RSS

Security Absolutism is the Enemy of Security Improvement

Security is an important topic and everyone knows it.  This post is about a curious social behavior around implementing security procedures that often works against incremental improvement of security. Read the rest of this entry »

 
Leave a comment

Posted by on April 9, 2014 in Design

 

Tags: ,

Choice in Style of Debug Code

I have seen programmers take two approaches to code used to debug a project.  One of these approaches leads to “precision code” and can be left in to assure precision in the future, the other is … sloppy. Read the rest of this entry »

 
Leave a comment

Posted by on February 22, 2014 in Uncategorized

 

Never Use StringTokenizer

You should Never Use StringTokenizer.  That is a strong statement.  It is a bit of an exaggeration.  But in my experience, every case where StringTokenizer has been used that I have seen, has been an abuse of the original concept, and ended up in larger, more complex, and harder to maintain code. Read the rest of this entry »

 
Leave a comment

Posted by on February 8, 2014 in Coding

 

Tags:

Public or Private Member Variables?

When is it OK to make member variables public? Read the rest of this entry »

 
Leave a comment

Posted by on February 7, 2014 in Coding

 

Tags: , , ,

Not-So-EasyChair Hints

There is a conference management system called EasyChair which many of the academic conferences use to manage the submission to the conference, the reviewing of the submissions, and the selection of the papers to be included.  It is tried and true, but it has one of the worst user interfaces you are likely to ever experience.  This post is the result of my struggle to get it set up for an event. Read the rest of this entry »

 
Leave a comment

Posted by on January 25, 2014 in practice

 

Tags: , ,

Storing Date Values in Files

XML and JSON files are used often either for storing configuration values, or for storing actual user data in a file on the disk.  Both file formats can store field oriented data of different types, but because they both are text files, you need to encode all data values into a text format.  This post is about how to do that for Date data values. Read the rest of this entry »

 
Leave a comment

Posted by on January 17, 2014 in Coding

 

Tags: , , ,

Robust Web Application Initialization

When a web based application starts up, it should do so carefully to avoid a number of problems.  This post outlines the problems you might run into, and a list of coding preparations that can be made to avoid these problems. Read the rest of this entry »

 
Leave a comment

Posted by on January 13, 2014 in Coding

 

Tags: , , , , ,

 
Follow

Get every new post delivered to your Inbox.