Software Development
-
Testing legacy code: Hard-wired dependencies
When pairing with some developers, I’ve noticed that one of the reasons they are not unit testing existing code is…
Read More » -
Four laws of robust software systems
Murphy’s Law (“If anything can go wrong, it will”) was born at Edwards Air Force Base in 1949 at North…
Read More » -
Software Architects Need Not Apply
I saw an online job posting several years ago that listed a set of desired software development and programming skills…
Read More » -
Where do Security Requirements come from?
One of the problems in building a secure application is that it’s not always clear what the security requirements are…
Read More » -
Enterprise class Java code
There’s a natural instinct to assume that everybody else’s code is an untidy, undisciplined mess. But, if we look objectively,…
Read More » -
If you aren’t among those finding bugs you might be among those complaining about them later
Back from vacation and looking forward to the more productive summer times in general I stumbled over a post titled…
Read More » -
Key Exchange Patterns with Web Services Security
When we have message level security with web services – how we achieve integrity and confidentiality is through keys. Keys…
Read More » -
Extract, Inject, Kill: Breaking hierarchies – Part 2
In part one I explained the main idea behind this approach and I started this example. Please read part one before…
Read More » -
Extract, Inject, Kill: Breaking hierarchies – Part 1
Years ago, before I caught the TDD bug, I used to love the template method pattern. I really thought that…
Read More »