Since JDK 9, Java, as a language, has evolved faster than at any point in its 30-year history. For developers, this is great as it means we get more new features to make our code more concise, yet hopefully, easier to read and understand.
All new language features also bring their quirks and possibly unseen consequences.
In this fun interactive session, we’ll examine a range of recent language features and pose questions to the audience about how the code works and what it does.
We’ll cover many of the new language features from recent releases, including switch expressions, sealed classes and pattern matching. We’ll even look at some curious ways special characters can be used in unexpected ways.
The answers will most definitely not always be as you expect!
All new language features also bring their quirks and possibly unseen consequences.
In this fun interactive session, we’ll examine a range of recent language features and pose questions to the audience about how the code works and what it does.
We’ll cover many of the new language features from recent releases, including switch expressions, sealed classes and pattern matching. We’ll even look at some curious ways special characters can be used in unexpected ways.
The answers will most definitely not always be as you expect!
Simon Ritter
Azul
Simon Ritter is the Deputy CTO of Azul. Simon joined Sun Microsystems in 1996 and worked in both Java development and consultancy. He has been presenting Java technologies to developers since 1999, focusing on the core Java platform as well as client and embedded applications. At Azul, he continues to help people understand Java and Azul’s JVM products.
Simon is a Java Champion and a two-time recipient of the JavaOne Rockstar award. In addition, he has represented Azul on the JCP Executive Committee, the OpenJDK Vulnerability Group, and the JSR Expert Group since Java SE 9.
Simon is a Java Champion and a two-time recipient of the JavaOne Rockstar award. In addition, he has represented Azul on the JCP Executive Committee, the OpenJDK Vulnerability Group, and the JSR Expert Group since Java SE 9.
