In the pipeline
Small apps that play well together
So I'm still at Adhoc (the conference formerly known as MacHack) and still fairly sleep deprived. Last night's midnight keynote ended about 2:30. Steve Hayman kept returning to the command line and deconstructing some of the cool tips and tricks. Some of these have been around for years - he showed a spell checker that he had seen Kernighan demo thirty years ago. Hayman is an Apple employee so he could not make comparison's to the upcoming Tiger release of Mac OS X, but Steve Jobs keynote last month at WWDC made it clear that the Automator application is a GUI modern analogy of the classic Unix pipeline.
This notion of plugging in what you need continues to come up in the context of Java developers. This swapping in and out of simple pieces is contrasted with eating the whole elephant or contained in lessons learned from Loony Tunes. Is there an "all too common desire by programmers to bury themselves in a morass of details." Craig Castelaz has spurred an interesting discussion on that
Weblogs. In his post Hesitant Acrobats he writes "Of course, Im just as guilty as the rest. As I mentioned in my last blog, the first thing I did when I got an assignment to support digest authentication was to sniff the packets going to and from the secured web site. Now, how detail-centric is that?"
Danese Cooper has passed a "Miracle" ticket on to Bruno Souza so the java.net JUG community leader can join us at OSCon this year.
There was a tie in the java.net Fairness Board election. JBob blogs on how you can participate in the tie breaker election.
In Also in Java Today , the Spring framework is built to be lightweight and flexible, but still allows for cutting-edge development techniques. In part one of An Introduction to Aspect-Oriented Programming with the Spring Framework, Russ Miles delves into Spring's AOP support. Noting that Spring treasures light coupling between its various components, he says "it is possible to use just the AOP elements of the framework without worrying too much about the other modules that make up the Spring framework." Using a logging aspect as an example, he shows how to add advice to an existing Spring bean.
In the Core Java tech tip Creating Custom Security Permissions, John Zukowski explains that by "creating your own permission, you can restrict access to a more appropriate set of users." Zukowski takes you through the steps of subclassing java.security.Permission,
ensuring proper permissions are available, running the privileged code, and adding the necessary new permission to the policy file for the application.
Forums, Adam Japh adds to the Always override toString discussion saying "You shouldn't have a toString() method in your servlet, because your servlet shouldn't contain any data to stringify. More to the point it doesn't matter if you do write a toString method because you shouldn't ever need to instantiate your servlet explicitly except, perhaps, in a unit test."
Ron Hitchens kicks off the discussion of Item 10: Override clone saying "t's clear that clone()/Cloneable is a real mess. I use clone occasionally to duplicate arrays, but have never trusted it further than that. How about you? Should clone() and the Cloneable interface be deprecated? How did something so messed up survive so long?"
When overriding equals, Ashley Herring writes, "if your class is immutable, then the hashCode value need only be calculated once (perhaps on the first call to hashCode) - so even distribution of hash code values can be favoured over hash code calculation performance which becomes a once off excercise. "
In Projects and Communities,
the Java Device Open System project in the JDDAC community.is working to achieve greater success for Java in the embedded systems market by developing a system based on J2SE 1.5 instead of on J2ME to take advantage of its realtime support.
The JavaChecker tool detects code defects, such as inaccurate exception handling, style defects, problems caused by variable hiding, synchronization errors, etc. This Java Tools community project also hopes to "discuss approaches detecting common java code defects".
In today's java.net News Headlines
- Jakarta Commons Codec 1.3
- WADI 0.9 First Release
- Visual Paradigm for UML 3.2
- Sixth Working Draft XHTML2.0
- Response to de Icaza: J2EE is not 'Academic'
- Subversion 1.0.6 Security Fix
- ICANN Adds IPv6 to Root Servers
Registered users can submit news items for the
href="http://today.java.net/today/news/">java.net News Page using
our news submission
form. All submissions go through an editorial review before being posted to the site. You can also subscribe to
News RSS feed.
Current and upcoming
- July 23 - 25 Desert Southwest Software Symposium
- July 29 O'Reilly Open Source Convention
- July 29 Moderated Chat: Improving Web Services Performance
Registered users can submit event listings for the
href="http://www.java.net/events">java.net Events Page using our
href="http://today.java.net/cs/user/create/e"> events submission
form. All submissions go through an editorial review before being
posted to the site.
Archives and Subscriptions: This blog is delivered weekdays as the
Today RSS feed. Also, once this page
is no longer featured as the front page of
java.net it will be archived along with other past issues in the href="http://today.java.net/today/archive/">java.net Archive.