Introduction to Eiffel
Suppose you need a class to manipulate a structured collection of objects—an array of INSECTs, a parse tree, a hashed list of sales prospects, or some such thing?
Some object-oriented languages furnish a general approach. You construct a template for, say, a LINKED_LIST or an ARRAY. You then use this template with some arguments indicating the classes to be used in constructing the particular LINKED_LIST or whatever.
In Eiffel, this capability is called genericity, and the templates are generic classes. As usual, this is done in a way that does the job and yet is so simple, it seems effortless.
Suppose you are writing an ant hill. First you need some ants.
class ANT inherit INSECT -- A basic ant. It has features to crawl, -- forage, dig, tend the young, and so on. ... end class CARPENTER_ANT inherit ANT redefine -- Redefine some things. -- These chew on your house and your apple -- tree. ... end; ... end class ARMY_ANT inherit ANT redefine -- These are always on the go. -- You hope they don't stop by your place -- for dinner. ... end; ... end
Now you are ready for ant hills. Let us suppose you already have some class that models insect societies. Its header might look like this
class INSECT_SOCIETY[G->INSECT] ...
which indicates that an INSECT_SOCIETY may be formed using a parameter that conforms to INSECT. Loosely, this means any descendent INSECT will do. anthill:INSECT_SOCIETY[ANT] declares a reference to an INSECT_SOCIETY containing ants. This reference may then be attached an INSECT_SOCIETY containing CARPENTER_ANT, ARMY_ANT, or any other descendent of ANT we have defined. In fact, this allows us to reference an anthill comprising more than one kind of ant, which is convenient, as some anthills may contain more than one kind of ant.
In writing a specific container class, for example, we may wish to take advantage of things we know about insects in the features of the container class. It would never do, in such a situation, for example, to enter an object of class DOG or HAMMER into this container. The type-safe mechanism for doing this is called constrained genericity and is illustrated above in the header line for class INSECT_SOCIETY.
The Eiffel programming language offers power, simplicity, strong type checking, and numerous other amenities. With an open specification for both the language and the kernel libraries, and support from multiple vendors, Eiffel now stands poised to take off.
According to one vendor, most interest lately has come from people who are turning to Eiffel having used C++ for some years and who have become convinced that the training costs and the complexity of that language are not justified by the features provided.
The more adventurous among us who have a thirst to tackle an object-oriented programming language unhindered by excess baggage from the past ways of doing things may wish to further explore this language.
In my next article, I'll write more about ISE Eiffel and the compiler and tools from Tower Technology of Austin, Texas. I'll also offer a few thoughts about how to get started with this language.
Fast/Flexible Linux OS Recovery
On Demand Now
In this live one-hour webinar, learn how to enhance your existing backup strategies for complete disaster recovery preparedness using Storix System Backup Administrator (SBAdmin), a highly flexible full-system recovery solution for UNIX and Linux systems.
Join Linux Journal's Shawn Powers and David Huffman, President/CEO, Storix, Inc.
Free to Linux Journal readers.Register Now!
- Server Hardening
- May 2016 Issue of Linux Journal
- EnterpriseDB's EDB Postgres Advanced Server and EDB Postgres Enterprise Manager
- The Humble Hacker?
- The US Government and Open-Source Software
- BitTorrent Inc.'s Sync
- The Death of RoboVM
- Open-Source Project Secretly Funded by CIA
- New Container Image Standard Promises More Portable Apps
- ACI Worldwide's UP Retail Payments
In modern computer systems, privacy and security are mandatory. However, connections from the outside over public networks automatically imply risks. One easily available solution to avoid eavesdroppers’ attempts is SSH. But, its wide adoption during the past 21 years has made it a target for attackers, so hardening your system properly is a must.
Additionally, in highly regulated markets, you must comply with specific operational requirements, proving that you conform to standards and even that you have included new mandatory authentication methods, such as two-factor authentication. In this ebook, I discuss SSH and how to configure and manage it to guarantee that your network is safe, your data is secure and that you comply with relevant regulations.Get the Guide