List/Grid Author Archives Subscribe to the RSS feed of Remon Sinnema

software-development-2-logo

How Friction Slows Us Down in Software Development

I once joined a project where running the “unit” tests took three and a half hours. As you may have guessed, the developers didn’t run the tests before they checked in code, resulting in a frequently red build. Running the t ...
gradle-logo

The Lazy Developer’s Way to an Up-To-Date Libraries List

Last time I shared some tips on how to use libraries well. I now want to delve deeper into one of those: Know What Libraries You Use. Last week I set out to create such a list of embedded components for our product. This is a requ ...
software-development-2-logo

Towards a Theory of Test-Driven Development

This post examines how well we really understand the practice of Test-Driven Development (TDD).                   Red, Green, Refactor By now we all know that Test-Driven Development (T ...
software-development-2-logo

Seven Tips For Using Third-Party Libraries

There are many good reasons to use code written by others in your application. This post describes some best practices to optimize your re-use experience.                   Library Use ...
software-development-2-logo

TDD and the Transformation Priority Premise

Last time, we looked at the Red/Green/Refactor phases of Test-Driven Development (TDD). This time we’ll take a detailed look at the transformations applied in the Green phase.               &nb ...
software-development-2-logo

The Differences Between Test-First Programming and Test-Driven Development

There seems to be some confusion between Test-First Programming and Test-Driven Development (TDD). This post explains that merely writing the tests before the code doesn’t necessarily make it TDD.         &nb ...
osgi-alliance-logo

How to Create Extensible Java Applications

Many applications benefit from being open to extension. This post describes two ways to implement such extensibility in Java. Extensible Applications Extensible applications are applications whose functionality can be extended wit ...
java-logo

Using Cryptography in Java Applications

This post describes how to use the Java Cryptography Architecture (JCA) that allows you to use cryptographic services in your applications. Java Cryptography Architecture Services The JCA provides a number of cryptographic service ...
osgi-alliance-logo

Permissions in OSGi

In a previous post, we looked at implementing a sandbox for Java applications in which we can securely run mobile code. This post looks at how to do the same in an OSGi environment.OSGi The OSGi specification defines a dynamic m ...
java-logo

Sandboxing Java Code

In a previous post, we looked at securing mobile Java code. One of the options for doing so is to run the code in a cage or sandbox. This post explores how to set up such a sandbox for Java applications. Security Manager The secur ...
Java Code Geeks and all content copyright © 2010-2014, Exelixis Media Ltd | Terms of Use
All trademarks and registered trademarks appearing on Java Code Geeks are the property of their respective owners.
Java is a trademark or registered trademark of Oracle Corporation in the United States and other countries.
Java Code Geeks is not connected to Oracle Corporation and is not sponsored by Oracle Corporation.

Sign up for our Newsletter

15,153 insiders are already enjoying weekly updates and complimentary whitepapers! Join them now to gain exclusive access to the latest news in the Java world, as well as insights about Android, Scala, Groovy and other related technologies.

As an extra bonus, by joining you will get our brand new e-books, published by Java Code Geeks and their JCG partners for your reading pleasure! Enter your info and stay on top of things,

  • Fresh trends
  • Cases and examples
  • Research and insights
  • Two complimentary e-books
Get tutored by the Geeks! JCG Academy is a fact... Join Now
Hello. Add your message here.