Software Development
-
Verifying Secure Password Storage Externally
Many websites (including big ones like Adobe, Yahoo, LinkedIn, Gawker, etc.) store user passwords insecurely. Either in plain text, or…
Read More » -
Software Version Controlling Best Practices
Always use version controlling Use version controlling/source control even if one developer exists. This issue brings change tracking and versioning…
Read More » -
Caching best practices
Introduction There is an irresistible attraction to writing custom caching solutions, since it seems to be the easiest path to…
Read More » -
An Open Source License to Increase Your Street Credibility
Many of us geeks don’t really care about users, tractions, etc. when we spam GitHub with our little toy projects.…
Read More » -
The Foreman Role in a Team
There is a lot of discussion about the need for a foreman role in a software team. Robert C. Martin…
Read More » -
Dependency inversion: the structure logarithm
Re-examining benefits. Through the corroded dripping pipes of transitive dependencies, ripple effects gush. Programmers sometimes spend arduous days clambering down…
Read More » -
We Need More Foremen
This week I read a blog post titled Where is the Foreman by Robert “Uncle Bob” Martin. It made me…
Read More » -
Why We Need More Complex Programming Languages (Yes, You Heard Me Right!)
My daughter is learning how to read right now. As I was thinking about this blog post, I just walked…
Read More » -
Why Embracing Legacy is Wise
Legacy isn’t sexy. When hearing “legacy”, people think of COBOL. Those good old days when people talked to machines like…
Read More »