Technology

Technology

  • Code Smells, a rise to maturity

    The smell of Orchids

    Today’s world is full of an increasing amount of program code. Back in 1999 Martin Fowler[1] defined the basis of Code Smells. Smells, being the inherent way humans in nature detect bad, and good things, likewise, Code has a smell, be it bad or good. A bad code smell being code that contains bad programming techniques, duplicate code, ie. poor quality. A new paper called Code Smells, by Peter Kokol, Milan Zorman, Bojan Žlahtič, Grega Žlahtič [2] , has been published.

    Kokol’s paper[2] analysed the rise of discussion around code smells. Using bibliometrics to analyse research papers which contain references to code smells, Kokol was able to map and detect the changes in frequency and geographical distribution of papers.

    Their results highlighted 337 publications which contained references and of those 70% were related to conference proceedings. Which they concluded may mean that code smells is still in the rising state of maturity.

    They plotted the details on a timeline and identified that the largest rises were in 2009, then in 2014. They also identified which countries were using the term the most, and as might be expected USA was top, with almost twice the next country, Italy. Italy contained the individual institution that had produced the most papers, with 19 papers published by the Universita degli Studi di Milano.

    The research papers indicated that code smell research was split into 3 themes, smell detection, software refactoring, development & anti-patterns. Of these themes code software development and anti-patterns, was the most popular themes, using anti-patterns and knowledge of software development problems code quality can be increased.

    Overall an interesting and highlighting paper that shows that in the future, machine learning, and other analysis tools may be used against software development code to identify if it smells of sulphur or wild orchids.

    [1] M. Fowler, Refactoring: Improving the Design of Existing Code., Reading: Addison - Wesley, 1999.

    [2] Peter Kokol, Code Smells, 2018

    #telanovaReporter

    Looking to test the quality of your IT configuration, talk to our consultants about what changes you can make to get that wild orchid smell :

    Call telanova on 01344 567990

  • How much downtime is acceptable ?

    System 36 - 30Mb Hard drive

    Many years ago, once a year, in a production factory that ran 24/7, everything would come to a halt for the Test. While the Test was in progress all orders were stopped, people hung around like they were waiting for the starting gun of a race.

    Deep inside a locked room people would be busy dismantling and inserting a loan hard drive into the System 36 and then the big restore from 12 inch disks in magazines, 1st the monthly back up, then the weekly back up, then the daily back up. After many hours and copious cups of coffee and boxes of biscuits, the system would be sent live to see whether everything had worked successfully. The downtime was costly, and that was thankfully without any live customers trying to connect online to see the status of their order.

    Fast forward to just a few years ago, and replication was the in thing. Some companies built whole triplicates of their server rooms, with a duplicate site only a few miles away, ready for raiding for parts, and another site a few hundred miles away ready for major disasters. Testing the fail-overs resulted in many issues of lost orders, lost data as people didn’t realise they were entering data onto the temporary fail-over test systems.

    Fast forward to a few of years ago, Enterprise companies were migrating to the cloud, aware of the cost, but knowing of the saving of having a system that would be always on and able to expand and reduce as the demand suited, backups are still required but testing of those can be done in a separate cloud area without disrupting the main business.

    Fast forward to today, and the costs have lowered, and now every business Small and Medium can enjoy the cloud benefits. Whether it is full in the cloud servers through Azure, or using Cloud services such as Office 365 and G-Suite.

    What comes next is open to debate, but the server-less architecture looks to be a fair bet, which will see that server you built dynamically grow or shrink depending on how busy and how much work it is doing. So you won’t be paying for power you’re not using, and you will be saving the environment.

    Stick with us and we’ll keep you up to date

    #telanovaReporter

    PS. Don't forget to try out our downtime cost calculator

  • Your teams are being targeted

    Sharks circling targeting users

    Like spearing fish in a barrel.

    The sharks are circling.

    Advances in technology have seen great benefits to humankind as a whole. Each step forward for mankind, sees an additional step forward for the criminal underground.

    Machine learning is becoming more wide spread. If your company uses Adwords, you may well be using their own machine learning on which of your adverts performs better based on the demographic and information of the person they display the advert to.

    In the past many of us will have received an email purporting to be from a bank or parcel carrier that we’ve never used. You may well have become accustomed to saying to yourself, but I don’t have a Western Union account etc.

    What now if the machine learning was reading your public social media, of you and your friends and tailoring the email or social post to match what you wanted to see. Imagine if you suddenly saw a post on your social feed that said
    yourname
    I know you went to insert place last year and I wondered if you’d seen these photos of the place insert sample image ,
    catch up soon
    insert a name of a friend

    • How closely would you look at the poster's signature
    • Would you click and check out the photos ?
    • What if it said update your Adobe Reader / Gallery Pack software when you did ?
    • Did it all seem legit ?
    • What if on the gallery page you visit theirs more social engineering, such as donate to just giving page ?
    • What would your employees and friends do ?

    In research published this month shows that by using machine learning to facilitate socially engineered phishing campaigns they are achieving a 5-14% better rate of return.

    • How does a 5-14% higher chance of breach fare with your company?
    • When and how did you last assess your risk of attack?
    • What action have you taken to reduce that risk ?
    • Are you ready for the onslaught ?
    • What actions have you already taken to upskill your employees?
    • What packages are there that can assist you ?

We use cookies to provide you with the best possible experience in your interactions on our website

You agree to our use of cookies on your device by continuing to use our website

I understand