Blunder Dome Sighting  
privacy 
 
 
 

Hangout for experimental confirmation and demonstration of software, computing, and networking. The exercises don't always work out. The professor is a bumbler and the laboratory assistant is a skanky dufus.



Click for Blog Feed
Blog Feed

Recent Items
 
SSH and Known_Hosts Vulnerabilities Threaten Grid
 
Service Research: Focusing on Requirements for Tec...
 
TiddlyWiki: Ohmygosh, I'm in Love.
 
3I: Individualized Interactive Instruction
 
Three Defects We Can Do Without: Memory Leaks, Buf...
 
Windows Genuine Advantage: So, did I fail the test...
 
Hark, Is That a Pattern I See Before Me?
 
NSS2: All Things to All People through Perfect Sof...
 
Are You A Problem Witch or a Solution Witch?
 
How Do You Know Your Discarded Disk Is Unreadable?...

This page is powered by Blogger. Isn't yours?
  

Locations of visitors to this site
visits to Orcmid's Lair pages

The nfoCentrale Blog Conclave
 
Millennia Antica: The Kiln Sitter's Diary
 
nfoWorks: Pursuing Harmony
 
Numbering Peano
 
Orcmid's Lair
 
Orcmid's Live Hideout
 
Prof. von Clueless in the Blunder Dome
 
Spanner Wingnut's Muddleware Lab (experimental)

nfoCentrale Associated Sites
 
DMA: The Document Management Alliance
 
DMware: Document Management Interoperability Exchange
 
Millennia Antica Pottery
 
The Miser Project
 
nfoCentrale: the Anchor Site
 
nfoWare: Information Processing Technology
 
nfoWorks: Tools for Document Interoperability
 
NuovoDoc: Design for Document System Interoperability
 
ODMA Interoperability Exchange
 
Orcmid's Lair
 
TROST: Open-System Trustworthiness

2005-05-19

 

Sorting the Mail: Agile Databases, Vulnerable Applications, and Optimized Code

ACM News Service: Quick Picks.  I don’t have time to dig into these deeper, but I don’t want to lose them, either:

  • Join the Evolution” — Scott Ambler’s invitation to “Agile Database Techniques.” I’m interested in the modeling, refactoring, and coupling issues.  I’m also curious how much business entities are able to adhere to the problem space rather than be solution-space artifacts.
  • Developers’ Growing Challenge” — Peter Coffee’s eWeek article on the problems of vulnerabilities in line-of-business applications and how developers are ill-equipped to deal with it and soon tools will make it harder.  Now there’s a challenge for simplifying rather than covering over fragile complexity.
  • Researchers Speed, Optimize Code With New Open Source Tools” — This is about optimization of computer codes for certain large-scale computations.  It would be interesting to see how generic this is and what its domain of application could turn out to be.  (This goes deep in my files, but filed it is.)

 
Construction Structure (Hard Hat Area) You are navigating Orcmid's Lair.

template created 2004-06-17-20:01 -0700 (pdt) by orcmid
$$Author: Orcmid $
$$Date: 10-04-30 22:33 $
$$Revision: 21 $