Archive for March, 2010

Best Android Books: My Top 5 Choices

March 29th, 2010 Leave a comment 2 comments
Best Android Books: My Top 5 Choices

NOTE: We’ve recently released a more up-to-date pick of the best Android books here: Best Android Books: Top 5 Choices for 2013. There are a number of high quality books available about Android and Android application development. As with any subject, Google Android books vary greatly in quality and how broadly they cover their subject. We picked these 5 because they each approach the subject from a different perspective. Some carry the “introductory” flavor throughout the book, while others “ease you into” Android and then delve with more advanced topics. The point we are trying to make is… View full post »

Changing Requirements in Software Development

March 23rd, 2010 (Guest Blogger)Leave a comment
Changing Requirements in Software Development

It was at one of my previous jobs, when I had to witness an unpleasant relationship between engineering and business folks. Company’s main product was a network optimization software that would enhance standard internet routing protocols. Team was small and we were pretty much following a traditional development model, where requirements were fully understood and signed off by customers and business analysts before the engineers would start working on the product. In the early life of the product company was targeting the ISP business, however as time went by and product was not selling well, company decided to market the… View full post »

Agile Methodology: Software Over Documentation

March 22nd, 2010 (Guest Blogger)Leave a comment
Agile Methodology: Software Over Documentation

One of the other main values in software development using Agile Methodology is choosing a working software over a complete documentation. Reading Scott Ambler on Agile Modeling: Like it or not, the primary goal is not to produce extraneous documentation, extraneous management artifacts, or even to produce models. Creating extraneous documentation can be comforting because you can fool yourself into believing that you are making progress when in fact you’re not. Instead, you’re actually avoiding a difficult task, likely writing and testing code that may show that your chosen approach isn’t working as well as you thought it… View full post »

Agile Methodology: Individuals over Processes

March 18th, 2010 (Guest Blogger)Leave a comment
Agile Methodology: Individuals over Processes

In my previous blog, Software Development Using Agile Methodology, I wrote about main key values of Agile Methodology, one of which prefers people over processes in software development. While reading Martin Fowler’s article “The New Methodology”, this paragraph has caught my attention: One of the aims of traditional methodologies is to develop a process where the people involved are replaceable parts. With such a process you can treat people as resources who are available in various types. You have an analyst, some coders, some testers, a manager. The individuals aren’t so important, only the roles are important. That way if… View full post »

Software Development Using Agile Methodology

March 15th, 2010 Leave a comment
Software Development Using Agile Methodology

We all have lived through the nightmare of a project lacking the process to guide it. The lack of a process usually leads to unpredictability, lots of repeated error, and wasted effort. We end up having disappointed customers who are not happy with growing budgets, slipping delivery schedules and poor software quality. At the same time developers are disheartened by working ever longer hours to produce ever poorer software. Once we have experienced such a fiasco, we become afraid of repeating this experience again which becomes stressful and no longer fun that we thought software development… View full post »

Secure Your Database

March 12th, 2010 Leave a comment
Secure Your Database

What must one do to protect the company’s biggest asset – its data? That’s a frequently asked question today that has no right or wrong answer! The solution is based on a number of different variables, such as, what is your database vendor, what is the purpose of your database, does your database store credit card information, who manages your database, and others. Obviously, there is no single approach to securing your database. However, these are the general best practices utilized in he industry to protect a database system. Stay Up-to-date Be proactive in staying up-to-date on all current vulnerabilities related to the… View full post »

Understanding Database Vulnerabilities

March 11th, 2010 Leave a comment
Understanding Database Vulnerabilities

Database is one of the most integral components of any system, and keeping data both secure and accessible is a demanding task every business is facing today. One of the more recent trends in enterprise security has been the movement away from protecting the perimeter of the network to protecting data at its source. Today’s corporate environment must provide access to data not only to its employees, but also to partners and customers located on separate networks, potentially thousands of miles away. In order to protect the database system, one must first understand its vulnerabilities. In general, database… View full post »

What’s Next for Twitter?

March 2nd, 2010 (Guest Blogger)Leave a comment
What's Next for Twitter?

I am not a big Twitter fan and in fact wasn’t taking them seriously from the very beginning. The idea of letting people know what are you doing right now just never made sense to me, and yet here we are – at one of the vendor conferences in San Francisco last week, one of the Twitter folks declared they finally building their own data center. They’ve been hosting their services with someone else up till now. That’s great news! Who would have thought that the dumbest business idea could attract millions of unique visitors and grow… View full post »

Online Gaming – Feel the Buzz

March 1st, 2010 (Guest Blogger)Leave a comment
Online Gaming - Feel the Buzz

Electronic Arts, the long time leading maker of computer games has been on the big slide since about 2007, loosing lots of money to online games, which is becoming a new and cheaper alternative to computer games. Confronted with the rapid rise of social networks and online gaming companies like Zynga, Electronic Arts hasn’t wasted their time and acquired a gaming company Playfish in November 2009, a company producing social games for Facebook, MySpace, and other social networks. Their CEO, Riccitiello publicly admitted company is in the big hole now and to climb out of that hole might… View full post »

Python Tips & Tricks of the Trade

March 1st, 2010 (Guest Blogger)Leave a comment
Python Tips & Tricks of the Trade

Python is a very useful and robust scripting language which has been gaining in popularity lately. Some find it similar to Ruby and others compare it to Java. Python shares some elements of both languages as well as some constructs of C/C++. While new Python programmers are using the language they often build Python code that mimics other languages they’ve used before. However, there is a “Pythonic” way of doing a number of tasks in Python. These Python tips and tricks will help you write code that is not only more “Pythonic” but easier to… View full post »