Within the last year
Within the past 3 years
1 - 10 of 13 articles
A persistent rule of thumb in the programming trade is the 80/20 rule: “80 percent of the useful work is performed by 20 percent of the code.” As with gas mileage, your performance statistics may vary, and given the mensurational vagaries of body parts such as thumbs (unless you take the...
Anja Ebersbach, Markus Glaser, Richard Heigl, Springer, 2005, $64.95, ISBN: 3540259953 A wiki is an innovative Web-based content authoring system that encourages (perhaps even requires) unfettered collaboration among those who happen to find a Web page that hosts a wiki. A wiki allows anyone to...
Questioning MDD I just finished reading “Coding for the Code” by Friedrich Steimann and Thomas Kuhne in Queue’s December/January 2005 issue. I commend the authors for their balanced approach in presenting the issue using Dr. Pro and Dr. Con. It really highlighted the issues for the future...
Dear KV, I've been reading your column occasionally and havent seen you address anything related to user interface design and how it can completely torque a piece of software. I happen to work as a programmer on a project for a company that sells point-of-sale software, which is a nice way of...
Welcome once again to WOYHD, Queue’s monthly forum dedicated to developer tools. We know that many readers enjoy reading about the tools people hate, as contributors regularly express frustrations shared by many developers (perhaps even leading to exclamations of “ain’t that the truth!”)....
Just as BPM (business process management) technology is markedly different from conventional approaches to application support, the methodology of BPM development is markedly different from traditional software implementation techniques. With CPI (continuous process improvement) as the core...
An organization consists of two worlds. The real world contains the organization’s structure, physical goods, employees, and other organizations. The virtual world contains the organization’s computerized infrastructure, including its applications and databases. Workflow systems bridge the...
O’Reilly Emerging Technology March 6-9, 2006 San Diego, California http://conferences.oreillynet.com/etech/
Symantec’s Semantics In the wake of Sony’s DRM (digital rights management) rootkit debacle, it was unexpected to see antivirus giant Symantec implicated for using “rootkit-like technology” in its Norton SystemWorks. The software’s Protected Recycle Bin uses a hidden system folder to...
Read and print from thousands of top scholarly journals.
Sign up with Facebook
Sign up with Google
Already have an account? Log in
Save this article to read later. You can see your Read Later on your DeepDyve homepage.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Sign Up Log In
To subscribe to email alerts, please log in first, or sign up for a DeepDyve account if you don’t already have one.
To get new article updates from a journal on your personalized homepage, please log in first, or sign up for a DeepDyve account if you don’t already have one.