List/Grid Software Development Subscribe to the RSS feed of category Software Development

findbugs-logo

Findbugs Warnings By Sample

The FindBugs™ bug descriptions of the online documentation are concise and well written. Unfortunately, some parts of the descriptions are not easy to understand (even for experienced ...
software-development-2-logo

Testing legacy code: Hard-wired dependencies

When pairing with some developers, I’ve noticed that one of the reasons they are not unit testing existing code is because, quite often, they don’t know how to overcome ...
software-development-2-logo

Four laws of robust software systems

Murphy’s Law (“If anything can go wrong, it will”) was born at Edwards Air Force Base in 1949 at North Base. It was named after Capt. Edward A. Murphy, an engineer ...
software-development-2-logo

Software Architects Need Not Apply

I saw an online job posting several years ago that listed a set of desired software development and programming skills and concluded with the statement, “Architects Need Not ...
software-development-2-logo

Where do Security Requirements come from?

One of the problems in building a secure application is that it’s not always clear what the security requirements are and where they are supposed to come from. Are security requirements ...
software-development-2-logo

Enterprise class Java code

There’s a natural instinct to assume that everybody else’s code is an untidy, undisciplined mess. But, if we look objectively, some people genuinely are able to write well crafted ...
software-development-2-logo

If you aren’t among those finding bugs you might be among those complaining about them later

Back from vacation and looking forward to the more productive summer times in general I stumbled over a post titled ‘ The most important lesson in Java EE‘ ...
software-development-2-logo

Key Exchange Patterns with Web Services Security

When we have message level security with web services – how we achieve integrity and confidentiality is through keys. Keys are used to sign and encrypt messages been passed from ...
software-development-2-logo

Extract, Inject, Kill: Breaking hierarchies – Part 2

 In part one I explained the main idea behind this approach and  I started this example. Please read part one before reading this post Although the main ideas of Extract, ...
software-development-2-logo

Extract, Inject, Kill: Breaking hierarchies – Part 1

Years ago, before I caught the TDD bug, I used to love the template method pattern. I really thought that it was a great way to have an algorithm with polymorphic parts. ...
Java Code Geeks and all content copyright © 2010-2014, Exelixis Media Ltd | Terms of Use | Privacy Policy
All trademarks and registered trademarks appearing on Java Code Geeks are the property of their respective owners.
Java is a trademark or registered trademark of Oracle Corporation in the United States and other countries.
Java Code Geeks is not connected to Oracle Corporation and is not sponsored by Oracle Corporation.

Sign up for our Newsletter

20,709 insiders are already enjoying weekly updates and complimentary whitepapers! Join them now to gain exclusive access to the latest news in the Java world, as well as insights about Android, Scala, Groovy and other related technologies.

As an extra bonus, by joining you will get our brand new e-books, published by Java Code Geeks and their JCG partners for your reading pleasure! Enter your info and stay on top of things,

  • Fresh trends
  • Cases and examples
  • Research and insights
  • Two complimentary e-books