The document summarizes guidelines for writing clean code as outlined in the book Clean Code: A Handbook of Agile Software Craftsmanship. It discusses that functions and names should clearly describe their purpose and only do one thing. Functions should be small and avoid side effects or multiple responsibilities. Names should be meaningful and avoid abbreviations or clues that could cause confusion.
Regular Expressions: every developer's best friend and worst nightmare! Join Andrei Zmievski, PHP developer and author of the PHP Regex (PCRE) extension, on a journey that will take you from your first steps into the world of regular expressions to the mastery of this most useful of tools. A must for everyone who's ever wondered what /(?=\d+)bar/ means.
Regular Expressions: every developer's best friend and worst nightmare! Join Andrei Zmievski, PHP developer and author of the PHP Regex (PCRE) extension, on a journey that will take you from your first steps into the world of regular expressions to the mastery of this most useful of tools. A must for everyone who's ever wondered what /(?=\d+)bar/ means.
Code Like Pythonista
Beautifully made PPT.
Ref. http://python.net/~goodger/projects/pycon/2007/idiomatic/handout.html
Image ref : https://pixabay.com/ko/ and https://morguefile.com/
licensed under a Creative Commons Attribution/Share-Alike (BY-SA) license.
(download for flawless quality) A brief introduction to unison, the exciting and innovative new functional programming language.
Wholly based on a talk by Paul Chiusano.
Code Like Pythonista
Beautifully made PPT.
Ref. http://python.net/~goodger/projects/pycon/2007/idiomatic/handout.html
Image ref : https://pixabay.com/ko/ and https://morguefile.com/
licensed under a Creative Commons Attribution/Share-Alike (BY-SA) license.
(download for flawless quality) A brief introduction to unison, the exciting and innovative new functional programming language.
Wholly based on a talk by Paul Chiusano.
Software Engineering, Software Consulting, Tech Lead.
Spring Boot, Spring Cloud, Spring Core, Spring JDBC, Spring Security,
Spring Transaction, Spring MVC,
Log4j, REST/SOAP WEB-SERVICES.
Understanding Globus Data Transfers with NetSageGlobus
NetSage is an open privacy-aware network measurement, analysis, and visualization service designed to help end-users visualize and reason about large data transfers. NetSage traditionally has used a combination of passive measurements, including SNMP and flow data, as well as active measurements, mainly perfSONAR, to provide longitudinal network performance data visualization. It has been deployed by dozens of networks world wide, and is supported domestically by the Engagement and Performance Operations Center (EPOC), NSF #2328479. We have recently expanded the NetSage data sources to include logs for Globus data transfers, following the same privacy-preserving approach as for Flow data. Using the logs for the Texas Advanced Computing Center (TACC) as an example, this talk will walk through several different example use cases that NetSage can answer, including: Who is using Globus to share data with my institution, and what kind of performance are they able to achieve? How many transfers has Globus supported for us? Which sites are we sharing the most data with, and how is that changing over time? How is my site using Globus to move data internally, and what kind of performance do we see for those transfers? What percentage of data transfers at my institution used Globus, and how did the overall data transfer performance compare to the Globus users?
Globus Connect Server Deep Dive - GlobusWorld 2024Globus
We explore the Globus Connect Server (GCS) architecture and experiment with advanced configuration options and use cases. This content is targeted at system administrators who are familiar with GCS and currently operate—or are planning to operate—broader deployments at their institution.
Modern design is crucial in today's digital environment, and this is especially true for SharePoint intranets. The design of these digital hubs is critical to user engagement and productivity enhancement. They are the cornerstone of internal collaboration and interaction within enterprises.
How Recreation Management Software Can Streamline Your Operations.pptxwottaspaceseo
Recreation management software streamlines operations by automating key tasks such as scheduling, registration, and payment processing, reducing manual workload and errors. It provides centralized management of facilities, classes, and events, ensuring efficient resource allocation and facility usage. The software offers user-friendly online portals for easy access to bookings and program information, enhancing customer experience. Real-time reporting and data analytics deliver insights into attendance and preferences, aiding in strategic decision-making. Additionally, effective communication tools keep participants and staff informed with timely updates. Overall, recreation management software enhances efficiency, improves service delivery, and boosts customer satisfaction.
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?XfilesPro
Worried about document security while sharing them in Salesforce? Fret no more! Here are the top-notch security standards XfilesPro upholds to ensure strong security for your Salesforce documents while sharing with internal or external people.
To learn more, read the blog: https://www.xfilespro.com/how-does-xfilespro-make-document-sharing-secure-and-seamless-in-salesforce/
Check out the webinar slides to learn more about how XfilesPro transforms Salesforce document management by leveraging its world-class applications. For more details, please connect with sales@xfilespro.com
If you want to watch the on-demand webinar, please click here: https://www.xfilespro.com/webinars/salesforce-document-management-2-0-smarter-faster-better/
First Steps with Globus Compute Multi-User EndpointsGlobus
In this presentation we will share our experiences around getting started with the Globus Compute multi-user endpoint. Working with the Pharmacology group at the University of Auckland, we have previously written an application using Globus Compute that can offload computationally expensive steps in the researcher's workflows, which they wish to manage from their familiar Windows environments, onto the NeSI (New Zealand eScience Infrastructure) cluster. Some of the challenges we have encountered were that each researcher had to set up and manage their own single-user globus compute endpoint and that the workloads had varying resource requirements (CPUs, memory and wall time) between different runs. We hope that the multi-user endpoint will help to address these challenges and share an update on our progress here.
Accelerate Enterprise Software Engineering with PlatformlessWSO2
Key takeaways:
Challenges of building platforms and the benefits of platformless.
Key principles of platformless, including API-first, cloud-native middleware, platform engineering, and developer experience.
How Choreo enables the platformless experience.
How key concepts like application architecture, domain-driven design, zero trust, and cell-based architecture are inherently a part of Choreo.
Demo of an end-to-end app built and deployed on Choreo.
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I ...Juraj Vysvader
In 2015, I used to write extensions for Joomla, WordPress, phpBB3, etc and I didn't get rich from it but it did have 63K downloads (powered possible tens of thousands of websites).
Large Language Models and the End of ProgrammingMatt Welsh
Talk by Matt Welsh at Craft Conference 2024 on the impact that Large Language Models will have on the future of software development. In this talk, I discuss the ways in which LLMs will impact the software industry, from replacing human software developers with AI, to replacing conventional software with models that perform reasoning, computation, and problem-solving.
Designing for Privacy in Amazon Web ServicesKrzysztofKkol1
Data privacy is one of the most critical issues that businesses face. This presentation shares insights on the principles and best practices for ensuring the resilience and security of your workload.
Drawing on a real-life project from the HR industry, the various challenges will be demonstrated: data protection, self-healing, business continuity, security, and transparency of data processing. This systematized approach allowed to create a secure AWS cloud infrastructure that not only met strict compliance rules but also exceeded the client's expectations.
In software engineering, the right architecture is essential for robust, scalable platforms. Wix has undergone a pivotal shift from event sourcing to a CRUD-based model for its microservices. This talk will chart the course of this pivotal journey.
Event sourcing, which records state changes as immutable events, provided robust auditing and "time travel" debugging for Wix Stores' microservices. Despite its benefits, the complexity it introduced in state management slowed development. Wix responded by adopting a simpler, unified CRUD model. This talk will explore the challenges of event sourcing and the advantages of Wix's new "CRUD on steroids" approach, which streamlines API integration and domain event management while preserving data integrity and system resilience.
Participants will gain valuable insights into Wix's strategies for ensuring atomicity in database updates and event production, as well as caching, materialization, and performance optimization techniques within a distributed system.
Join us to discover how Wix has mastered the art of balancing simplicity and extensibility, and learn how the re-adoption of the modest CRUD has turbocharged their development velocity, resilience, and scalability in a high-growth environment.
Enhancing Research Orchestration Capabilities at ORNL.pdfGlobus
Cross-facility research orchestration comes with ever-changing constraints regarding the availability and suitability of various compute and data resources. In short, a flexible data and processing fabric is needed to enable the dynamic redirection of data and compute tasks throughout the lifecycle of an experiment. In this talk, we illustrate how we easily leveraged Globus services to instrument the ACE research testbed at the Oak Ridge Leadership Computing Facility with flexible data and task orchestration capabilities.
SOCRadar Research Team: Latest Activities of IntelBrokerSOCRadar
The European Union Agency for Law Enforcement Cooperation (Europol) has suffered an alleged data breach after a notorious threat actor claimed to have exfiltrated data from its systems. Infamous data leaker IntelBroker posted on the even more infamous BreachForums hacking forum, saying that Europol suffered a data breach this month.
The alleged breach affected Europol agencies CCSE, EC3, Europol Platform for Experts, Law Enforcement Forum, and SIRIUS. Infiltration of these entities can disrupt ongoing investigations and compromise sensitive intelligence shared among international law enforcement agencies.
However, this is neither the first nor the last activity of IntekBroker. We have compiled for you what happened in the last few days. To track such hacker activities on dark web sources like hacker forums, private Telegram channels, and other hidden platforms where cyber threats often originate, you can check SOCRadar’s Dark Web News.
Stay Informed on Threat Actors’ Activity on the Dark Web with SOCRadar!
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Shahin Sheidaei
Games are powerful teaching tools, fostering hands-on engagement and fun. But they require careful consideration to succeed. Join me to explore factors in running and selecting games, ensuring they serve as effective teaching tools. Learn to maintain focus on learning objectives while playing, and how to measure the ROI of gaming in education. Discover strategies for pitching gaming to leadership. This session offers insights, tips, and examples for coaches, team leads, and enterprise leaders seeking to teach from simple to complex concepts.
3. CH2 Meaningful Names
Names should
• tell you why it exists, what it does, and how it is used.
def sendtostore_packagestock0
→ def calculate_stock_with_notifying_store
4. CH2 Meaningful Names
Names should
• tell you why it exists, what it does, and how it is used.
• allow readers to understand difference without comment nor deduction.
def sendtostore_packagestock0
→ def calculate_stock_with_notifying_store
5. CH2 Meaningful Names
Names should
• tell you why it exists, what it does, and how it is used.
• allow readers to understand difference without comment nor deduction.
• include semantic words.
def sendtostore_packagestock0
def sendtostore_packagestock1
6. CH2 Meaningful Names
Names should
• tell you why it exists, what it does, and how it is used.
• allow readers to understand difference without comment nor deduction.
• include semantic words.
• include words that are technical or related to the problem domain.
def calculate_rate
→ def calculate_surcharge
7. CH2 Meaningful Names
Names should
• tell you why it exists, what it does, and how it is used.
• allow readers to understand difference without comment nor deduction.
• include semantic words.
• include words that are technical or related to the problem domain.
• have context from its scope.
Package_stock.package_stock_id
→ Package_stock.id
8. CH2 Meaningful Names
Names should
• tell you why it exists, what it does, and how it is used.
• allow readers to understand difference without comment nor deduction.
• include semantic words.
• include words that are technical or related to the problem domain.
• have context from its scope.
• consists of words.
daydelay
→ days_delayed
9. CH2 Meaningful Names
Names should not
• include obscure clues that may lead to false conclusions.
def create_invoice_with_assurance
→ def create_invoice_with_retry
10. CH2 Meaningful Names
Names should not
• include obscure clues that may lead to false conclusions.
• use inconsistent synonyms for a single concept.
(‘calculate_stock_with_notifying_store’ exists)
def send_mail_to_branch
→ def send_mail_to_store
11. CH2 Meaningful Names
Names should not
• include obscure clues that may lead to false conclusions.
• use inconsistent synonyms for a single concept.
• include syntactic encodings.
v_count
→ count
12. CH2 Meaningful Names
Names should not
• include obscure clues that may lead to false conclusions.
• use inconsistent synonyms for a single concept.
• include syntactic encodings.
• consists of over-abbreviated letters.
def get_psscharge
→ def get_package_stock_surchage
14. CH2 Meaningful Names
• Prefer clarity to smartness and entertainment.
• Class names are nouns or noun phrases.
class SlackNotify
→ class SlackNotification
15. CH2 Meaningful Names
• Prefer clarity to smartness and entertainment.
• Class names are nouns or noun phrases.
• Method names are verbs or verb phrases.
def surcharge_calculation
→ def calculate_surcharge
19. CH3 Functions
Functions should
• be as small as possible.
• have the indent level of one or two.
• do only one thing.
• include steps within one level of abstraction.
20. CH3 Functions
Functions should
• be as small as possible.
• have the indent level of one or two.
• do only one thing.
• include steps within one level of abstraction.
• have two arguments at maximum, taking advantage of argument objects/lists.
def send_mail_with_file(email_from, email_to, subject, html_content, attach_file_path,
attach_file_name, mime_type)
→ def send_mail_with_file(base_email, attachment)
22. CH3 Functions
Functions should not
• expose switch statements, which do multiple things inherently, to the high level.
• pass Boolean flag argument as it forces more than one behavior.
calculate_surcharge(is_promotion=False, …)
→ calculate_surcharge, calcuate_surcharge_for_promotion
23. CH3 Functions
Functions should not
• expose switch statements, which do multiple things inherently, to the high level.
• pass Boolean flag argument as it forces more than one behavior.
• transform input argument instead of using return value.
…
charge_list.sort()
…
return
…
charge_list_sorted = sorted(charge_list)
…
return charge_list_sorted
→
24. CH3 Functions
Functions should not
• expose switch statements, which do multiple things inherently, to the high level.
• pass Boolean flag argument as it forces more than one behavior.
• transform input argument instead of using return value.
• have side effects that are not implied by names.
25. CH3 Functions
Functions should not
• expose switch statements, which do multiple things inherently, to the high level.
• pass Boolean flag argument as it forces more than one behavior.
• transform input argument instead of using return value.
• have side effects that are not implied by names.
• perform command and query at the same time.
• perform action and error handling at the same time.
26. CH3 Functions
Functions should not
• expose switch statements, which do multiple things inherently, to the high level.
• pass Boolean flag argument as it forces more than one behavior.
• transform input argument instead of using return value.
• have side effects that are not implied by names.
• perform command and query at the same time.
• perform action and error handling at the same time.
• have multiple entries or exits.