- Created: Wednesday, 07 March 2018
- Written by William Gray
Today’s world is full of an increasing amount of program code. Back in 1999 Martin Fowler defined the basis of Code Smells. Smells, being the inherent way humans in nature detect bad, and good things, likewise, Code has a smell, be it bad or good. A bad code smell being code that contains bad programming techniques, duplicate code, ie. poor quality. A new paper called Code Smells, by Peter Kokol, Milan Zorman, Bojan Žlahtič, Grega Žlahtič  , has been published.
Kokol’s paper analysed the rise of discussion around code smells. Using bibliometrics to analyse research papers which contain references to code smells, Kokol was able to map and detect the changes in frequency and geographical distribution of papers.
Their results highlighted 337 publications which contained references and of those 70% were related to conference proceedings. Which they concluded may mean that code smells is still in the rising state of maturity.
They plotted the details on a timeline and identified that the largest rises were in 2009, then in 2014. They also identified which countries were using the term the most, and as might be expected USA was top, with almost twice the next country, Italy. Italy contained the individual institution that had produced the most papers, with 19 papers published by the Universita degli Studi di Milano.
The research papers indicated that code smell research was split into 3 themes, smell detection, software refactoring, development & anti-patterns. Of these themes code software development and anti-patterns, was the most popular themes, using anti-patterns and knowledge of software development problems code quality can be increased.
Overall an interesting and highlighting paper that shows that in the future, machine learning, and other analysis tools may be used against software development code to identify if it smells of sulphur or wild orchids.
 M. Fowler, Refactoring: Improving the Design of Existing Code., Reading: Addison - Wesley, 1999.
 Peter Kokol, Code Smells, 2018
Looking to test the quality of your IT configuration, talk to our consultants about what changes you can make to get that wild orchid smell :
Many of us have been there, you want to book a hotel, you have a rough idea of where, when, how much to spend etc. You enter a search, and 4 hours later you are still trying to find a booking that matches what you need. Every additional search shows more and more possibilities without giving you the ideal answer.
A recent study shows that the current methods of search and discovery are ending up meeting only around 51% of our functional properties, and when it comes to quality and price it can be as low as 16% satisfaction.
The recent paper by Messaoud WB at the Universite de la Manouba, ran a study using traditional and a version of Behavioural Web Service Discovery (B-WSD) (B-WSD Approach and Validation: Use Satisfaction Survey Nov 2017). Looking at the different areas of needs of a consumer and surveying how satisfied the consumer was after the selection was made in each area, including Functional Properties, Non-Functional, Execution cost, Quality/Price, Waiting time.
In conclusion the way searching is performed now, with the explosion of data on the internet, is not always meeting our needs. Using B-WSD, a sequence of operations of a web service, leads to a translation of the the consumers needs, and once the problem is analysed B-WSD approach proposes the modelling of a discovery system allowing a search to be developed according to customer data.
The Latest Technology in Secure Communications is Quantum Key Distribution (QKD) , these rely on single photons traveling between points via an optical channel. Detection of eavesdropping on QKD networks is possible based on the fundamental constraints of quantum mechanics.
However, you may not be able to listen in to QKD traffic, but malicious people can exert a Distributed Denial of Service (DDos) attack. As a QKD detects any disturbance, the key generation between the two points is disrupted and has to be re-established. Naturally DDos can continue to disrupt the communications.
Thanks to collaborative research by the teams at the High Performance Networks group, the Centre for Quantum Photonics at University of Bristol, and British Telecom Research and Innovation they have published their findings on this issue. ( Experimental Demonstration of DDoS Mitigation over a Quantum Key Distribution (QKD) Network Using Software Defined Networking (SDN) Feb 2018 )
Using a Software Defined Network (SDN) application to handle the situation, the SDN was able to monitor the breakdown in communications (key generation) and then automatically selects a different route for the traffic away from the DDoS.
It’s good to see that before technology has become widespread, the research has begun on how malicious attacks might take place and how to protect against them.
Reported last year, the decision was taken by Google to stop trusting some Symantec SSL Certificates on servers. This decision was taken after a number of failings in the authorisation chain of Symantec Certificates. Back in 2017 there was a public posting questioning the authentication of a number of Symantec Corporation PKI certificates. It appeared that a number of certificates issued did not conform to correct baseline requirements, and Symantec had authorised other organisations to issue certificates on their behalf without appropriate oversight.
The Google Chrome browser which is used by the majority of users when surfing the web will stop trusting these certificates when the update is released on April 17, 2018.
If you run a website you need to follow the simple steps below to check that your website will not be affected
If you do not run a website, you can continue to browse the web as normal, when you come across an affected website, Chrome it will prevent you accessing it until they resolve the issue.
To confirm if your website will be affected on 17th April follow these steps :