[HTML payload içeriği buraya]
29 C
Jakarta
Monday, May 18, 2026

JDK 24: The brand new options in Java 24



The vector API is designed to specific vector communications that reliably compile at runtime to optimum vector directions on supported CPU architectures, thus reaching efficiency superior to equal scalar computations. The vector API beforehand was incubated in JDK 16 by means of JDK 23. Targets of the proposal embrace clearly and concisely expressing a variety of vector computations in an API that’s platform-agnostic, that provides dependable runtime compilation and efficiency on x64 and AArch54 architectures, that degrades gracefully and nonetheless features when a vector computation can’t be expressed at runtime, and that aligns with Mission Valhalla, leveraging enhancements to the Java object mannequin.

The class-file API, beforehand previewed in JDK 22 and JDK 23, can be finalized in JDK 24, with minor modifications. This API gives a regular API for parsing, producing, and reworking Java class recordsdata. It goals to offer an API for processing class recordsdata that tracks the category file format outlined by the Java Digital Machine specification. A second purpose is to allow JDK parts emigrate to the usual API, and finally take away the JDK’s inside copy of the third-party ASM library. Adjustments because the second preview embrace a renaming of enum values, removing of some fields, the addition of strategies and methodology overloads, strategies renamed, and removing of interfaces and strategies deemed pointless.

Late barrier enlargement for the G1 rubbish collector is meant to simplify the implementation of G1’s limitations by shifting their enlargement from early within the C2 compilation pipeline to later. The limitations report details about software reminiscence accesses. Targets embrace lowering the execution time of C2 compilation when utilizing the G1 collector, making G1 limitations understandable to HotSpot builders who lack a deep understanding of C2, and guaranteeing that C2 preserves invariants in regards to the relative ordering of reminiscence accesses, safepoints, and limitations. A fourth characteristic is preserving the standard of C2-generated JIT (just-in-time)-compiled code, by way of velocity and dimension.

Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles