Enterprise Software

Home » Software » Enterprise Software

Monoliths Aren’t Inherently Bad

Self-professed minimalist developer Kelsey Hightower a few months ago wrote about monoliths being the future. The microservice design pattern has been trending in software development for quite some now. Unfortunately, more often than not it's been indiscriminately treated as a panacea to every software architecture and design problem out there. Microservices can help with one aspect specifically: Reducing deployment risk. If you have a large monolith and frequently need to make changes to a specific part or feature provided by that monolith the whole ... Read more

No-code, Low-code, Some Code and Everything In-between

CTO-for-hire (through Freeman Clarke) Alex Hudson recently wrote an article about what he terms "The 'No Code' Delusion": That so-called no-code and low-code tools will replace bespoke business software development entirely, no trained software developers required anymore. In a nutshell, it's the old pipe dream of just having to write a specification (in this case a visual one) and having the actual code write itself, the fallacy here of course being that the code is the final product rather than the specification ... Read more

In-depth Description of Medical Devices Software Testing

In this blog post series medical devices software developer Julien Zaegel describes the process of testing software for medical devices, including automated tests, supervised tests and manual tests. Julien provides a detailed view on how quality assurance for software for medical devices works in order to ensure the safety and reliability required for devices of literally vital importance, as well as of course legal and regulatory compliance. He not only explains the various test processes, practices, categories of tests and different levels of ... Read more

API Security Best Practices by Expedited Security

For everyone dealing with web-based APIs, both as a provider and a consumer, web app security service supplier Expedited Security (known for Expedited SSL, among other products) has compiled a vast, extensive compendium on API security best practices. The importance of secure APIs and best practices that help has make APIs more secure and dependable can't be emphasised enough. Covering each possible attack vector and adopting every best practice out there can seem like a truly daunting task. Guides like this one help ... Read more

Konrad Zuse: Not the most correct but the least complicated theories find practical application.

Not the most correct but the least complicated theories find practical application. - Konrad Zuse A translated quote from one of the inventors of computers and modern computer science I read last year under a bust of Zuse near Kleiner Tiergarten in Berlin this statement is more relevant today than ever. In software development in particular we often attempt to design solutions that cover each and every possible use case - however unlikely or even virtually non-existent that use case might be. ... Read more

JSON Web Tokens: Downsides, Best Practices and Secure and Robust Alternatives

JSON Web Tokens (JWTs) nowadays are commonly used for transmitting authentication data in web applications, especially those exhibiting the widespread client-server architecture where you have a fat client / single-page application written in JavaScript as a front-end and a back-end server providing REST endpoints for use by that front-end client. However, while common there are good arguments against this practice. In a nutshell, JWT often are used for storing session data such user authorization and authentication information although they aren't particularly well-suited to ... Read more

“Accessible HTML Content Patterns” by Eric Bailey

Accessibility, though unfortunately often still treated as an afterthought, is a key part of developing and providing software products, web applications in particular. Accessibility, mark you, isn't just an enabler for those with special needs, although that's sufficient reason for paying attention to your web apps being accessible. Accessibility also is about designing products and processes to be accessible regardless of the device they're used on, the circumstance they're used in and the people they're used by. In that vein, designer Eric Bailey ... Read more

Rarely Used But Useful PostgreSQL Features

I'm an avid user of SQL and the variety of - frequently overlooked - features it provides. However, unfortunately the possibilities of SQL and modern, advanced open source incarnations of RDBMS such as PostgreSQL aren't utilised to the extent they could be when developing web or enterprise applications today. More often than not SQL database are perceived as a mere data store for persisting object-oriented data, which can give rise to the famous object-relational impedance mismatch. SQL servers, PostgreSQL in particular, are capable ... Read more

Boring Solutions Revisited: Choose Boring Technology by Dan McKinley

Dan McKinley's article on choosing boring solutions, although not exactly new anymore, has been a welcome reminder for me to revisit the topic of of using boring solutions and keeping things simple. Dan makes the point that "adding technology to your company comes with a cost" or as I stated in my own article on this subject: "The elephant in the room is: There’s an opportunity cost to everything." Most choices come with a trade-off. If you decide to use a technology for the ... Read more

HTTP and REST Standards, Protocols and Headers for More Secure and More Robust Applications

Standards.REST is a website that helps you create better, more robust HTTP- and REST-based applications by providing an overview of existing, proven standards that allow you to build on existing solutions rather than re-invent the wheel yourself. The list of standards mentioned includes OAuth 2.0, the HTTP Caching standard and Application-Level Profile Semantics (ALPS), which - among others - is used extensively in Spring Data REST and Spring HATEOAS. On a closely related note, Stefan Judis published an article on HTTP headers ... Read more
Next Page »