So far we used Nashorn to emulate a Read-Eval-Print-Loop (REPL) for Java. But Java 9 can do better. This version includes a real REPL – the command line tool jshell. Although the Early Access (EA) version is not intended for production, you still can use it for interactively working with Java. Continue reading “Interactive Java with jshell”
Have you ever needed to evaluate a Java class, or just perform some quick tests to see how a statement is working? Writing a full Java program just to test a single command might be a solution. A better one would be to use a REPL (Read Eval Print Loop) tool for an interactive test of Java constructs.
I’m going to write about the upcoming REPL tool of Java 9 soon. But before, I like to show how to perform this task with the recent Java 8 version. Continue reading “Interactive Java using Nashorn (part I)”
Beside attending lots of tracks I had the opportunity to meet a couple of people face-to-face like Ed Burns (JSF Spec Lead), Geertjan Wielenga (NetBeans product manager), Arun Gupta (Java EE evangelist) and more, especial lot of JUG members from all over Germany. Read an article about my impressions .
Most slides are available for download now .
And I had the chance, to attend the celebration of 5 years Java aktuell, the Java magazine by the iJUG . Great!
The official Java 8 release was published today. If you have already installed the Java 8 FCS version, build 132, then usually there is no need to download the current version. It’s almost the same, except some commercial features like Java Flight Recorder, which are bundled to today’s release. Read Mark Reinhold’s blog about JDK 8: General Availability .
Now, after we’ve addressed basic log-in with simple file realm, I want to move on by exchanging the authentication method. Remember, this tutorial is about web development with JavaServer Faces. All I showed for container based security so far, is technology entirely independent from JSF. Same applies to simple form log-in. But, it’s possible to embed this into some JSF techniques. And, further on, using programmatic log-in, this is done by the use of JSF. Continue reading “Tutorial web development (with JSF) XIV – Security Part III”