List/Grid Author Archives Subscribe to the RSS feed of Remon Sinnema

software-development-2-logo

Conway’s Game of Life and the Flyweight Pattern

Conway’s Game of Life is fascinating, both from a functional and from a technical perspective. This may explain why it’s often used for code retreats. Code retreats are a fun way ...
java-logo

The Decorator Pattern

The Decorator Pattern One design pattern that I don’t see being used very often is Decorator. I’m not sure why this pattern isn’t more popular, as it’s quite handy. The Decorator ...
agile-logo

Communicate Through Stories Rather Than Tasks

Communicate Through Stories Rather Than Tasks Last time I talked about interfaces between pieces of code. Today I want to discuss the interface between groups of people involved in ...
enterprise-java-logo

REST 101 For Developers

Local Code Execution Functions in high-level languages like C are compiled into procedures in assembly. They add a level of indirection that frees us from having to think about memory ...
software-development-2-logo

How To Start With Software Security – Part 2

Last time, I wrote about how an organization can get started with software security. Today I will look at how to do that as an individual. From Development To Secure Development As ...
enterprise-java-logo

How To Implement Input Validation For REST resources

How To Implement Input Validation For REST resources The SaaS platform I’m working on has a RESTful interface that accepts XML payloads. Implementing REST Resources For a Java shop ...
java-logo

Securing HTTP-based APIs With Signatures

I work at EMC on a platform on top of which SaaS solutions can be built. This platform has a RESTful HTTP-based API, just like a growing number of other applications. With development ...
software-development-2-logo

How To Remove Friction From Your Version Control Experience

Last week, I spend several days fixing a bug that only surfaced in a distributed environment.I felt pressure to fix it quickly, because our continuous integration build was red, and ...
software-development-2-logo

How To Secure an Organization That Is Under Constant Attack

There have been many recent security incidents at well-respected organizations like the Federal Reserve, the US Energy Department, the New York Times, and the Wall Street Journal. If ...
software-development-2-logo

How Friction Slows Us Down in Software Development

I once joined a project where running the “unit” tests took three and a half hours. As you may have guessed, the developers didn’t run the tests before they checked in code, resulting ...
Java Code Geeks and all content copyright © 2010-2014, Exelixis Media Ltd | Terms of Use
All trademarks and registered trademarks appearing on Java Code Geeks are the property of their respective owners.
Java is a trademark or registered trademark of Oracle Corporation in the United States and other countries.
Java Code Geeks is not connected to Oracle Corporation and is not sponsored by Oracle Corporation.

Sign up for our Newsletter

15,153 insiders are already enjoying weekly updates and complimentary whitepapers! Join them now to gain exclusive access to the latest news in the Java world, as well as insights about Android, Scala, Groovy and other related technologies.

As an extra bonus, by joining you will get our brand new e-books, published by Java Code Geeks and their JCG partners for your reading pleasure! Enter your info and stay on top of things,

  • Fresh trends
  • Cases and examples
  • Research and insights
  • Two complimentary e-books