Home | Amazing | Today | Tags | Publishers | Years | Account | Search 
Effective Programming: More Than Writing Code

Buy

ABOUT THE BOOK Jeff Atwood began the Coding Horror blog in 2004, and is convinced that it changed his life. He needed a way to keep track of software development over time - whatever he was thinking about or working on. He researched subjects he found interesting, then documented his research with a public blog post, which he could easily find and refer to later. Over time, increasing numbers of blog visitors found the posts helpful, relevant and interesting. Now, approximately 100,000 readers visit the blog per day and nearly as many comment and interact on the site. Effective Programming: More Than Writing Code is your one-stop shop for all things programming. Jeff writes with humor and understanding, allowing for both seasoned programmers and newbies to appreciate the depth of his research. From such posts as "The Programmer's Bill of Rights" and "Why Cant Programmers... Program?" to "Working With the Chaos Monkey," this book introduces the importance of writing responsible code, the logistics involved, and how people should view it more as a lifestyle than a career. TABLE OF CONTENTS - Introduction - The Art of Getting Shit Done - Principles of Good Programming - Hiring Programmers the Right Way - Getting Your Team to Work Together - The Batcave: Effective Workspaces for Programmers - Designing With the User in Mind - Security Basics: Protecting Your Users' Data - Testing Your Code, So it Doesn't Suck More Than it Has To - Building, Managing and Benefiting from a Community - Marketing Weasels and How Not to Be One - Keeping Your Priorities Straight EXCERPT FROM THE BOOK As a software developer, you are your own worst enemy. The sooner you realize that, the better off you'll be.I know you have the best of intentions. We all do. We're software developers; we love writing code. It's what we do. We never met a problem we couldn't solve with some duct tape, a jury-rigged coat hanger and a pinch of code. But Wil Shipley argues that we should rein in our natural tendencies to write lots of code: The fundamental nature of coding is that our task, as programmers, is to recognize that every decision we make is a trade-off. To be a master programmer is to understand the nature of these trade-offs, and be conscious of them in everything we write.In coding, you have many dimensions in which you can rate code: Brevity of codeFeaturefulnessSpeed of executionTime spent codingRobustnessFlexibility Now, remember, these dimensions are all in opposition to one another. You can spend three days writing a routine which is really beautiful and fast, so you've gotten two of your dimensions up, but you've spent three days, so the "time spent coding" dimension is way down.So, when is this worth it? How do we make these decisions? The answer turns out to be very sane, very simple, and also the one nobody, ever, listens to: Start with brevity. Increase the other dimensions as required by testing. I couldn't agree more. I've given similar advice when I exhorted developers to Code Smaller. And I'm not talking about a reductio ad absurdum contest where we use up all the clever tricks in our books to make the code fit into less physical space. I'm talking about practical, sensible strategies to reduce the volume of code an individual programmer has to read to understand how a program works. Here's a trivial little example of what I'm talking about: if (s == String.Empty)if (s == "") It seems obvious to me that the latter case is... ...buy the book to read more!

(HTML tags aren't allowed.)

6: Protein Misfolding, Aggregation and Conformational Diseases: Part B: Molecular Mechanisms of Conformational Diseases (Protein Reviews)
6: Protein Misfolding, Aggregation and Conformational Diseases: Part B: Molecular Mechanisms of Conformational Diseases (Protein Reviews)

The second volume continues to fill the gap in protein review and protocol literature. It does this while summarizing recent achievements in the understanding of the relationships between protein misfoldings, aggregation, and development of protein deposition disorders. The focus of Part B is the molecular basis of differential disorders.

...
A Concurrent Pascal Compiler for Minicomputers (Lecture Notes in Computer Science) (v. 50)
A Concurrent Pascal Compiler for Minicomputers (Lecture Notes in Computer Science) (v. 50)

This paper describes a seven-pass compiler for Per Brlnch Hansen's Concurrent Pascal [1,2] programing language. Concurrent Pascal is an abstract programming language for conputer operating systems. The language extends sequential Pascal [7] with the process, nonitor, and class concepts for structured concurrent programing. A ironitor is a...

PHP, MySQL, & JavaScript All-in-One For Dummies (Computer/Tech)
PHP, MySQL, & JavaScript All-in-One For Dummies (Computer/Tech)

Explore the engine that drives the internet

It takes a powerful suite of technologies to drive the most-visited websites in the world. PHP, mySQL, JavaScript, and other web-building languages serve as the foundation for application development and programming projects at all levels of the web. 

...


Lessons in IT Transformation: Technology Expert to Business Leader
Lessons in IT Transformation: Technology Expert to Business Leader
Why should I read this book? Be honest—that’s what you are really trying to figure out before you decide to invest the time and money required to read any book. There are thousands of books available on the topic of leadership. Why is this book different, and why should you care? Here are a few answers to your...
Mastering System Center 2012 R2 Configuration Manager
Mastering System Center 2012 R2 Configuration Manager

Invaluable coverage on all aspects of System Center 2012 R2 Configuration Manager

Completely updated for System Center 2012 R2 Configuration Manager, this comprehensive book provides intermediate and advanced coverage of all aspects of the product, including planning and installation, migrating from previous versions of...

802.1X Port-Based Authentication
802.1X Port-Based Authentication
Written to appeal to a broad audience, 802.1X Port-Based Authentication seeks to define this complex concept in accessible terms and to explore its various applications to today's computer networks using this particular network protocol. This text assumes that the reader may have little or no prior knowledge and only a general understanding of...
©2018 LearnIT (support@pdfchm.net) - Privacy Policy