Software Development
-
Software Architects Need Not Apply
I saw an online job posting several years ago that listed a set of desired software development and programming skills…
Read More » -
Where do Security Requirements come from?
One of the problems in building a secure application is that it’s not always clear what the security requirements are…
Read More » -
Enterprise class Java code
There’s a natural instinct to assume that everybody else’s code is an untidy, undisciplined mess. But, if we look objectively,…
Read More » -
If you aren’t among those finding bugs you might be among those complaining about them later
Back from vacation and looking forward to the more productive summer times in general I stumbled over a post titled…
Read More » -
Key Exchange Patterns with Web Services Security
When we have message level security with web services – how we achieve integrity and confidentiality is through keys. Keys…
Read More » -
Extract, Inject, Kill: Breaking hierarchies – Part 2
In part one I explained the main idea behind this approach and I started this example. Please read part one before…
Read More » -
Extract, Inject, Kill: Breaking hierarchies – Part 1
Years ago, before I caught the TDD bug, I used to love the template method pattern. I really thought that…
Read More » -
Eclipse Project: Releases, Plans, and Reviews
For each release, an Eclipse project is required to provide a project plan. The project plan is created at the…
Read More » -
Class diagram generation from Java source
UMLGraph allows the declarative specification and drawing of UML class and sequence diagrams. The specification is done in text diagrams,…
Read More »