Stephan van Hulst wrote:Personally I think if you're interested in learning about the new language features, you're probably better off checking out the Java for the Impatient series by Cay Horstmann. The Effective Java books contain good advice on a myriad of topics that are not necessarily related to newer language versions. That's not to say the books wouldn't be great to have both, since one will introduce you to the topics and the other will give good advice on using them.
Randy Maddocks wrote:
Tim Holloway wrote:using Java since 1936
Campbell Ritchie wrote:And I was using Java® long before half past seven
It took me a few seconds, but when I got it, it made my day.
Good catch Jeanne, where the "recruiter" asks for a copy of your resume that he "supposedly" already has. My dad always told me: when in doubt, or it doesn't feel right in your gut, trust your instincts, or you could get scammed. And he told me that before Internet scammers were around.
Sort of on-topic: Our IT Security team quite often will test internal users to try and catch them off-guard. On one occasion they created a fake LinkedIn profile, which, I have to note, looked authentic (the "person" was a Director of Technical Services at Microsoft, had a nice profile picture and all), with an invitation for users to respond to the profile and provide some information about themselves. Before I start sounding condescending about users who fell for it, I honestly admit I was almost fooled by it as well (and I had been in a technical/security role in IT for several years before becoming a developer). But some users not only responded to it, they provided waaaay too much personal info. At our next IT gathering the security team got up and did their presentation about it. Without giving away employee names, they showed just how much information the fooled users provided - name, address, phone number, job title and description, employer...The point, of course, was to show how easy it is to fall for these nefarious scammers, and how to be more knowledgeable in identifying what is and isn't authentic/malicious.