This week we're talking to Tim Spann, Java developer of fifteen years and blogger at http://www.agilemobiledeveloper.com.
Ever see one of these? It means something is wrong with the website – very wrong – yet somehow we seem to keep building websites that do this.
Some diagnostics haven't detected any bugs in open-source projects yet. The lower you are in the list, the more diagnostics with no error samples there will be. The reason is simple: the later a certain rule had been added, the fewer projects were analyzed with this rule included into the rule set and therefore the fewer chances for it to demonstrate its capabilities.
ObMimic is a library of plain-Java implementations of the Servlet API’s interfaces and abstract classes. It provides a comprehensive set of ready-made and fully-configurable test-doubles for accurately simulating the Servlet API in out-of-container testing of Servlets, Filters, Listeners and any other code that uses the Servlet API.
Bjorn is discussing the ferrite core memory of the Apollo guidance system: "These are very, very robust memory systems. … But the problem is that they actually have weight to them."
A team in trouble would probably say that they would very much welcome expert help – but would they really? Are they ready to face the brutal facts of the state of the project?
While Coded UI tests are running you can't do anything else on your computer, because mouse and UI are used to run the test. So can you use a VM?
This presentation from Drupalcon Portland 2013 takes a look at pairing DevOps with Drupal: "We'll provide an intro to DevOps (what it is and what it isn't), talk about the needs and goals for infrastructure as code, and how it applies to Drupal..."
Most organizations have started to realize that code quality is an important root cause to many of their issues, whether it’s incident levels or time to value.
This benchmarking feature is based on an ever-growing database: TechDebt.org. So, the more users there are, the bigger the database gets and the more accurate benchmarks are.
This book will not only enable Dynamics AX developers to go beyond the basics of configuring Dynamics AX , but also get to grips with securing an organization model by developing extensible data security policies.
Solutions for spotting those pesky outliers have been around in the world of credit card processing, banking, and security for some time now. “Anomaly detection”, a.k.a. fraud detection, is a pretty common term in those industries.
I was pointed out to this article about friction in software, in particular, because I talk a lot about zero friction development. Yet the post show a totally different aspect of friction.
Change has always been one of the most important wheels driving the IT industry. IT product vendors, systems integrators, technology vendors, a plethora of consulting service providers –- all partner with customers to engineer, deliver and enable change in some form or the other.
Today: The NSA/FBI project mining communications data from tech companies, a coder's life in links, a high-performance fork of Google's LevelDB, Text Adventures vs. MUDs vs. Roguelikes, and more.
So we are running a quite a bit of automated UI testing and we have found over a large number of concurrent test nodes that even when the Xvnc plugin has correctly started that the environment is not always ready or reliable.
Secure Code Reviews and application Pen Tests are both important practices in a secure software development program. But if you could only do one of them, if you had limited time or limited budget, which should you choose?
With so many cogs collaborating in the infra-machine, a check on their collaboration seems rather mandatory -- like any other integration test for your in-house managed service. After all that was key idea behind having automated configuration management itself.
I’ve been noodling on the phrase “Thinking Together.” Thinking Together is one aspect of the mindset that Product Owners need to embrace. I have been using this phrase with new Product Owners to explain why many Agile practices work.
Whether it’s organizational dysfunction, discovering a role isn’t right for you, abusive management, or unethical requests, we look at the nagging yellow flags that pile up and can ignite into red flags that start your mind down the road of: Going, Going…Gone.
“But our customers don’t want 10 new versions a year. The last release alone had over 600 bugs!” retorts the hotline manager. “How about a small update with just a handful of bugs?”
A quick Java snippet for log scraping.
Let's imagine we're storing an order as a JSON document and serving it up with minor server-side processing, again as JSON. An example document might be like this...
While configuration management tools like Chef or Puppet are a critical component of the DevOps Toolchain for building scalable infrastructure, they are only one piece of the automation puzzle.
With a simulation, you create a safe environment in which people can experiment with learning a new skill or seeing how they operate. There are two critical pieces to the simulation...