Submit Search
Upload
Scala dreaded underscore
•
124 likes
•
53,540 views
RUDDER
Follow
A reference about every use cases of underscores in the Scala programming language
Read less
Read more
Technology
News & Politics
Report
Share
Report
Share
1 of 15
Recommended
Data mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, Classification
Dr. Abdul Ahad Abro
Data mining and data warehouse lab manual updated
Data mining and data warehouse lab manual updated
Yugal Kumar
Data warehouse
Data warehouse
Yogendra Uikey
Stochastic Gradient Decent (SGD).pptx
Stochastic Gradient Decent (SGD).pptx
Shubham Jaybhaye
Data Mining Case Study
Data Mining Case Study
Xiaomeng Chai
Introduction to Machine Learning
Introduction to Machine Learning
KmPooja4
Types and Functions of DDBMS
Types and Functions of DDBMS
Adeel Rasheed
Data Mining Techniques
Data Mining Techniques
Sanzid Kawsar
Recommended
Data mining , Knowledge Discovery Process, Classification
Data mining , Knowledge Discovery Process, Classification
Dr. Abdul Ahad Abro
Data mining and data warehouse lab manual updated
Data mining and data warehouse lab manual updated
Yugal Kumar
Data warehouse
Data warehouse
Yogendra Uikey
Stochastic Gradient Decent (SGD).pptx
Stochastic Gradient Decent (SGD).pptx
Shubham Jaybhaye
Data Mining Case Study
Data Mining Case Study
Xiaomeng Chai
Introduction to Machine Learning
Introduction to Machine Learning
KmPooja4
Types and Functions of DDBMS
Types and Functions of DDBMS
Adeel Rasheed
Data Mining Techniques
Data Mining Techniques
Sanzid Kawsar
DATA WRANGLING presentation.pptx
DATA WRANGLING presentation.pptx
AbdullahAbbasi55
Data mining
Data mining
Akannsha Totewar
Feature Engineering
Feature Engineering
HJ van Veen
Data mining
Data mining
District Administration
Feature Engineering in Machine Learning
Feature Engineering in Machine Learning
Knoldus Inc.
Data Mining Concepts
Data Mining Concepts
Dung Nguyen
Support Vector Machine ppt presentation
Support Vector Machine ppt presentation
AyanaRukasar
4.2 spatial data mining
4.2 spatial data mining
Krish_ver2
Em Algorithm | Statistics
Em Algorithm | Statistics
Transweb Global Inc
Knowledge discovery process
Knowledge discovery process
Shuvra Ghosh
Introduction to Cryptography
Introduction to Cryptography
Seema Goel
Introduction to Data Mining
Introduction to Data Mining
DataminingTools Inc
Message authentication and hash function
Message authentication and hash function
omarShiekh1
Data warehouse
Data warehouse
krishna kumar singh
Case study on Transaction in Grocery Store
Case study on Transaction in Grocery Store
divyawani2
Big data unit i
Big data unit i
Navjot Kaur
Machine learning
Machine learning
Ayesha Ahsan khan
Data structure mind mapping
Data structure mind mapping
Amr Hassan AbdUllah
Types of Machine Learning
Types of Machine Learning
Samra Shahzadi
Database auditing essentials
Database auditing essentials
Craig Mullins
카카오스토리 웹팀의 코드리뷰 경험
카카오스토리 웹팀의 코드리뷰 경험
Ohgyun Ahn
Webservice cache strategy
Webservice cache strategy
DaeMyung Kang
More Related Content
What's hot
DATA WRANGLING presentation.pptx
DATA WRANGLING presentation.pptx
AbdullahAbbasi55
Data mining
Data mining
Akannsha Totewar
Feature Engineering
Feature Engineering
HJ van Veen
Data mining
Data mining
District Administration
Feature Engineering in Machine Learning
Feature Engineering in Machine Learning
Knoldus Inc.
Data Mining Concepts
Data Mining Concepts
Dung Nguyen
Support Vector Machine ppt presentation
Support Vector Machine ppt presentation
AyanaRukasar
4.2 spatial data mining
4.2 spatial data mining
Krish_ver2
Em Algorithm | Statistics
Em Algorithm | Statistics
Transweb Global Inc
Knowledge discovery process
Knowledge discovery process
Shuvra Ghosh
Introduction to Cryptography
Introduction to Cryptography
Seema Goel
Introduction to Data Mining
Introduction to Data Mining
DataminingTools Inc
Message authentication and hash function
Message authentication and hash function
omarShiekh1
Data warehouse
Data warehouse
krishna kumar singh
Case study on Transaction in Grocery Store
Case study on Transaction in Grocery Store
divyawani2
Big data unit i
Big data unit i
Navjot Kaur
Machine learning
Machine learning
Ayesha Ahsan khan
Data structure mind mapping
Data structure mind mapping
Amr Hassan AbdUllah
Types of Machine Learning
Types of Machine Learning
Samra Shahzadi
Database auditing essentials
Database auditing essentials
Craig Mullins
What's hot
(20)
DATA WRANGLING presentation.pptx
DATA WRANGLING presentation.pptx
Data mining
Data mining
Feature Engineering
Feature Engineering
Data mining
Data mining
Feature Engineering in Machine Learning
Feature Engineering in Machine Learning
Data Mining Concepts
Data Mining Concepts
Support Vector Machine ppt presentation
Support Vector Machine ppt presentation
4.2 spatial data mining
4.2 spatial data mining
Em Algorithm | Statistics
Em Algorithm | Statistics
Knowledge discovery process
Knowledge discovery process
Introduction to Cryptography
Introduction to Cryptography
Introduction to Data Mining
Introduction to Data Mining
Message authentication and hash function
Message authentication and hash function
Data warehouse
Data warehouse
Case study on Transaction in Grocery Store
Case study on Transaction in Grocery Store
Big data unit i
Big data unit i
Machine learning
Machine learning
Data structure mind mapping
Data structure mind mapping
Types of Machine Learning
Types of Machine Learning
Database auditing essentials
Database auditing essentials
Viewers also liked
카카오스토리 웹팀의 코드리뷰 경험
카카오스토리 웹팀의 코드리뷰 경험
Ohgyun Ahn
Webservice cache strategy
Webservice cache strategy
DaeMyung Kang
Exception log practical_coding_guide, 예외와 로그 코딩 실용 가이드
Exception log practical_coding_guide, 예외와 로그 코딩 실용 가이드
도형 임
알고리즘 문제해결전략 #1
알고리즘 문제해결전략 #1
Byeongsu Kang
Aws summit 2017 사내전파교육
Aws summit 2017 사내전파교육
Byeongsu Kang
코딩소림사 Rx java
코딩소림사 Rx java
Byeongsu Kang
멸종하는 공룡이 되지 않으려면
멸종하는 공룡이 되지 않으려면
Byeongsu Kang
알고리즘2
알고리즘2
Byeongsu Kang
예외처리가이드
예외처리가이드
도형 임
텐서플로우 설치도 했고 튜토리얼도 봤고 기초 예제도 짜봤다면 TensorFlow KR Meetup 2016
텐서플로우 설치도 했고 튜토리얼도 봤고 기초 예제도 짜봤다면 TensorFlow KR Meetup 2016
Taehoon Kim
지적 대화를 위한 깊고 넓은 딥러닝 PyCon APAC 2016
지적 대화를 위한 깊고 넓은 딥러닝 PyCon APAC 2016
Taehoon Kim
알아두면 쓸데있는 신기한 강화학습 NAVER 2017
알아두면 쓸데있는 신기한 강화학습 NAVER 2017
Taehoon Kim
딥러닝과 강화 학습으로 나보다 잘하는 쿠키런 AI 구현하기 DEVIEW 2016
딥러닝과 강화 학습으로 나보다 잘하는 쿠키런 AI 구현하기 DEVIEW 2016
Taehoon Kim
책 읽어주는 딥러닝: 배우 유인나가 해리포터를 읽어준다면 DEVIEW 2017
책 읽어주는 딥러닝: 배우 유인나가 해리포터를 읽어준다면 DEVIEW 2017
Taehoon Kim
Viewers also liked
(14)
카카오스토리 웹팀의 코드리뷰 경험
카카오스토리 웹팀의 코드리뷰 경험
Webservice cache strategy
Webservice cache strategy
Exception log practical_coding_guide, 예외와 로그 코딩 실용 가이드
Exception log practical_coding_guide, 예외와 로그 코딩 실용 가이드
알고리즘 문제해결전략 #1
알고리즘 문제해결전략 #1
Aws summit 2017 사내전파교육
Aws summit 2017 사내전파교육
코딩소림사 Rx java
코딩소림사 Rx java
멸종하는 공룡이 되지 않으려면
멸종하는 공룡이 되지 않으려면
알고리즘2
알고리즘2
예외처리가이드
예외처리가이드
텐서플로우 설치도 했고 튜토리얼도 봤고 기초 예제도 짜봤다면 TensorFlow KR Meetup 2016
텐서플로우 설치도 했고 튜토리얼도 봤고 기초 예제도 짜봤다면 TensorFlow KR Meetup 2016
지적 대화를 위한 깊고 넓은 딥러닝 PyCon APAC 2016
지적 대화를 위한 깊고 넓은 딥러닝 PyCon APAC 2016
알아두면 쓸데있는 신기한 강화학습 NAVER 2017
알아두면 쓸데있는 신기한 강화학습 NAVER 2017
딥러닝과 강화 학습으로 나보다 잘하는 쿠키런 AI 구현하기 DEVIEW 2016
딥러닝과 강화 학습으로 나보다 잘하는 쿠키런 AI 구현하기 DEVIEW 2016
책 읽어주는 딥러닝: 배우 유인나가 해리포터를 읽어준다면 DEVIEW 2017
책 읽어주는 딥러닝: 배우 유인나가 해리포터를 읽어준다면 DEVIEW 2017
Similar to Scala dreaded underscore
groovy and concurrency
groovy and concurrency
Paul King
Functional programming with_jdk8-s_ritter
Functional programming with_jdk8-s_ritter
Simon Ritter
Lambdas and Streams in Java SE 8: Making Bulk Operations simple - Simon Ritter
Lambdas and Streams in Java SE 8: Making Bulk Operations simple - Simon Ritter
JAXLondon2014
Lambdas And Streams in JDK8
Lambdas And Streams in JDK8
Simon Ritter
Java 8
Java 8
jclingan
What's new in Java 8
What's new in Java 8
jclingan
Improved Developer Productivity In JDK8
Improved Developer Productivity In JDK8
Simon Ritter
Scalatra 2.2
Scalatra 2.2
Ivan Porto Carrero
XML Schema Patterns for Databinding
XML Schema Patterns for Databinding
Paul Downey
Java SE 8
Java SE 8
Simon Ritter
Javascript fundamentals and not
Javascript fundamentals and not
Salvatore Fazio
Java findamentals2
Java findamentals2
Todor Kolev
Java findamentals2
Java findamentals2
Todor Kolev
Java_Roadmap.pptx
Java_Roadmap.pptx
ssuser814cf2
Object-oriented Design: Polymorphism via Inheritance (vs. Delegation)
Object-oriented Design: Polymorphism via Inheritance (vs. Delegation)
Adair Dingle
55j7
55j7
swein2
Groovy Power Features
Groovy Power Features
Paul King
Paulking groovy
Paulking groovy
d0nn9n
Java basics training 1
Java basics training 1
Kushan Shalindra Amarasiri - Technical QE Specialist
Similar to Scala dreaded underscore
(19)
groovy and concurrency
groovy and concurrency
Functional programming with_jdk8-s_ritter
Functional programming with_jdk8-s_ritter
Lambdas and Streams in Java SE 8: Making Bulk Operations simple - Simon Ritter
Lambdas and Streams in Java SE 8: Making Bulk Operations simple - Simon Ritter
Lambdas And Streams in JDK8
Lambdas And Streams in JDK8
Java 8
Java 8
What's new in Java 8
What's new in Java 8
Improved Developer Productivity In JDK8
Improved Developer Productivity In JDK8
Scalatra 2.2
Scalatra 2.2
XML Schema Patterns for Databinding
XML Schema Patterns for Databinding
Java SE 8
Java SE 8
Javascript fundamentals and not
Javascript fundamentals and not
Java findamentals2
Java findamentals2
Java findamentals2
Java findamentals2
Java_Roadmap.pptx
Java_Roadmap.pptx
Object-oriented Design: Polymorphism via Inheritance (vs. Delegation)
Object-oriented Design: Polymorphism via Inheritance (vs. Delegation)
55j7
55j7
Groovy Power Features
Groovy Power Features
Paulking groovy
Paulking groovy
Java basics training 1
Java basics training 1
More from RUDDER
What if configuration management didn't need to be lvl60 in dev?
What if configuration management didn't need to be lvl60 in dev?
RUDDER
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proof
RUDDER
OSIS 2019 - Qu’apporte l’observabilité à la gestion de configuration ?
OSIS 2019 - Qu’apporte l’observabilité à la gestion de configuration ?
RUDDER
OW2Con - Configurations, do you prove yours?
OW2Con - Configurations, do you prove yours?
RUDDER
The new plugin ecosystem in RUDDER 5.0
The new plugin ecosystem in RUDDER 5.0
RUDDER
What uses for observing operations of Configuration Management?
What uses for observing operations of Configuration Management?
RUDDER
UX challenges of a UI-centric config management tool
UX challenges of a UI-centric config management tool
RUDDER
What happened in RUDDER in 2018 and what’s next?
What happened in RUDDER in 2018 and what’s next?
RUDDER
What is RUDDER and when should I use it?
What is RUDDER and when should I use it?
RUDDER
Fosdem - Configurations do you prove yours?
Fosdem - Configurations do you prove yours?
RUDDER
L'audit en continu : clé de la conformité démontrable (#POSS 2018)
L'audit en continu : clé de la conformité démontrable (#POSS 2018)
RUDDER
Fiabilité et conformité continues en production avec Rudder (#BBOOST 2018)
Fiabilité et conformité continues en production avec Rudder (#BBOOST 2018)
RUDDER
Stay up - voyage d'un éditeur de logiciels libres
Stay up - voyage d'un éditeur de logiciels libres
RUDDER
How we scaled Rudder to 10k, and the road to 50k
How we scaled Rudder to 10k, and the road to 50k
RUDDER
What's new and what's next in Rudder
What's new and what's next in Rudder
RUDDER
Poss 2017 : gestion des configurations et mise en conformité chez un service ...
Poss 2017 : gestion des configurations et mise en conformité chez un service ...
RUDDER
Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...
Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...
RUDDER
POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...
POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...
RUDDER
DevOps D-Day 2017 - Gestion des configurations et mise en conformité chez un ...
DevOps D-Day 2017 - Gestion des configurations et mise en conformité chez un ...
RUDDER
RUDDER - Continuous Configuration (configuration management + continuous aud...
RUDDER - Continuous Configuration (configuration management + continuous aud...
RUDDER
More from RUDDER
(20)
What if configuration management didn't need to be lvl60 in dev?
What if configuration management didn't need to be lvl60 in dev?
Servers compliance: audit, remediation, proof
Servers compliance: audit, remediation, proof
OSIS 2019 - Qu’apporte l’observabilité à la gestion de configuration ?
OSIS 2019 - Qu’apporte l’observabilité à la gestion de configuration ?
OW2Con - Configurations, do you prove yours?
OW2Con - Configurations, do you prove yours?
The new plugin ecosystem in RUDDER 5.0
The new plugin ecosystem in RUDDER 5.0
What uses for observing operations of Configuration Management?
What uses for observing operations of Configuration Management?
UX challenges of a UI-centric config management tool
UX challenges of a UI-centric config management tool
What happened in RUDDER in 2018 and what’s next?
What happened in RUDDER in 2018 and what’s next?
What is RUDDER and when should I use it?
What is RUDDER and when should I use it?
Fosdem - Configurations do you prove yours?
Fosdem - Configurations do you prove yours?
L'audit en continu : clé de la conformité démontrable (#POSS 2018)
L'audit en continu : clé de la conformité démontrable (#POSS 2018)
Fiabilité et conformité continues en production avec Rudder (#BBOOST 2018)
Fiabilité et conformité continues en production avec Rudder (#BBOOST 2018)
Stay up - voyage d'un éditeur de logiciels libres
Stay up - voyage d'un éditeur de logiciels libres
How we scaled Rudder to 10k, and the road to 50k
How we scaled Rudder to 10k, and the road to 50k
What's new and what's next in Rudder
What's new and what's next in Rudder
Poss 2017 : gestion des configurations et mise en conformité chez un service ...
Poss 2017 : gestion des configurations et mise en conformité chez un service ...
Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...
Poss 2017 - la continuité, arme secrète de la gestion du si - cas concret de ...
POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...
POSS 2017 : Comment automatiser son infrastructure quand... on a pas le temps...
DevOps D-Day 2017 - Gestion des configurations et mise en conformité chez un ...
DevOps D-Day 2017 - Gestion des configurations et mise en conformité chez un ...
RUDDER - Continuous Configuration (configuration management + continuous aud...
RUDDER - Continuous Configuration (configuration management + continuous aud...
Recently uploaded
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
shyamraj55
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
Anna Loughnan Colquhoun
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Rafal Los
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
BookNet Canada
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
Puma Security, LLC
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
Ridwan Fadjar
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
Pooja Nehwal
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
Pixlogix Infotech
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
ThousandEyes
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Recently uploaded
(20)
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Scala dreaded underscore
1.
Scala dreaded _
François Armand
2.
Too many use
for _ ? © Normation 2010 - 2
3.
Too many use
for _ ? © Normation 2010 - 3
4.
It's always a
kind of joker 1/ “Everything” 2/ “Give me a variable name but – I don't care of what it is – and/or – don't want to pollute my namespace with it” © Normation 2010 - 4
5.
1. Import all
Java “import *” © Normation 2010 - 5
6.
2. var initialization
to default value Highly discourage in idiomatic Scala: – Prefer val against var – Try to always initialize a variable © Normation 2010 - 6
7.
3. Unused variables
In higher order functions © Normation 2010 - 7
8.
3. Unused variables
In pattern matching © Normation 2010 - 8
9.
4. Anonymous parameters
In higher order functions © Normation 2010 - 9
10.
4. Anonymous parameters
In partial functions © Normation 2010 - 10
11.
5. Don't import
name in namespace © Normation 2010 - 11
12.
6. Syntactic sugar
for existential type Existential type ? http://stackoverflow.com/questions/1031042/scalas-existential-types Java: – Type erasure and raw types – “?” generic wildcard Scala © Normation 2010 - 12
13.
6. Syntactic sugar
for existential type And in pattern matching © Normation 2010 - 13
14.
And some more
_ with an other char 1) Accessors in tuples • ("foo", "bar")._2 // getter for “bar” 2) _* In repeated parameter (Java 1.5 varargs) • String.format("one: %s two: %s", "1" , "2") • String.format("one: %s two: %s", Seq("1","2"):_*) In XML pattern matching • See Scala XML book http://www.scalalang.org/node/131 In pattern matching, as sequence wildcard • Search for UnapplySeq documentation 3) In identifier name ending with an operator • ex: “query?” not valide name, use “query_?” 4) In setter name • _= http://stackoverflow.com/questions/1392862/scala-overriding-a-non-abstract-def-with-a-var/1393389#1393389 © Normation 2010 - 14
15.
Q&A
Thanks ! © Normation 2010 15