2005 31.08 2007

Vol.31 n°8 (#387) august 2006

(ddj_2006_08.jpg)

Hmmmm

[author : Jonathan Erickson] #Edito

If it isn't broken, there's no need to fix it. But if it is broken...

TABLE OF CONTENTS

FEATURES

Sun, Java, and the Middle Course

[author : Michael Swaine]

Is Sun taking the initiative on openness and community, or is stepping off into the future by taking the middle course just being reactive?

Device Trails

[author : Zvi Gutterman and Avner Rosenan]

Modern hardware devices contain information that assists the operating system in finding appropriate drivers—and intruders in finding out who was doing what when.

Discovering Relationships in Context

[author : Joe Celko]

Cogito is a graph-based relationship analytics tool for pattern matching and relationship identification, making it an ideal tool for computer forensics.

Configuring J2EE Deployment Descriptors

[author : Steve Taylor]

Deployment descriptors are J2EE components that manage data connections when connecting to databases or maintaining unique transactions between web sessions.

Quick-Kill Project Management

[author : Andrew Stellman and Jennifer Greene]

Andrew and Jennifer show how you can do smart software development even when facing impossible schedules.

Code Quality Improvement

[author : JunHo Yoon and YoonKyu Jang]

Coding standards help you to improve code readability, produce consistent code, and prevent error-prone coding styles. Robert Buckley adds a note on MISRA-C and coding standards.

COLUMNS

The New C++

[author : Pete Becker]

The fundamental rule of laziness is: Don't do it unless you have to.

Nisley's Notebook

[author : Ed Nisley]

Ordinary Pepsi floating in the tubs of ice at LinuxWorld Expo! What does that tell you about the state of Linux these days?

The Agile Edge

[author : Scott Ambler]

Usability is a quality attribute of a system, which encompasses learnability, efficiency, memorability, error recovery, and end-user satisfaction.

DEPARTMENTS

Alia Vox

[author : Gary McGraw]

Penetration testing is a technique commonly practiced by computer security specialists, but its power is limited when it comes to software.

Developer Diaries

[author : Michael Swaine]

What do QA testing and NFL football have in common? They both involve developers.

Developer's Notebook

[author : DDJ Staff]

New development products and new releases of existing ones.

Swaine's Flames

[author : Michael Swaine]

Michael shares his tips on how a press conference ought to be held.