java 5, 6, 7, 8, 9, 10, 11: What Did You Miss?Henri Tremblay
Those are the slides for my presentation at OracleCode One 2018.
Java is moving faster and faster. A lot of features are not as known as they should be.
Let's review together the ones I think you've missed in old versions.
Then I will kickstart you on 9, 10 and 11 features that you never had time to look at.
The document discusses common concurrency problems in Java like shared mutable state, visibility issues, inconsistent synchronization, and unsafe publication and provides examples of how to properly implement threading concepts like locking, waiting and notifying with synchronization, volatile variables, atomic classes and safe initialization techniques to avoid concurrency bugs. It also cautions against unsafe practices like synchronizing on the wrong objects or misusing threading methods that can lead to deadlocks, race conditions and other concurrency problems.
Kotlin coroutine - the next step for RxJava developer?Artur Latoszewski
Kotlin is a language that is rapidly gaining popularity, among others thanks to cooperation with Java. On the other hand, RxJava has brought us many solutions to problems related to asynchronous code. If everything is so cool, do we need anything else in the Kotlin world? Is Kotlin Coroutine a competition for RxJava?
The document discusses looping statements in programming which allow a block of code to be repeatedly executed until a certain condition is reached. There are three main types of loops: for loops, while loops, and do-while loops. For loops initialize a variable, specify a condition, and update the variable each iteration. While loops continuously execute the code block as long as the condition is true. Do-while loops are similar to while loops but execute the code block at least once even if the condition is false.
This document summarizes Microsoft's Cryptographic API (Crypto API) and techniques for managing session keys. It discusses key concepts like key containers, session keys, and cryptographic service providers (CSPs). It also provides an example of exchanging encrypted session keys between parties and matching session keys to container keys using an exponent-of-one transformation.
- Java RMI allows methods to be called remotely between JVMs on different hosts.
- For an interface to be remote, it must extend the Remote interface. Remote objects implement remote interfaces and extend UnicastRemoteObject.
- Primitive types are passed by value between remote systems, while non-remote objects are serialized and passed by value with references also serialized. Remote objects are passed as remote references called stubs.
The document discusses JavaScript functions and closures. It explains that functions are first-class objects that can be assigned to variables and passed as arguments. Closures allow inner functions to access variables in an outer function's scope even after it has returned. This can be used to emulate private variables or classes. The document provides many examples demonstrating functions, scopes, closures, recursion, and other JavaScript concepts.
JavaFX 8 est disponible depuis mars 2014 et apporte son lot de nouveautés. Gradle est en version 2 depuis juillet 2014. Deux technologies plus que prometteuses: JavaFX donne un coup de jeune au développement d’applications desktop en Java en apportant un navigateur web intégré, le support des WebSockets, de la 3D, et bien d’autres. Gradle est l’outil de d’automatisation de build à la mode, apportant de superbes possibilités par rapport rapport à maven, outil vieillissant, grâce à l’engouement de la communauté vis à vis de cet outil mais aussi par le fait de la technologie utilisée en son sein: groovy. Venez découvrir comment il est possible de réaliser rapidement une application à la mode en JavaFX avec un outil à la mode également. Bref venez à une session trendy.
REX about JavaFX8 used in SlideshowFX. This presentation covers concept from JavaFX as well as technologies like OSGi, Vert.x, LeapMotion, nashorn and friends in order to make them communicate inside one application developed in JavaFX.
This presentation was made at the ElsassJUG
Rust: код может быть одновременно безопасным и быстрым, Степан КольцовYandex
Последние 15 лет между разработчиками на Java и на C++ ведётся спор о том, какой язык программирования хуже — Java или C++. Программы на C++ глючат, падают, и в них утекает память. Программы на Java тормозят и требуют слишком много памяти.
Rust — новый язык программирования, разрабатываемый компанией Mozilla — решает проблемы Java и C++: программы, написанные на Rust, одновременно быстрые и безопасные. Rust является таким же низкоуровневым, close-to-metal языком программирования, как и C++, однако в язык встроены конструкции, позволяющие на этапе компиляции доказывать, что в программе не случится обращения к неинициализированной памяти (механизм borrowed pointers). Большая часть моего рассказа будет посвящена описанию этого механизма.
Treinamento de Qt básico apresentado na semanada de tecnologia do Barão de Mauá (Ribeirão Preto/SP) usando um material provido pela Nokia com modificações.
Being a great engineer is about more than the code you write - working to your strengths and learning from other specialists in your team is what can make you truly shine.
Full Stack Engineering - April 29th, 2014 @ Full Stack Engineering Meetup NYCKarl Stanton
Discussing the nature of Full Stack Engineering practices and standards at Huge. This presentation is focused on web engineers at all points of the spectrum. From seasoned developers through to new comers. Hopefully this provides some interesting insights into how to manage many stacks in an agency world.
Cloud Based Business Application DevelopmentMageCloud
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Full-stack development involves all layers of a software application from the user interface to the database. The document discusses the key considerations for both front-end and back-end development including prioritizing speed, usability, and graceful failure handling in the UI/UX layer and using robust platforms, containers, and Linux skills for managing servers and infrastructure. It also provides best practices for coding, testing, debugging, data modeling, and collaboration between full-stack developers. An example full-stack project using Python, Bootstrap, Angular, and Ionic is also briefly described.
Facebook uses a variety of open source and proprietary technologies to power its massive social network. It relies on technologies like Linux, Apache, PHP, Memcache, Cassandra and more to handle over 500 million users and massive amounts of content shared every day. Facebook has also developed its own technologies like BigPipe, Haystack, HipHop and others to optimize performance and scalability as it continues to grow.
The document discusses different technology stacks that are well-suited for web development, including LAMP (Linux, Apache, MySQL, PHP), MEAN (MongoDB, ExpressJS, AngularJS, NodeJS), and Ruby on Rails. It provides an overview of each stack, highlighting their key components and popular uses. The document also briefly covers content management systems, full stack development, servers, version control tools, testing tools, and integrated development environments that are relevant for web development.
Creating an Interactive Content Strategy that Works with Technologyion interactive
Scott Brinker's presentation from 2016 ContentTech Virtual Event:
Designing Interactive Content to Power Your Marketing Data Strategy
Interactive content—things such as quizzes, assessments, calculators, and configurators—is qualitatively different than the passive content that audiences simply read, watch, or listen to. Interactive content experiences are essentially miniature software programs, or web apps, which have logic and user experience wrapped into their design and operation. Most importantly, they give marketers the ability to collect and leverage a rich set of data that is explicitly volunteered by participants.
Marketers can design interactive content with this data in mind to develop a broader marketing data strategy. This presentation covers frameworks for both the user-facing options that marketers
can apply, to solicit the right kind of data from prospects at different stages of the buyer's journey, and the back-office management of this data through different marketing automation platforms (MAP) and CRM systems.
Topics include:
- Managing explicit "digital dialogue" data vs. implicit "digital body language"
- Applying advanced progressive profiling tactics in interactive content
- Pipelining richer data profiles from marketing to sales through your marketing stack
- Understanding scenarios for programmatic data vs. human-consumable data
Building or redesigning an intranet in 2016? Most intranet managers have an idea of where they want to go, but few have a formalized strategy and roadmap.
Your strategy is a plan about how to take action.
This presentation from intranet expert Steve Bynghall gives you a highly practical framework to derive and articulate your intranet strategy. Whether you’re part of a team with a new intranet project or the business owner of a stale and stagnant intranet, you'll find this presentation valuable..
Highlights:
What is an intranet strategy and why do you need one?
The importance of being objective: the discovery phase
Research sources: data inputs, stakeholder analysis, other sources
Formalizing the strategy and action plan
Communicating and socializing the strategy
The Future Of Work & The Work Of The FutureArturo Pelayo
What Happens When Robots And Machines Learn On Their Own?
This slide deck is an introduction to exponential technologies for an audience of designers and developers of workforce training materials.
The Blended Learning And Technologies Forum (BLAT Forum) is a quarterly event in Auckland, New Zealand that welcomes practitioners, designers and developers of blended learning instructional deliverables across different industries of the New Zealand economy.
The document contains questions and multiple choice answers about C# programming concepts such as access specifiers, exceptions, delegates, operators, assemblies, and deployment projects.
The document discusses reconsidering design patterns and some of their common criticisms. It argues that overuse of patterns can lead to problems like hidden coupling and lack of flexibility. It also discusses alternatives to traditional patterns that allow for easier testing, evolution and flexibility through approaches like dependency injection, composition over inheritance, and separating behavior from structure using strategies. Overall it advocates an approach that focuses on communication, flexibility and reducing coupling rather than rigidly applying patterns as templates.
The JVM JIT compiler and deoptimizer are triggered under certain conditions like method invocation counts, changes in program behavior, and hot spots. The JIT initially compiles code to generate fast machine instructions while the deoptimizer reverts back to interpreted execution if needed.
JVM Mechanics: When Does the JVM JIT & Deoptimize?Doug Hawkins
HotSpot promises to do the "right" thing for us by identifying our hot code and compiling "just-in-time", but how does HotSpot make those decisions?
This presentation aims to detail how HotSpot makes those decisions and how it corrects its mistakes through a series of demos that you run yourself.
The document contains questions and multiple choice answers about C# programming concepts.
Question 6 identifies a problem in a code snippet where a delegate is declared to accept a string parameter, but the methods passed to it do not. The correct code fixes this by removing the string parameter from the methods.
Question 20 asks which code snippet would correctly overload the unary minus operator to negate the values of two integer properties. The correct code negates the property values directly rather than using decrement operators.
Avec la version 9 sortie en septembre 2017, Java appuie sur la pédale ! Le rythme des livraisons passe à une version majeure tous les 6 mois. Java 10 est sorti en mars, prochaine version en septembre. Java 10 apporte le 'var' et l'inférence de type pour les variables locales. D'autres nouveautés sont en préparation : les constantes dynamiques, les classes de données, un nouveau switch à base de lambda, des interfaces fermées, de nouvelles choses du coté des génériques et bien plus encore.
Cela viendra-t-il en 11, 12, 15 ? Ne spéculons pas, mais quand ces nouveautés seront prêtes, elles sortiront en quelques mois. On se propose de présenter ces nouveautés, celles qui sont presque prêtes, celles qui seront prêtes bientôt, et celles qui ne seront pas prêtes avant un moment. Quels seront les impacts sur le langage, sur la JVM et donc sur les performances ? Que cela va-t-il nous apporter au quotidien, en tant que développeurs ? Quels seront les nouveaux patterns ? Voici le programme de cette présentation, avec des slides, du code, de la joie et de la bonne humeur !
Groovy: to Infinity and Beyond -- JavaOne 2010 -- Guillaume LaforgeGuillaume Laforge
The document discusses features and changes in different versions of Groovy, a Java-based scripting language. It summarizes highlights from Groovy 1.6 including improved performance, multiple assignments, optional returns, annotations, AST transformations, the Grape module system, and more. It then discusses new features in Groovy 1.7 such as anonymous inner classes, nested classes, annotations anywhere, Grape improvements, power asserts, an AST viewer, and an AST builder.
The document discusses distributed programming using Java sockets and RMI. It describes UDP and TCP protocols, with UDP being connectionless and less reliable while TCP is connection-oriented. It then covers socket programming using DatagramSocket and DatagramPacket for UDP, and Socket and input/output streams for TCP. The document also discusses implementing a remote interface using RMI to allow method calls between JVMs.
The document discusses multithreading in Java, including the evolution of threading support across Java releases and examples of implementing multithreading using Threads, ExecutorService, and NIO channels. It also provides examples of how to make operations thread-safe using locks and atomic variables when accessing shared resources from multiple threads. References are included for further reading on NIO-based servers and asynchronous channel APIs introduced in Java 7.
This is all about socket programming in java using TCP and UDP socket and an example of simple Echo Server.
Also includes concepts of the socket, Socket class and methods and use of those.
Building native Android applications with Mirah and PindahNick Plante
Mirah is a Ruby-like language that compiles to Java bytecode, allowing Ruby developers to write Android apps without using Java. The document introduces Mirah and Pindah, a framework that makes it easier to develop Android apps in Mirah. It provides an example "Up or Down?" app that checks the status of websites and displays results. While Mirah offers a more Ruby-like syntax, it is still immature and tooling support needs improvement, making large Android app development challenging.
This document discusses networking and data access in Eqela. It covers topics like TCP/IP sockets, DNS, HTTP clients, and databases. For networking, it describes how to create sockets, resolve hostnames, connect to servers, and send/receive data over TCP, UDP, and HTTP. For data access, it explains how to open databases like SQLite, perform queries, and integrate other SQL databases. It also notes considerations for connecting to databases from mobile devices like using an intermediate gateway service over HTTP.
The document provides an overview of C# programming concepts including data types, variables, operators, and functions. Some key points:
- C# is a general-purpose programming language that uses basic data types like integers, floats, characters, and booleans. It supports derived data types and built-in types as objects.
- Almost every C# program must have one Main() function, which serves as the entry point. The Main() function and other functions use braces to delimit code blocks.
- Variables are declared with a data type and can be assigned values. C# distinguishes between value types and reference types. Operators are used to perform computations on variables.
- Functions, classes,
Everybody knows : Web is the platform of the future. Developing for the browser unfortunately requires us to learn and write JavaScript. Not only that but we also have to integrate the JavaScript client code with the server side, which often runs on the JVM (i.e. is written in Java). So we have to work in two different languages with completely different tools and APIs, and cannot share code between the client and the server.
The Google Web Toolkit (GWT) provides a way to write your client side web application entirely in Java and have it automatically translated to fast and compact JavaScript. It allows you to access all the browser functionality through a statically typed API. You only have to learn and use one language and you can use your code on the client as well as on the server.
The downside : Java is a bad match for the asynchronous programming model required on the browser and generally forces us to write and read a lot of boilerplate code.
In this session you'll see how programming GWT applications with Eclipse Xtend provides the best of both worlds:
Static typing with advanced IDE support meets a powerful and expressive language - right at your finger tips.
The document discusses how the Kotlin compiler fakes or lies about certain Kotlin language features by decompiling the bytecode produced by the Kotlin compiler. It provides examples of how free functions, nested functions, primary constructors, extension methods, destructuring, object declarations, companion objects, enumerations, delegated properties, lambdas with receivers, and more are implemented under the hood by the compiler through bytecode tricks and deception. The document is intended to look under the hood of the Kotlin compiler and Java bytecode to understand how certain Kotlin features are implemented that don't have a direct mapping to Java.
This document discusses effective practices for dependency injection (DI). It begins with a quick DI refresher and then provides guidelines for DI such as: explicitly defining dependencies, injecting exactly what is needed, preferring constructor injection, avoiding work in constructors, and avoiding direct dependencies on the injector. It also discusses testing code using DI, applying DI to existing code, and techniques for migrating code to use DI such as bottom-up or top-down approaches.
We like the architecture of our applications to revolve around the business logic, not around technical details (and especially not around the database).
In my team at Sky Network Services we use the Clean Architecture and it has given us a great deal of benefits: the business logic is explicit, we are free to change our technical decisions, the app is easy to test, working on it is faster and scalable, it’s hard to do the wrong thing, and many more.
But it comes at a cost, of course. In this talk I’ll tell you the story of our experience with Clean Architecture and give you some tips to get the most out of it.
Example Project
https://github.com/mattia-battiston/clean-architecture-example
Downloads
Online: https://goo.gl/DTxftJ
PDF: https://goo.gl/ZAtdBN
Powerpoint: https://goo.gl/D54wdZ (but you need to install these fonts to see it properly: https://goo.gl/iH8SO5)
Interfaces define methods that classes can implement. Classes implementing interfaces must define all interface methods. Interfaces can extend other interfaces, requiring implementing classes to define inherited methods as well. Interface variables are implicitly public, static, and final. A class can implement multiple interfaces and override methods with the same name across interfaces. Partial interface implementation requires the class to be abstract.
Module 19 tracking emails and investigating email crimessagaroceanic11
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercising for at least 30 minutes three times per week is recommended to see these mental health benefits.
The document discusses the benefits of exercise for both physical and mental health. Regular exercise can improve cardiovascular health, reduce stress and anxiety, boost mood, and reduce the risk of diseases. It recommends that adults get at least 150 minutes of moderate exercise or 75 minutes of vigorous exercise per week to gain these benefits.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise has also been shown to increase gray matter volume in the brain and reduce risks for conditions like Alzheimer's and dementia.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise has also been shown to boost self-esteem and can serve as a healthy way to manage stress.
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive functioning. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Module 01 computer forensics in todays worldsagaroceanic11
The document discusses the benefits of exercise for mental health. Regular physical activity can help reduce anxiety and depression and improve mood and cognitive function. Exercise causes chemical changes in the brain that may help protect against mental illness and improve symptoms.
Virtualization provides abstraction between hardware and software. It allows multiple virtual machines to run on a single physical machine, sharing resources. There are two approaches - hosted virtualization runs on a standard OS, while hypervisor architecture installs directly on hardware for better efficiency. VMware offers virtualization software for data centers, desktops, and mobile devices to optimize resource use across hardware, storage, and networks. Standards like OVF and VMDK help define virtual machine packaging and disk formats.
Virtualization technologies allow servers to be consolidated onto fewer physical servers for improved efficiency. IBM's PowerVM allows one physical server to be divided into multiple logical partitions (LPARs), with each LPAR able to run its own operating system. Key PowerVM technologies include micro-partitioning which divides physical CPUs among LPARs, dynamic LPARs which moves resources between active partitions, and virtual I/O servers which allow partitions to share physical network and storage adapters. These technologies improve utilization, flexibility, and availability compared to using separate physical servers.
Virtualization has its origins in mainframe computing from the 1960s. It allows a single physical server to run multiple virtual machines, each with its own operating system and applications. This addresses challenges from the 1990s and 2000s as companies had many single-purpose physical servers with low utilization rates, high costs, and management complexity. Virtualization software introduces a hypervisor layer that partitions resources and isolates virtual machines so multiple operating systems can run independently on the same physical hardware. Today virtualization delivers benefits like server consolidation, high availability, disaster recovery, and rapid provisioning to improve efficiency and reduce costs.
1. Server virtualization involves dividing the resources of a physical server, such as CPU, memory and storage, into multiple isolated virtual machines to run multiple operating systems and applications.
2. Early virtualization technology from the 1960s allowed identical "copies" of hardware to run on IBM mainframes, enabling time-sharing of computing resources.
3. Modern server virtualization provides increased hardware utilization, consolidation of servers, mobility of workloads, business continuity, and simplified development/testing environments.
The document discusses key concepts and processes related to service operation, including event management, incident management, request fulfillment, and problem management. Event management monitors events through the IT infrastructure to detect exceptions and ensure normal operation. Incident management aims to restore service as quickly as possible when incidents occur. Request fulfillment handles standard user requests. Problem management seeks to prevent problems and reduce the impact of incidents that do occur.
This document provides an overview of service transition concepts and processes including:
- The V model for service transition
- Configuration items and the configuration management system
- Knowledge management concepts
- Change management, service asset and configuration management, and release and deployment management processes
- Key roles, activities, and objectives for managing changes to services in a controlled manner throughout the service lifecycle
The document discusses key concepts in service design and management including the four Ps (products, partners, people, processes), service design packages, and aspects of service design like services, management systems, architectures, processes, and metrics. It then provides more detailed information on specific service management processes like service catalog management, service level management, and their goals, activities, roles, and challenges. The overall document provides an overview of service design and several important service management processes.
This document provides an overview of ITIL service strategy. It discusses key concepts of utility, warranty, service providers, delivery models, and service models. It also summarizes the processes of service portfolio management, demand management, and financial management which are part of developing an effective service strategy.
The document discusses the key concepts and processes in the Information Technology Infrastructure Library (ITIL) framework. ITIL describes best practices for IT service management and is broken down into five core publications: Service Strategy, Service Design, Service Transition, Service Operation, and Continual Service Improvement. Each publication focuses on a different stage of the service lifecycle to help align IT services with business needs and ensure quality service delivery.
This document provides an introduction to ITIL v.3 Foundation. It outlines the learning objectives which are to understand the ITIL service management lifecycle and its five core practices. It describes how ITIL has evolved over time to become best practice for IT service management. Key concepts discussed include services, service providers, service management, service owners, processes, and roles like process owners. The RACI model for defining roles and responsibilities is also introduced.
Visual Studio 2008 improves developer productivity, collaboration across the lifecycle, and employs the latest technologies. It rejuvenates developers with LINQ for data and support for service-oriented architecture. Visual Studio 2008 also simplifies mobility, provides better deployment with client services, and enhances quality. The release delivers full lifecycle management with real-time project reporting for a more predictable, visible, and controlled development process.
This document provides an overview of the history and development of the Visual Basic programming language. It discusses how Visual Basic originated from the BASIC language in the 1960s and was later adapted for microcomputers by Bill Gates and Paul Allen in the 1970s. Every version of Basic since has been based on their early work. Visual Basic was then introduced by Microsoft in 1991 and continued to be updated with new features and capabilities in subsequent versions like Visual Basic 3.0, 4.0, 5.0 and 6.0. The document also defines some key Visual Basic concepts and terms.
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slackshyamraj55
Discover the seamless integration of RPA (Robotic Process Automation), COMPOSER, and APM with AWS IDP enhanced with Slack notifications. Explore how these technologies converge to streamline workflows, optimize performance, and ensure secure access, all while leveraging the power of AWS IDP and real-time communication via Slack notifications.
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxSitimaJohn
Ocean Lotus cyber threat actors represent a sophisticated, persistent, and politically motivated group that poses a significant risk to organizations and individuals in the Southeast Asian region. Their continuous evolution and adaptability underscore the need for robust cybersecurity measures and international cooperation to identify and mitigate the threats posed by such advanced persistent threat groups.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
OpenID AuthZEN Interop Read Out - AuthorizationDavid Brossard
During Identiverse 2024 and EIC 2024, members of the OpenID AuthZEN WG got together and demoed their authorization endpoints conforming to the AuthZEN API
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
For the full video of this presentation, please visit: https://www.edge-ai-vision.com/2024/06/building-and-scaling-ai-applications-with-the-nx-ai-manager-a-presentation-from-network-optix/
Robin van Emden, Senior Director of Data Science at Network Optix, presents the “Building and Scaling AI Applications with the Nx AI Manager,” tutorial at the May 2024 Embedded Vision Summit.
In this presentation, van Emden covers the basics of scaling edge AI solutions using the Nx tool kit. He emphasizes the process of developing AI models and deploying them globally. He also showcases the conversion of AI models and the creation of effective edge AI pipelines, with a focus on pre-processing, model conversion, selecting the appropriate inference engine for the target hardware and post-processing.
van Emden shows how Nx can simplify the developer’s life and facilitate a rapid transition from concept to production-ready applications.He provides valuable insights into developing scalable and efficient edge AI solutions, with a strong focus on practical implementation.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-und-domino-lizenzkostenreduzierung-in-der-welt-von-dlau/
DLAU und die Lizenzen nach dem CCB- und CCX-Modell sind für viele in der HCL-Community seit letztem Jahr ein heißes Thema. Als Notes- oder Domino-Kunde haben Sie vielleicht mit unerwartet hohen Benutzerzahlen und Lizenzgebühren zu kämpfen. Sie fragen sich vielleicht, wie diese neue Art der Lizenzierung funktioniert und welchen Nutzen sie Ihnen bringt. Vor allem wollen Sie sicherlich Ihr Budget einhalten und Kosten sparen, wo immer möglich. Das verstehen wir und wir möchten Ihnen dabei helfen!
Wir erklären Ihnen, wie Sie häufige Konfigurationsprobleme lösen können, die dazu führen können, dass mehr Benutzer gezählt werden als nötig, und wie Sie überflüssige oder ungenutzte Konten identifizieren und entfernen können, um Geld zu sparen. Es gibt auch einige Ansätze, die zu unnötigen Ausgaben führen können, z. B. wenn ein Personendokument anstelle eines Mail-Ins für geteilte Mailboxen verwendet wird. Wir zeigen Ihnen solche Fälle und deren Lösungen. Und natürlich erklären wir Ihnen das neue Lizenzmodell.
Nehmen Sie an diesem Webinar teil, bei dem HCL-Ambassador Marc Thomas und Gastredner Franz Walder Ihnen diese neue Welt näherbringen. Es vermittelt Ihnen die Tools und das Know-how, um den Überblick zu bewahren. Sie werden in der Lage sein, Ihre Kosten durch eine optimierte Domino-Konfiguration zu reduzieren und auch in Zukunft gering zu halten.
Diese Themen werden behandelt
- Reduzierung der Lizenzkosten durch Auffinden und Beheben von Fehlkonfigurationen und überflüssigen Konten
- Wie funktionieren CCB- und CCX-Lizenzen wirklich?
- Verstehen des DLAU-Tools und wie man es am besten nutzt
- Tipps für häufige Problembereiche, wie z. B. Team-Postfächer, Funktions-/Testbenutzer usw.
- Praxisbeispiele und Best Practices zum sofortigen Umsetzen
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
2. A Broad Overview
.NET Platform JVM Platform
IL
Intermediate
Language
Bytecode
C# F# VB.NET Java Groovy Scala
CLR
(Common Language Runtime)
Win Win Mac UnixLinux
csc javac
groovyc
fsc
vbc
scalac
JRE
(Java Runtime Environment)
Mono
3. Technology Stack
Java C#
Data Access
Client Side GUI
Web Side GUI
Web Scripting
Web Hosting
Remote Invocation
Messaging
Native
Directory Access
Componentization
JDBC ADO.NET
AWT/Swing WinForms, WPF
JSP, JavaFX, JSF ASP.NET, WebForms
Servlets, Filters
ISAPI, HttpHandler,
HttpModule
Tomcat, Jetty, Weblogic
etc...
IIS
RMI, Netty, AKKA Remoting, now part of WCF
JMS, AKKA MSMQ
JNI PInvoke
JNDI Active Directory (Ldap/ADSI)
EJB (Entity/Session), Spring
COM+, Managed Extensibility
Framework (MEF)
4. Language Comparison
Java C#
Program Entry Point
Namespace
Including Classes
Inheritance
Overriding
Accessing Parent Ctor
Accessing Parent Method
Visibility
main(String ...args)
Main() or
Main(string [] args)
package namespace
import using
class (extends),
interface (implements)
class and interface (:)
virtual by default
non-virtual by default
use virtual keyword
super(...) : base(...)
super.method(...) base.Method(...)
private, package,
protected, public
private, protected, internal,
internal protected, public
5. Language Comparison
Java C#
Abstract Class
Non-Extensible Class
Non-Writable Field
Non-Extensible Method
Constant
Checking Instance Type
Enums
for-each construct
Switch-Case
abstract class X { ... } abstract class X { ... }
final class X { ... } sealed class X { ... }
final readonly
final sealed
static final const
instanceof is
enum, can have fields, methods and
implement interfaces and are typesafe
enum, cannot have methods,
fields or implement
interfaces, not typesafe
for (item : collection)
{ ... }
foreach(item in collection)
{ ... }
numeric types (int,
float...) enums, and now
strings (in Java 7)
numeric types, enums and
strings
6. Language Comparison
Java C#
Method Parameters
Variable Arguments
Exceptions
ADT Meta Type
Meta Information
Static class
Properties
Non-Deterministic Object
Cleanup
Object References are
passed by Value only
Object reference are passed
by Value(default), ref & out
method(type... args) Method(params type[] args)
Checked and Unchecked
(enforced by javac, not by JIT
compiler)
All Unchecked Exceptions
Class
Class klass = X.class;
Type
Type type = typeof(X);
@Annotation [Attribute]
Simulated by private Ctor
and static methods
Static class and ctor with
static methods
getProperty(),
setProperty()
Property { get; set; }
compiler generated
get_Property() and
set_Property() methods
finalize() destructor ~X()
7. Language Comparison
Java C#
Deterministic Object Cleanup
Generics
Class Loading
synchronized block
synchronized method
Thread Local Storage
Smallest Deployment Unit
Signing
AutoCloseable or Closeable
try-with-resources (Java 7)
try ( ... ) { ... }
IDisposable
using ( ... ) { ... }
<T>, <T extends Type>, <?>
Type Erasure
<T>, where T : type, new()
Preserves Type Info
Class.forName(“fqn”)
ClassLoader.getResources()
Activator.CreateInstance<T>()
Assembly.Load()
synchronized (this) { ... } lock (this) { ... }
synchronized method()
{ ... }
[MethodImpl(MethodImplOptions.Synchronized)]
void Method() { ... }
Thread relative static fields
Thread relative static fields
[ThreadStatic] and Data Slots
Jar
EXE/DLL
Private Assembly, Shared Assembly
Jar Signing Assembly Signing
9. Value Type
or
Ref Type?
Value Type
use ==
Reference Type use
ReferenceEquals
Specific to C#: Equality
• ForValue Types, default Equals implementation uses
reflection on fields.
• Override Equals for Reference Types
• Use the same strategy forValue Types, it is more
performant and consistent as well.
10. Equality Similarities
• Define Equals(object other) and hashCode as a
part of the contract
• Define both in terms of immutable fields
• It should be
• Reflexive: x.Equals(x) => True
• Symmetric: if x.Equals(y) then y.Equals(x) => True
• Transitive: x.Equals(y) and y.Equals(z), then x.Equals(z) =>
True
11. Specific to C#: Equality
• Use Exact object argument - Equals for use in
Collections and for performance.
• IEquatable<T>
• PreserveValue Semantics forValue Types
• Overload == operator
17. Specific to C#: Explicit
Interfaces01. interface Greet1 // v1.0
02. {
03. string Greet();
04. }
05. interface Greet2 //v2.0
06. {
07. string Greet();
08. }
09. public class Greeter : Greet1, Greet2
10. {
11. //Explicit Implementations
12. string Greet1.Greet() //Note the Visibility here
13. {
14. return “Hello from 1”;
15. }
16. string Greet2.Greet() //public not allowed for explicit
17. {
18. return “Hello from 2”;
19. }
20. public static void Main()
21. {
22. Greet1 greeter1 = new Greeter();
23. greeter1.Greet(); // Hello from 1
24. Greet2 greeter2 = new Greeter();
25. greeter2.Greet(); // Hello from 2
26. Greeter greeter = new Greeter();
27. greeter. // No Greeters to Greet unless I cast
28. }
29. }
18. Specific to C#: Explicit
Interfaces01. interface Greet1 // v1.0
02. {
03. string Greet();
04. }
05. interface Greet2 : Greet1 // v2.0
06. {
07. new string Greet();
08. }
09. public class Greeter : Greet2
10. {
11. //Explicit Implementations
12. string Greet1.Greet() //Note the Visibility here
13. {
14. return “Hello from 1”;
15. }
16. string Greet2.Greet() //public not allowed for explicit
17. {
18. return “Hello from 2”;
19. }
20. public static void Main()
21. {
22. Greet1 greeter1 = new Greeter();
23. greeter1.Greet(); // Hello from 1
24. Greet2 greeter2 = new Greeter();
25. greeter2.Greet(); // Hello from 2
26. Greeter greeter = new Greeter();
27. greeter. // No Greeters to Greet unless I cast
28. }
29. }
01. interface Greet1 // v1.0
02. {
03. string Greet();
04. }
05. interface Greet2 //v2.0
06. {
07. string Greet();
08. }
09. public class Greeter : Greet1, Greet2
10. {
11. //Explicit Implementations
12. string Greet1.Greet() //Note the Visibility here
13. {
14. return “Hello from 1”;
15. }
16. string Greet2.Greet() //public not allowed for explicit
17. {
18. return “Hello from 2”;
19. }
20. public static void Main()
21. {
22. Greet1 greeter1 = new Greeter();
23. greeter1.Greet(); // Hello from 1
24. Greet2 greeter2 = new Greeter();
25. greeter2.Greet(); // Hello from 2
26. Greeter greeter = new Greeter();
27. greeter. // No Greeters to Greet unless I cast
28. }
29. }
19. Specific to C#: Explicit
Interfaces01. interface Greet1 // v1.0
02. {
03. string Greet();
04. }
05. interface Greet2 : Greet1 // v2.0
06. {
07. new string Greet();
08. }
09. public class Greeter : Greet2
10. {
11. //Explicit Implementations
12. string Greet1.Greet() //Note the Visibility here
13. {
14. return “Hello from 1”;
15. }
16. string Greet2.Greet() //public not allowed for explicit
17. {
18. return “Hello from 2”;
19. }
20. public static void Main()
21. {
22. Greet1 greeter1 = new Greeter();
23. greeter1.Greet(); // Hello from 1
24. Greet2 greeter2 = new Greeter();
25. greeter2.Greet(); // Hello from 2
26. Greeter greeter = new Greeter();
27. greeter. // No Greeters to Greet unless I cast
28. }
29. }
01. interface Greet1 // v1.0
02. {
03. string Greet();
04. }
05. interface Greet2 //v2.0
06. {
07. string Greet();
08. }
09. public class Greeter : Greet1, Greet2
10. {
11. //Explicit Implementations
12. string Greet1.Greet() //Note the Visibility here
13. {
14. return “Hello from 1”;
15. }
16. string Greet2.Greet() //public not allowed for explicit
17. {
18. return “Hello from 2”;
19. }
20. public static void Main()
21. {
22. Greet1 greeter1 = new Greeter();
23. greeter1.Greet(); // Hello from 1
24. Greet2 greeter2 = new Greeter();
25. greeter2.Greet(); // Hello from 2
26. Greeter greeter = new Greeter();
27. greeter. // No Greeters to Greet unless I cast
28. }
29. }
Explicitly State the interface for which the
implementation is
20. Similarities
• Immutable Strings
• Serialization
• Boxing
• ConvertValue Type to a Reference Type
• Unboxing
• Convert Reference Type to aValue Type
23. Specific to C#
• Collection Initializer
• Coroutines (more precisely Generators)
• yield break
• yield return
01. class Fibonacci : IEnumerable<int> {
02. private readonly int howMany;
03. private int firstSeed, secondSeed = 1;
04.
05. public Fibonacci(int howMany)
06. {
07. this.howMany = howMany;
08. }
09.
10. public IEnumerator<int> GetEnumerator()
11. {
12. if (howMany < 0)
13. {
14. yield break;
15. }
16. for (var i = 0; i <= howMany; i++)
17. {
18. yield return firstSeed;
19. var sum = firstSeed + secondSeed;
20. firstSeed = secondSeed;
21. secondSeed = sum;
22. }
23. }
24.
25. IEnumerator IEnumerable.GetEnumerator()
26. {
27. return GetEnumerator();
28. }
29. }
01. public static void Main() {
02. foreach(int fiboSeq in new Fibonacci(5)) {
03. Console.Out.WriteLine("{0}", fiboSeq);
04. }
05. }
Output:
0
1
1
2
3
5
24. Covariance &
Contravariance
• Covariance
• Pass collection of sub-class to a collection of base class
• Contravariance
• Pass collection of base class to a collection of sub-class
• Invariance
• Neither of the above applies
25. Arrays and Generic
Collections
• Arrays are Covariant in C# and Java
• There is a hole in the type system and a runtime patch is
applied.
• Generics are Invariant in Java.
• In C#, use leniency offered by IEnumerable if you
need Covariance.
• Only interfaces and delegates can be covariant (out) or
contravariant (in)
30. Java Example
01. abstract class Animal {
02. public abstract String speak();
03. }
04.
05. class Cat extends Animal {
06. public String speak() {
07. return “Meow!”;
08. }
09. }
10.
11. class Dog extends Animal {
12. public String speak() {
13. return “Bark!”;
14. }
15. }
16.
17. class Printer {
18. public static print(Animal [] animals) {
19. animals[0] = new Dog();
20. for (int i = 0; i < animals.length; i++) {
21. System.out.println(animals[i].speak();
22. }
23. }
24.
25. public static print(List<Animal> animals) {
26. for(Animal animal : animals) {
27. System.out.println(animal.speak());
28. }
29. }
30. }
31. Java Example
01. class TestCollections {
02. public static void main(String []args) {
03. Cat cat = new Cat();
04. Animal animal = cat;
05. animal.speak();
06.
07. animal = new Dog();
08. animal.speak();
09.
10. Animal [] animals = new Animal [] { cat, dog };
11. Cat [] cats = new Cat[] { cat };
12. animals = cats;
13. print(animals); //Exposes Hole in Type System
14.
15. // Fails to compile as Generic Collections in
16. // Java are Invariant
17. List<Animal> animals = new ArrayList<Dog>();
18.
19. List<Dog> dogs = new ArrayList<Dog>();
20. dogs.add(dog);
21. dogs.add(dog);
22. print(dogs);
23. }
24. }
01. abstract class Animal {
02. public abstract String speak();
03. }
04.
05. class Cat extends Animal {
06. public String speak() {
07. return “Meow!”;
08. }
09. }
10.
11. class Dog extends Animal {
12. public String speak() {
13. return “Bark!”;
14. }
15. }
16.
17. class Printer {
18. public static print(Animal [] animals) {
19. animals[0] = new Dog();
20. for (int i = 0; i < animals.length; i++) {
21. System.out.println(animals[i].speak();
22. }
23. }
24.
25. public static print(List<Animal> animals) {
26. for(Animal animal : animals) {
27. System.out.println(animal.speak());
28. }
29. }
30. }
32. Specific to C#
• Anonymous Types
• Anonymous Methods/Delegates
• Pass Methods as Data
• Action: No return values
• Func: Non-void return values
• Predicate: A Func that always returns a bool
• Generally above suffice, but if not,then use Custom Delegates
• Delegate Chaining
• Compiler Eye Candy: +=, -= for Combine(), Remove()
• Lambdas
33. Specific to C#
• Events
• Syntactic sugar over delegates, but with visibility
• Events can only be invoked from within the class that declared it, whereas a
delegate field can be invoked by whoever has access to it.
• Events can be included in interfaces, delegates cannot be.
• Built-in EventHandler and EventArgs
• Compiler generated add_ and remove_ methods for
the event.
• dynamic
• ExpandoObject
34. Dynamic Runtime Library
CLR
(Common Language Runtime)
DLR
(Dynamic Language Runtime)
C#
VB.NET
Python
Ruby
• Allows you to talk with
implementations in other
languages
• C#/VB.NET with Python, Ruby
• Also with Silverlight etc..
Dynamically Typed
Statically Typed
01. using IronPython.Hosting;
02. using Microsoft.Scripting.Hosting;
03.
04. var python = Python.CreateRuntime();
05. dynamic script = python.UseFile(“Calculator.py”);
06.
07. // Get PythonType
08. dynamic Calculator = script.GetVariable(“Calculator”);
09. dynamic calc = Calculator(); // Instantiate Object
10.
11. //Invoke method
12. dynamic result = calc.add(2, 3); // 5
35. Specific to C#
• Avoid Configuration hell
• Single Configuration File (App.config)
• Asynchronous Programming
• BeginInvoke and EndInvoke
• Wait with EndInvoke
• Wait with WaitHandle
• Poll for Async call completion
• Execute a callback upon completion
• Task Parallel Library (TPL)
36. Specific to Java
• Static Imports
• Instance and Static Initializers
• Interfaces Containing Fields
• Anonymous Classes
• Proxy Support through Interceptor
37. Specific to Java
• Asynchronous Programming
• Future Task
• Poll Completion with isDone().
• Execute callback upon completion
• Using ListenableFuture and FutureCallback - Google Guava Library
• Or roll your own result completion callback.
• Akka Actors