Skip to main content

标  题: Re: 哪位大牛来比较一下 java, python, scala

http://gengwg.blogspot.com/发信人: azxcazxc15 (haizi), 信区: JobHunting
标  题: Re: 哪位大牛来比较一下 java, python, scala
发信站: BBS 未名空间站 (Tue Jun 16 16:57:03 2015, 美东)

动态类型语言最大的问题不是性能(性能已经很少成为一个瓶颈了),而是动态类型带
来的维护、重构、重写困难。
弱类型语言的可读性是一个天然的问题。另外弱类型语言的编译器、解释器能抓到的错
比强类型少。

强类型:开发累,语法冗余,框架冗余,编译过了就解决很多问题,RUNTIME问题少,
容易定位,可读性强。
弱类型:开发爽,编译、解释器基本不干啥事,问题全是RUNTIME问题,DEBUG蛋疼,可
读性弱,而且不同人写出来的代码差别太大导致难以维护。

SCALA是强类型。但是语法糖太多,加之是OO和FP的混合体,导致同样的逻辑有若干种
完全不同的写法。。也是难读难维护,不过只是自己玩玩其实还不错

【 在 jobhunter123 (jobhunting) 的大作中提到: 】
: 我两个确实都不熟性能,工作用python,只是写逻辑,但其实java更熟一些。大牛,来
: 说说scala啊,scala怎样?
: 另外动态编程,java的一些变形也可以啊,比如groovy,省了很多代码,我觉得比
: python还方便, 我记得groovy第一句话就是,它是动态编程(也可能记错了?)来说说
: scala吧
: python

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...