Book Image

Java 9: Building Robust Modular Applications

By : Dr. Edward Lavieri, Peter Verhas, Jason Lee
Book Image

Java 9: Building Robust Modular Applications

By: Dr. Edward Lavieri, Peter Verhas, Jason Lee

Overview of this book

Java 9 and its new features add to the richness of the language; Java is one of the languages most used by developers to build robust software applications. Java 9 comes with a special emphasis on modularity with its integration with Jigsaw. This course is your one-stop guide to mastering the language. You'll be provided with an overview and explanation of the new features introduced in Java 9 and the importance of the new APIs and enhancements. Some new features of Java 9 are ground-breaking; if you are an experienced programmer, you will be able to make your enterprise applications leaner by learning these new features. You'll be provided with practical guidance in applying your newly acquired knowledge of Java 9 and further information on future developments of the Java platform. This course will improve your productivity, making your applications faster. Next, you'll go on to implement everything you've learned by building 10 cool projects. You will learn to build an email filter that separates spam messages from all your inboxes, a social media aggregator app that will help you efficiently track various feeds, and a microservice for a client/server note application, to name just a few. By the end of this course, you will be well acquainted with Java 9 features and able to build your own applications and projects. This Learning Path contains the best content from the following two recently published Packt products: • Mastering Java 9 • Java 9 Programming Blueprints
Table of Contents (33 chapters)
Title Page - Courses
Packt Upsell - Courses
Preface
25
Taking Notes with Monumentum
Bibliography
Index

Improving security application performance


Java Enhancement Proposal 232, titled Improving Security Application Performance, was focused on performance improvements when running applications with a security manager installed. Security managers can result in processing overhead and less than ideal application performance.

This is an impressive undertaking as current CPU overhead when running security managers is estimated to result in 10-15% performance degradation. It is not feasible to completely remove the CPU overhead as some CPU processing is required to run the security manager. That being said, the intention of this proposal (JEP-232) was to decrease the overhead percentage as much as possible.

This effort resulted in the following optimizations, each detailed in subsequent sections:

  • Security policy enforcement
  • Permission evaluation
  • Hash code
  • Package checking algorithm

Security policy enforcement

JDK 9 uses ConcurrentHashMap for mapping ProtectionDomain to PermissionCollection. ConcurrentHashMap...