List/Grid Software Development Subscribe to the RSS feed of category Software Development

apache-bigtop-logo

Apache Bigtop – Installing Hadoop

Ah!! The name is everywhere, carried with the wind. Apache Hadoop!! The BIG DATA crunching platform! We all know how alien it can be at start too! Phew!! :oIts my personal experience, ...
findbugs-logo

Findbugs Warnings By Sample

The FindBugs™ bug descriptions of the online documentation are concise and well written. Unfortunately, some parts of the descriptions are not easy to understand (even for experienced ...
software-development-2-logo

Testing legacy code: Hard-wired dependencies

When pairing with some developers, I’ve noticed that one of the reasons they are not unit testing existing code is because, quite often, they don’t know how to overcome ...
software-development-2-logo

Four laws of robust software systems

Murphy’s Law (“If anything can go wrong, it will”) was born at Edwards Air Force Base in 1949 at North Base. It was named after Capt. Edward A. Murphy, an engineer ...
software-development-2-logo

Software Architects Need Not Apply

I saw an online job posting several years ago that listed a set of desired software development and programming skills and concluded with the statement, “Architects Need Not ...
software-development-2-logo

Where do Security Requirements come from?

One of the problems in building a secure application is that it’s not always clear what the security requirements are and where they are supposed to come from. Are security requirements ...
software-development-2-logo

Enterprise class Java code

There’s a natural instinct to assume that everybody else’s code is an untidy, undisciplined mess. But, if we look objectively, some people genuinely are able to write well crafted ...
software-development-2-logo

If you aren’t among those finding bugs you might be among those complaining about them later

Back from vacation and looking forward to the more productive summer times in general I stumbled over a post titled ‘ The most important lesson in Java EE‘ ...
software-development-2-logo

Key Exchange Patterns with Web Services Security

When we have message level security with web services – how we achieve integrity and confidentiality is through keys. Keys are used to sign and encrypt messages been passed from ...
software-development-2-logo

Extract, Inject, Kill: Breaking hierarchies – Part 2

 In part one I explained the main idea behind this approach and  I started this example. Please read part one before reading this post Although the main ideas of Extract, ...
Java Code Geeks and all content copyright © 2010-2014, Exelixis Media Ltd | Terms of Use | Privacy Policy | Contact
All trademarks and registered trademarks appearing on Java Code Geeks are the property of their respective owners.
Java is a trademark or registered trademark of Oracle Corporation in the United States and other countries.
Java Code Geeks is not connected to Oracle Corporation and is not sponsored by Oracle Corporation.
Do you want to know how to develop your skillset and become a ...
Java Rockstar?

Subscribe to our newsletter to start Rocking right now!

To get you started we give you two of our best selling eBooks for FREE!

Get ready to Rock!
You can download the complementary eBooks using the links below:
Close