retweet icon bullhorn icon reply icon info icon flickr icon tumblr icon vimeo icon reddit icon podcast icon angle-down icon angle-left icon angle-right icon angle-up icon ban icon hamburger icon book icon bookmark icon bug icon caret-down icon caret-left icon caret-right icon caret-up icon chain icon check icon check-circle icon chevron-down icon chevron-left icon chevron-right icon chevron-up icon circle icon circle-o icon clone icon close icon download-cloud icon code icon download icon ellipsis icon envelope icon warning icon external-link icon eye icon eye-slash icon facebook icon github icon google-plus icon heart icon heart-o icon home icon info-circle icon instagram icon linkedin icon lock icon medium icon minus-circle icon send icon pause-circle icon play-circle icon plus-circle icon question-circle icon quote-left icon quote-right icon rss-square icon search icon share-alt icon slack icon snapchat icon ticket icon twitter icon wheelchair icon youtube icon Skip to main content
University of Texas at Austin - home
    Home
  • Home
  • Quick Links
    • Office of the CIO
    • University IT Policies
    • UT Austin Disaster Recovery Planning (UT Ready)
    • Acceptable Use Acknowledgement Form (for staff/faculty)
    • Travel to Foreign Adversary Nations
    • Security Exception Request
    • Stolen Equipment Report Form
    • Engagement Request Form
    • Anti-Virus Software
    • Vendor Product Security Assessment Request
    • Hall of Fame
    • Why You Should Work In Cybersecurity
  • Policies
    • Information Resources Use and Security Policy
    • Acceptable Use Policy for University Employees
    • Acceptable Use Policy for University Students
    • Digital Millennium Copyright Act
    • Policies, Standards, and Guidelines Continued
    • Minimum Security Standards
  • Support Topics
    • Security Awareness
    • Compromised Credentials
    • EDUCATION & OUTREACH
    • GETTING ANTI-VIRUS
    • ISORA
    • PROCEDURAL DOCUMENTATION
    • Stache Basics
    • VULNERABILITY MANAGEMENT PROGRAM
    • WAYS TO IMPROVE YOUR SECURITY POSTURE - IT SUPPORT COMMUNITY
  • Report Violation
  • Contact

Avoid Non-Final Static Variables

Avoid Non-Final Static Variables

Breadcrumb

  • Home
  • Avoid Non-Final Static Variables
Submitted by Anonymous (not verified) on Wed, 07/29/2015 - 14:14
Section
10.2.1
Top Level
Code Quality
Sub Level
10.2 Best Practices for Concurrent Programming
Java
The application should avoid the use of static variables other than final (constant) declarations.
ISO eye

Information Security Office

Copyright © 2006-2025, Information Security Office. All rights reserved.
Privacy Policy  |   Accessibility Policy
UT Austin logo