BT
rss
59:49

Code Quality in Practice

Posted by Bryan Helmkamp  on  Jul 16, 2016

Bryan Helmkamp discusses insights from analyzing over 1T LoC daily, what makes a code metric valuable, when unmaintainable code may be preferable, and what prevents maintaining quality code over time.

18:16

Alembic: Automatic Locality Extraction via Migration

Posted by Brandon Holt, Preston Briggs, Luis Ceze, Mark Oskin  on  May 21, 2015

The authors introduce Alembic, a new static analysis tool that frees programmers from having to manually move computation to exploit locality in PGAS programs.

51:40

Software Security - A Study in Technology Transfer

Posted by Gary McGraw  on  Feb 01, 2015

Gary McGraw keynotes on the internal forces and relationships active inside companies that drive them to success by managing to take ideas and transform them into technologies.

57:02

Using Static Analysis with Grails

Posted by Jeff Beck  on  Jan 12, 2014

Jeff Beck shows how to use Codenarc, Cobertura, JSLint, and other tools to perform static analysis on Grails applications.

01:15:34

Creating a Walking Skeleton

Posted by Paul Grenyer  on  Feb 05, 2013

Paul Grenyer discusses why and how to create a Walking Skeleton - an implementation of the thinnest possible slice of real functionality that we can automatically build, deploy and test end-to-end.

Testing Java Code With Confidence

Posted by Doug Hiebert  on  Dec 11, 2012

Doug Hiebert discusses the principles and objectives behind automated testing, TDD, Unit and Integration Testing, using asserting and mocking to write tests, and static analysis.

Controlling Your Architecture

Posted by Magnus Robertsson  on  Oct 22, 2009 3

Magnus Robertsson shows how to control the code architecture to avoid an architectural drift leading to a big-ball-of-mud: peer review, code analysis, and zero tolerance to warnings and errors.

Secure Programming with Static Analysis

Posted by Brian Chess  on  Aug 06, 2008 2

Creating secure code requires more than just good intentions. Static source code analysis can be used to uncover the kinds of errors that lead directly to vulnerabilities. Brian Chess shows you how.

General Feedback
Bugs
Advertising
Editorial
Marketing
InfoQ.com and all content copyright © 2006-2016 C4Media Inc. InfoQ.com hosted at Contegix, the best ISP we've ever worked with.
Privacy policy
BT

We notice you’re using an ad blocker

We understand why you use ad blockers. However to keep InfoQ free we need your support. InfoQ will not provide your data to third parties without individual opt-in consent. We only work with advertisers relevant to our readers. Please consider whitelisting us.