Home » Author Archives: Remon Sinnema (page 3)

Author Archives: Remon Sinnema

How To Secure an Organization That Is Under Constant Attack

software-development-2-logo

There have been many recent security incidents at well-respected organizations like the Federal Reserve, the US Energy Department, the New York Times, and the Wall Street Journal. If these large organizations are incapable of keeping unwanted people off their systems, then who is? The answer unfortunately is: not many. So we must assume our systems are compromised. Compromised is the ...

Read More »

How Friction Slows Us Down in Software Development

software-development-2-logo

I once joined a project where running the “unit” tests took three and a half hours. As you may have guessed, the developers didn’t run the tests before they checked in code, resulting in a frequently red build. Running the tests just gave too much friction for the developers. I define friction as anything that resist the developer while she ...

Read More »

The Lazy Developer’s Way to an Up-To-Date Libraries List

gradle-logo

Last time I shared some tips on how to use libraries well. I now want to delve deeper into one of those: Know What Libraries You Use. Last week I set out to create such a list of embedded components for our product. This is a requirement for our Security Development Lifecycle (SDL). However, it’s not a fun task. As ...

Read More »

Towards a Theory of Test-Driven Development

software-development-2-logo

This post examines how well we really understand the practice of Test-Driven Development (TDD).                   Red, Green, Refactor By now we all know that Test-Driven Development (TDD) follows a simple cycle consisting of these steps: Start by writing a test. Since there is no code, it will fail (Red) Write just enough ...

Read More »

Seven Tips For Using Third-Party Libraries

software-development-2-logo

There are many good reasons to use code written by others in your application. This post describes some best practices to optimize your re-use experience.                   Library Use Gone Bad I recently discovered that a library we use for OpenID didn’t handle every situation properly. When I checked for an update, I ...

Read More »

TDD and the Transformation Priority Premise

software-development-2-logo

Last time, we looked at the Red/Green/Refactor phases of Test-Driven Development (TDD). This time we’ll take a detailed look at the transformations applied in the Green phase.                 The Transformation Priority Premise Most of you will have heard of the refactorings we apply in the last TDD phase, but there are corresponding standardized ...

Read More »

The Differences Between Test-First Programming and Test-Driven Development

software-development-2-logo

There seems to be some confusion between Test-First Programming and Test-Driven Development (TDD). This post explains that merely writing the tests before the code doesn’t necessarily make it TDD.             Similarities Between Test-First Programming and Test-Driven Development It’s not hard to see why people would confuse the two, since they have many things in common. ...

Read More »

How to Create Extensible Java Applications

osgi-alliance-logo

Many applications benefit from being open to extension. This post describes two ways to implement such extensibility in Java. Extensible Applications Extensible applications are applications whose functionality can be extended without having to recompile them and sometimes even without having to restart them. This may happen by simply adding a jar to the classpath, or by a more involved installation ...

Read More »

Using Cryptography in Java Applications

java-logo

This post describes how to use the Java Cryptography Architecture (JCA) that allows you to use cryptographic services in your applications. Java Cryptography Architecture Services The JCA provides a number of cryptographic services, like message digests and signatures. These services are accessible through service specific APIs, like MessageDigest and Signature. Cryptographic services abstract different algorithms. For digests, for instance, you ...

Read More »

Permissions in OSGi

osgi-alliance-logo

In a previous post, we looked at implementing a sandbox for Java applications in which we can securely run mobile code. This post looks at how to do the same in an OSGi environment. OSGi The OSGi specification defines a dynamic module system for Java. As such, it’s a perfect candidate for implementing the kind of plugin system that would ...

Read More »
Want to take your Java Skills to the next level?
Grab our programming books for FREE!
  • Save time by leveraging our field-tested solutions to common problems.
  • The books cover a wide range of topics, from JPA and JUnit, to JMeter and Android.
  • Each book comes as a standalone guide (with source code provided), so that you use it as reference.
Last Step ...

Where should we send the free eBooks?

Good Work!
To download the books, please verify your email address by following the instructions found on the email we just sent you.