LINKBLOG for December 4, 2007
Programming Tips #3 “Divide, Indent, Comment and Name” - Nick Halstead
10 Rules that Age of Empires Teaches about Development - Tim Stall
' 10. It should be fun: AoE is a good, old-fashioned-fun kind of computer game 'Requirements for Enterprise Architecture: First Look - Scott Sehlhorst
Usability is not a verb - Scott Berkun
Mock Objects: Leaping out of the Language - Michael Feathers
' How would you create a mock object framework for a non-object oriented language? 'Identify And Understand The Problem First - Abhijit Nadgouda
Why do IT projects constantly fail... some thoughts: ' it might be the misconception that the real challenge is in building the solution 'Was My Code Provability Post An Inspiration To Joel? - Phil Haack
Phil DID already find some time to read Joel's latest and thought for a moment that 'He' had a subscription on his blog
(Blatant bragging: I DO have a personal email from Joel dating from 2003 :-)Back to basics, from the DB to a simple domain object - Peter van Ooijen
Automatic properties and replacing the Visual Studio 2008 'prop' snippet - Dennis van der Stelt
A new abstraction leading to simpler code and assuming a little bit of more knowledge - always the drawback from abstractions...Inside Architecture : Alignment through "honeypot" funding
' (...) how to we create a system where people want to do the same things that EA [Enterprise Architecture - ed.] wants them to do (...) without the political battles that ensue? 'Allocating Too Much Heap - Charles Miller
Always be careful with memory allocation, from experience I can tell you that 2GB RAM is reached faster than you might think...File system mocking for the lazy programmer - Ade Miller
Blogging vs Coding - Mike Arace
' Tricky thing, this blogging 'Delay Loading a DLL with a Linker Switch in Visual Studio - Rick Strahl
Security in Ten Years - Bruce Schneier
' Folks, the captains have illuminated the "Fasten your seat belts" sign. We predict bumpy conditions ahead 'Dana Epp's ramblings at the Sanctuary: Don't waste your time renaming the Administrator account in Windows
' Instead prevent people from accessing it in the first place. And when that isn't available, consider using strong authentication to provide identity assurance before they can even log in 'Talk at Yale: Part 2 of 3 - Joel Spolsky
Transitive decay in social networks - John Graham-Cumming
0 Comments:
Post a Comment
<< Home