• submit to reddit
Rob J Hyndman10/16/12
0 replies

An R Graph with Two Y-Axes

I’ve been asked how to do this sev­eral times, so I thought it might help to put an exam­ple online.

Eric Berg10/16/12
0 replies

Defining the Enterprise Cloud Service: Singular Focus on the Customer

Focus on the customer is necessary to truly have an enterprise cloud. Think back to Mat Honan’s personal identity hack: part of the attack surface included Apple’s and Amazon’s customer support mechanisms that were in place on Mat’s accounts — which isn’t surprising.

Eric Gregory10/16/12
0 replies

Creating a Hello World Application for Windows Azure in Eclipse

The following steps show you how to create and deploy a basic JSP application to Windows Azure using the Windows Azure Plugin for Eclipse with Java.

Zemian Deng10/16/12
3 replies

What's up with the JUnit and Hamcrest Dependencies?

It's awesome that JUnit is recognizing the usefulness of Hamcrest, because I use these two a lot. However, I find JUnit packaging of their dependencies odd, and can cause class loading problem if you are not careful.

Amit Saha10/16/12
0 replies

3 Tools for Making Your RaspberryPi Accessible

The problem here is having a public facing hostname/IP address for your Raspberry Pi. Luckly, you can use PageKite, Localtunnel, and showoff.io. Links included.

Henrik Warne10/16/12
0 replies

Book Review: How Google Tests Software

When I found out about the book ”How Google Tests Software“, it didn’t take long until I had ordered a copy. I find it quite fascinating to read about how Google does things, whether it is about their development process, their infrastructure, their hiring process, or, in this case, how they test their software. I am a developer at heart, but I have worked for a few years as a tester, so testing is also dear to me.

Jens Schauder10/16/12
0 replies

Avoid Corner Cases

Sometimes the way you choose to implement affects the existence of boundaries. Take for example the Standard Code Retreat programming problem of Conways Game Of Life. Follow the link if you don’t know it, I’ll wait.

Tomasz Nurkiewicz10/16/12
2 replies

Where Do the Stack Traces Come From?

I believe that reading and understanding stack traces is an essential skill every programmer should posses in order to effectively troubleshoot problems with every JVM language. So may we start with a little quiz? Given the following piece of code, which methods will be present in the stack trace? foo(), bar() or maybe both?

Konrad Garus10/16/12
0 replies

Configuration Files in Clojure

I recently made a contribution to ghijira, a small tool written in Clojure for exporting issues from GitHub in JIRA-compatible format. One of the problems to solve there was loading configuration from file.

Allen Coin10/16/12
0 replies

Microsoft Releases Pricing Info for Surface Tablets, Taking Pre-Orders

Today Microsoft has released pricing information and hardware details for three of the Surface tablets.

Justin Bozonier10/16/12
0 replies

Thoughts on the Zero Defect Mentality of TDD

It was a normal day at work, myself and another co-worker were strongly and passionately arguing for the benefits of strict, pure, clean TDD against a couple of other equally passionate co-workers . . .

Arnon Rotem-gal-oz10/16/12
0 replies

SOA and Big Data

Read why SOA can be important in considerations around Big Data handling. It isn't only about getting all the data there and having slick algorithms.

Eric Minick10/16/12
0 replies

Release Manifests, Smart Deploys, and Recreating Environments

When I work with customers who have even moderately complex deployments, they rarely deploy just a single build at a time. Usually, a collection of builds, updates and configuration is released in some coordinated fashion. Release manifests help with that coordination.

Stoimen Popov10/15/12
0 replies

Algorithm of the Week: Dijkstra Shortest Path in a Graph

We must only answer the question is BFS the best algorithm that finds the shortest path between any two nodes of the graph?

Troy Hunt10/15/12
0 replies

Hacking is Child's Play: How My 3 Year Old Performed a SQL Injection w/ Havij

You know what really strikes me about a lot of the hacks we’ve seen lately? It just seems too easy. I mean we’re seeing a huge number of attacks (an unprecedented number, by some figures) and all too often the perpetrator is a kid. I don’t mean that in a relative sense to myself as I get older, I mean literally a child.