List/Grid Software Development Subscribe to the RSS feed of category Software Development

software-development-2-logo

How to Eliminate Bugs Through High Cohesion

Intuition tells us that methods like these ones suffer from a distinct code smell:                     CompilationTask getTask( ...
eclipse-logo

Using the AutoValue Code Generator in Eclipse

My colleague Moritz of EclipseSource recently came across Google Auto, a collection of Java code generators. AutoValue is one of them and generates Java code for immutable objects. ...
apache-cassandra-logo

Apache Cassandra steaming through 2.1 Release

Apache Cassandra is a high performance database system used in an ever growing number of enterprise companies to whom scalability is of major importance. For instance, Netflix, ebay, ...
software-development-2-logo

Why shouldn’t I test private methods?

Newcomers to TDD ask some interesting questions, here’s one I was asked recently: testing private methods is bad, but why? How did we get here? If you’re trying to test private ...
software-development-2-logo

Big data: when single node is better than clustered

There’s a lot of hype about “big data” and a general trend to try to apply Hadoop to almost every problem. However, sometimes it turns out that you can get much better results ...
software-development-2-logo

Decision making, problem solving, introducing ideas, being influencial

Usually when people think about software development, they just have the typical nerds in mind, shy but smart, introvert people sitting in (often) dark rooms hammering down obscure ...
software-development-2-logo

Use KISS consciously

A while ago I wrote about few design paradigms to keep in mind when designing and implementing a certain component. Among them, the famous K.I.S.S. (Keep It Simple, Stupid) kept on ...
software-development-2-logo

Verifying Secure Password Storage Externally

Many websites (including big ones like Adobe, Yahoo, LinkedIn, Gawker, etc.) store user passwords insecurely. Either in plain text, or encrypted (reversible), or using a broken or brute-forceable ...
software-development-2-logo

Software Version Controlling Best Practices

Always use version controlling Use version controlling/source control even if one developer exists. This issue brings change tracking and versioning of the application continuously. ...
software-development-2-logo

Caching best practices

Introduction There is an irresistible attraction to writing custom caching solutions, since it seems to be the easiest path to “improving” the overall application performance. Well, ...
Java Code Geeks and all content copyright © 2010-2014, Exelixis Media Ltd | Terms of Use | Privacy Policy
All trademarks and registered trademarks appearing on Java Code Geeks are the property of their respective owners.
Java is a trademark or registered trademark of Oracle Corporation in the United States and other countries.
Java Code Geeks is not connected to Oracle Corporation and is not sponsored by Oracle Corporation.

Sign up for our Newsletter

20,709 insiders are already enjoying weekly updates and complimentary whitepapers! Join them now to gain exclusive access to the latest news in the Java world, as well as insights about Android, Scala, Groovy and other related technologies.

As an extra bonus, by joining you will get our brand new e-books, published by Java Code Geeks and their JCG partners for your reading pleasure! Enter your info and stay on top of things,

  • Fresh trends
  • Cases and examples
  • Research and insights
  • Two complimentary e-books