{"id":1672,"date":"2013-01-30T09:40:09","date_gmt":"2013-01-30T07:40:09","guid":{"rendered":"http:\/\/www.tutego.de\/blog\/javainsel\/?p=1672"},"modified":"2013-01-30T09:40:09","modified_gmt":"2013-01-30T07:40:09","slug":"die-nchsten-beiden-tage-werden-fr-java-8-spannend-denn","status":"publish","type":"post","link":"https:\/\/www.tutego.de\/blog\/javainsel\/2013\/01\/die-nchsten-beiden-tage-werden-fr-java-8-spannend-denn\/","title":{"rendered":"Die n&auml;chsten beiden Tage werden f&uuml;r Java 8 spannend, denn &hellip;"},"content":{"rendered":"<p>\u2026 am 31.01.2013 muss das JDK 8 <a title=\"http:\/\/openjdk.java.net\/projects\/jdk8\/milestones#Feature_Complete\" href=\"http:\/\/openjdk.java.net\/projects\/jdk8\/milestones#Feature_Complete\">http:\/\/openjdk.java.net\/projects\/jdk8\/milestones#Feature_Complete<\/a> sein. Date &amp; Time hat es noch geschafft. Dann m\u00fcssen wir den M6 bekommen, das laut Vorgaben enth\u00e4lt:<\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/101\">101 Generalized Target-Type Inference<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/103\">103 Parallel Array Sorting<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/104\">104 Annotations on Java Types<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/109\">109 Enhance Core Libraries with Lambda<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/115\">115 AEAD CipherSuites<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/118\">118 Access to Parameter Names at Runtime<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/119\">119 javax.lang.model Implementation Backed by Core Reflection<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/120\">120 Repeating Annotations<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/126\">126 Lambda Expressions &amp; Virtual Extension Methods<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/135\">135 Base64 Encoding &amp; Decoding<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/138\">138 Autoconf-Based Build System<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/139\">139 Enhance javac to Improve Build Speed<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/140\">140 Limited doPrivileged<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/142\">142 Reduce Cache Contention on Specified Fields<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/143\">143 Improve Contended Locking<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/147\">147 Reduce Class Metadata Footprint<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/148\">148 Small VM<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/149\">149 Reduce Core-Library Memory Usage<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/150\">150 Date &amp; Time API<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/160\">160 Lambda-Form Representation for Method Handles<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/161\">161 Compact Profiles<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/162\">162 Prepare for Modularization<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/164\">164 Leverage CPU Instructions for AES Cryptography<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/165\">165 Compiler Control<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/166\">166 Overhaul JKS-JCEKS-PKCS12 Keystores<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/170\">170 JDBC 4.2<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/172\">172 DocLint<\/a><\/p>\n<p><a href=\"http:\/\/openjdk.java.net\/jeps\/173\">173 Retire Some Rarely-Used GC Combinations<\/a><\/p>\n<p>So wie ich das \u00fcberblicke, sind die meisten Punkte realisiert.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u2026 am 31.01.2013 muss das JDK 8 http:\/\/openjdk.java.net\/projects\/jdk8\/milestones#Feature_Complete sein. Date &amp; Time hat es noch geschafft. Dann m\u00fcssen wir den M6 bekommen, das laut Vorgaben enth\u00e4lt: 101 Generalized Target-Type Inference 103 Parallel Array Sorting 104 Annotations on Java Types 109 Enhance Core Libraries with Lambda 115 AEAD CipherSuites 118 Access to Parameter Names at Runtime [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[66],"tags":[],"class_list":["post-1672","post","type-post","status-publish","format-standard","hentry","category-java-8"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.tutego.de\/blog\/javainsel\/wp-json\/wp\/v2\/posts\/1672","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tutego.de\/blog\/javainsel\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tutego.de\/blog\/javainsel\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tutego.de\/blog\/javainsel\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tutego.de\/blog\/javainsel\/wp-json\/wp\/v2\/comments?post=1672"}],"version-history":[{"count":0,"href":"https:\/\/www.tutego.de\/blog\/javainsel\/wp-json\/wp\/v2\/posts\/1672\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.tutego.de\/blog\/javainsel\/wp-json\/wp\/v2\/media?parent=1672"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tutego.de\/blog\/javainsel\/wp-json\/wp\/v2\/categories?post=1672"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tutego.de\/blog\/javainsel\/wp-json\/wp\/v2\/tags?post=1672"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}