List/Grid Software Development Subscribe to the RSS feed of category Software Development

software-development-logo

Insidi-DoS: Internally negotiated, self-image-damaging DoS

What’s more damning and ego-bruising than an external DoS (denial of service) attack? Why, an internally inspired one of course. Which self-respecting company would do such a ...
software-development-logo

Technology Decisions Are About Trade Offs and Solving Problems

At some point in the last decade we hit the inflection point where distributed systems, and all their complexities, became the common reality. Maybe it was the need to change how we ...
software-development-2-logo

Can we learn to restrict our work to a budget?

I’ve previously talked about the idea of shifting from estimates to budgets. The fundamental point of this article is that it’s more useful to control costs than to predict costs. The ...
software-development-2-logo

Software demand curve

Returning to my series of posts applying the tools of economics to software development – Supply & Demand in software development, Software supply over time and Software supply ...
software-development-2-logo

Native vs Mobile Web vs Hybrid applications

We have decided on developing a mobile application, but what type of application ? There has been an ongoing debate with legitimate pros and cons of developing a Native app or a mobile ...
software-development-2-logo

What Open Source is (and isn’t) and why you should use it?

Open Source software plays a big role in the Java ecosystem (just think Maven, all the libraries in Maven Central, Gradle, OpenJDK, Ant, Ivy, Eclipse, Ant and so on). There is also ...
software-development-2-logo

Common excuses a Developer makes when a feature doesn’t work [And how to avoid them in the future]

I always feel that Developers should have an attitude for development, which I have detailed in the blog post Attitudes of a Great Software Developer.  But generally when it comes ...
software-development-2-logo

Acceptance Testing: Blaming the Tools

About 5 years ago I was on a project to build a system for collateral management. The system was connected to a large financial network, and got its instructions through standardized ...
software-development-2-logo

This is Stuff: Cryptography & Theory 1: Meaning of Secure

Cryptography & Theory is series of blog posts on things I learned in coursera stanford online crypto class. The class contained just right mixture of theory, math and programming ...
software-development-2-logo

14 Code Refactoring smells you can easily sense and What you can do about it?

This post is specifically intended to Project Managers although developers and testers can also get reasonable inputs from this post.  Generally projects tend to accumulate a lot of ...
Java Code Geeks and all content copyright © 2010-2014, Exelixis Media Ltd | Terms of Use
All trademarks and registered trademarks appearing on Java Code Geeks are the property of their respective owners.
Java is a trademark or registered trademark of Oracle Corporation in the United States and other countries.
Java Code Geeks is not connected to Oracle Corporation and is not sponsored by Oracle Corporation.

Sign up for our Newsletter

15,153 insiders are already enjoying weekly updates and complimentary whitepapers! Join them now to gain exclusive access to the latest news in the Java world, as well as insights about Android, Scala, Groovy and other related technologies.

As an extra bonus, by joining you will get our brand new e-books, published by Java Code Geeks and their JCG partners for your reading pleasure! Enter your info and stay on top of things,

  • Fresh trends
  • Cases and examples
  • Research and insights
  • Two complimentary e-books