Home » Software Development » Page 5

Software Development

New Metric: the Distance of Coupling

Encapsulation, as you know, is one of the four key principles in object-oriented programming. Encapsulation, according to Grady Booch et al., is “the process of hiding all the secrets of an object that do not contribute to its essential characteristics.” Practically speaking, it’s about those private attributes that we use in Java and C++: they are not visible to the ...

Read More »

How to Hide CloudHub Properties?

Main points: property values can be hidden in Runtime Managerproperty names must be listed in the mule-artifact.xml fileproperty values can be edited manually and will remain maskedvalues remain masked even if removed from mule-artifact.xml file CloudHub Properties CloudHub supports the hiding of application properties in Anypoint Runtime Manager. The property name is displayed but the value is masked with asterisks, ...

Read More »

Zenserp Review: How to Scrape SERP Data Faster

Whether you’re a developer or not, one thing for sure is that scraping SERPs (Search Engine Results Page) can be a tough nut to crack on Google or any other search engine. The main hold up is that search engines slow down data collection with technology such as Captchas which get automatically triggered when they detect there might not be ...

Read More »

Target Architecture

In the last two posts, we looked at generic architecture diagrams and security-specific diagrams. These diagrams reflect the current architecture of a system. This time we will look at using diagrams to depict a desired future architecture, or target architecture. The point of a target architecture is to paint a picture of the desired state that will act as the ...

Read More »

What is Garbage collection log, Thread dump, Heap dump?

Java Virtual Machine (JVM) generates 3 critical artifacts that are useful for optimizing the performance and troubleshooting production problems. Those artifacts are: Garbage collection (GC) logThread DumpHeap Dump In this article let us try to understand these 3 critical artifacts, where to use them, how does it look, how to capture them, how to analyze them and their differences. 1. ...

Read More »

How to write clean code variables

We know how the code we write works, we understand it, we don’t need comments, it’s obvious, of course, we wrote it. This is what we all think and its true – well today its true, but tomorrow, next week, next year – it’s not likely to be so true. And do others understand the way you code? Is the ...

Read More »

OpenSSL Key and IV Padding

OpenSSL is an omnipresent tool when it comes to encryption. While in Java we are used to the native Java implementations of cryptographic primitives, most other languages rely on OpenSSL. Yesterday I was investigating the encryption used by one open source tool written in C, and two things looked strange: they were using a 192 bit key for AES 256, ...

Read More »