Software code evaluation

Peer code review/inspection and how it should be done in Agile environment  May 1, 2010 – 04:51 pm
quality, measurement of

Well, I’ve been working through a number of project, pre-sales, final deliveries, scrum calls, best practice sessions, implementing Agile processes and weighing their pros-cons etc. I have also encountered some difficulties in having some of these best practices and at times had to literally go after everyone to explain why some of the processes we follow are MUST to be followed. Many a times, such follow-up sessions work but a few times they don’t work. When they do, everyone’s life is easy. Deliveries on time. My manager is happy. My manager’s manager is happy too. So all goody, goody …Well so far so good.

But all hell breaks loose if some of these processes are not followed. Project goes into code-red, QA keeps filing 100 bugs a day, developers keep coming on weekends and complaining they didn’t have a vacation in last 9 months. Your manager is not happy. Obviously, your manager’s manager is ready to cut his bonus and propose all kinds of cost cutting too :). I’m not saying, that just by following plain simple processes is going to make your project a successful one. What I’m saying is following them does make everyone’s life easy and it becomes easier to implement a project correctly if these are followed.

One of these processes is code inspection in an Agile environment. World is going Agile. Scrum, TDD etc. is the buzzword in almost all software based organizations. But at the end of every Sprint in Scrum methodology, if you see, quite a lot of code gets into the source repository without any peer inspection. This leads to a lot of re-work in later phases of the project. Some logical mistakes here, other bad programming constructs there, lack of object based programming in some modules, absence of interfaces in others etc. A senior level programmer when goes through the code, doesn’t like it much and complains to the manager/team. Lack of code documentation has become another common disease in Scrum Agile methodologies. For a newcomer it becomes incredibly difficult to understand the code flow and module interactions. Okay …Okay …got it! So what’s the solution?

Source: Welcome to GlobalLogic Blogs

Wiley Valuation: Measuring and Managing the Value of Companies (Wiley Finance)
eBooks (Wiley)

You might also like:

CDMA tool for Unlock SPC CHANGE MEID REPAIR ESN IMEI SIM lock
CDMA tool for Unlock SPC CHANGE MEID REPAIR ESN IMEI SIM lock
Using VectorCAST with Code Composer Studio
Using VectorCAST with Code Composer Studio
Visual Basic 6.0 Chess Program and AI
Visual Basic 6.0 Chess Program and AI

AMA Women's Rights article about Afghan women (1998)

Some people accuse the Left of supporting the Taliban and/or not supporting women's rights in Afghanistan because they might question our current course in that area.
Well, the Left is way ahead of those that think that. Here is an article on the AMA site from 1998:
Women's Health and Human Rights in Afghanistan
Zohra Rasekh, MPH; Heidi M. Bauer, MD, MPH, MS; M. Michele Manos, ...termined using Fisher exact test; Yates correction 2 was used for all others. For cross tabulations with greater than 2 rows, statistical significance was determined using Pearson 2. Analysis of variance (ANOVA) was used for statistical comparison of means and the Kruskal-Wallis test was used for comparison of medians. For all statistical determinations, significance levels were established at P

The software for TIA could be amazing


The TIA program strategy is to integrate technologies developed by DARPA (and elsewhere as appropriate) into a series of increasingly powerful prototype systems that can be stress-tested in operationally relevant environments, using real-time feedback to refine concepts of operation and performance requirements down to the component level. The TIA program will develop and integrate inform...esired features) that will enable the intelligence community to evaluate new technologies through experimentation, and rapidly transition it to operational use, as appropriate. Accordingly, the TIA program will work in close collaboration with one or more U.S. intelligence agencies that will provide operational guidance and technology evaluation, and act as TIA system transition partners.

I left something out - the end goal

Personal thing here.
I do not remember a time (yes I do, I must have been three) that I wasn't interested in AI.
To create real AI I must first understand how humans understand the world. I am a software developer, and I am starting to understand (I think) how humans create analogs of the universe inside their heads. I want to understand how we can recognize beauty when we see it, ho... courses of actions from it.
Memetics is only a part of this the other part is the automatic evaluation of quality.
Is this doable? Many people say it is not, but do I listen. Oh no.
I have been told so many times to put 'magic' into my code that I am pretty dismissive of theories that say such things are unlikely.
I despise software that fails, my software wants to live.

PatentBridge to Sell Patent Extending Retirement Account Duration  — MarketWatch
MENLO PARK, Calif., Jun 26, 2012 (BUSINESS WIRE) -- PatentBridge LLC, the preeminent Silicon Valley patent broker since 2003, is pleased to announce that it will be selling Patent 8055566, covering a unique solution to one of the greatest problems …

InterDigital's CEO Hosts Investor Conference (Transcript)  — Seeking Alpha
The way I think about it is we are selling patent assets and those would be subject to any existing encumbrances and those encumbrances are associated with license agreements revenue from which we would retain. Charlie Anderson - Dougherty …

Wiley Valuation Workbook: Step-by-Step Exercises and Tests to Help You Master Valuation (Wiley Finance)
eBooks (Wiley)
Simplilearn: Benefits of Software Test Review | Software Testing Certification Courses
Simplilearn: Benefits of Software Test Review | Software Testing Certification Courses
[Part 1] Using Clone Detection to Identify Bugs in Concurrent Software (ICSM 2010)
[Part 1] Using Clone Detection to Identify Bugs in Concurrent Software (ICSM 2010)
The Commodity Code Announced
The Commodity Code Announced
Nabu Press Report of the Engineers Valuation Board in re Pittsburgh Railways Company
Book (Nabu Press)
DEFCON 17 Hacking Conference Presentation By Itzik Kotler and Tomer Bitton P.1
DEFCON 17 Hacking Conference Presentation By Itzik Kotler and Tomer Bitton P.1
PromptDog Teleprompter Software
PromptDog Teleprompter Software
What is Free Software? - Licensing Introduction
What is Free Software? - Licensing Introduction

Related posts:

  1. Software code acquitions
  2. Software code valuation
  3. Software code explanation
  4. Software code reporting