Click here to Skip to main content
15,032,755 members
Everything / Best practices

Best practices

best-practices

Great Reads

by Apriorit Inc
Being able to switch between 32-bit and 64-bit modes in Windows is a useful skill. Learn about the heaven’s gate technique and the tools and methods needed for hooking 64-bit processes from the 32-bit WOW64 mode.
by John M. Dlugosz
Here is the real answer to the FizzBuzz interview question
by Ashley Davis
A look at version control from the game developers perspective
by John M. Dlugosz
“Whither exception handling?” We have come full circle.

Latest Articles

by Greg Utas
Open-heart surgery on your Big Ball of Mud
by Apriorit Inc
Being able to switch between 32-bit and 64-bit modes in Windows is a useful skill. Learn about the heaven’s gate technique and the tools and methods needed for hooking 64-bit processes from the 32-bit WOW64 mode.
by Shameel
This article describes a way to create a Facade Database to provide restricted access to specific tables in your databases to specific users without granting direct access to any of the underlying databases/tables.
by Rob Kraft
Best practices that software professionals follow most of the time

All Articles

Sort by Score

Best practices 

Please Sign up or sign in to vote.
23 Mar 2020
Apriorit Inc
Being able to switch between 32-bit and 64-bit modes in Windows is a useful skill. Learn about the heaven’s gate technique and the tools and methods needed for hooking 64-bit processes from the 32-bit WOW64 mode.
Please Sign up or sign in to vote.
10 Oct 2016
Ashley Davis
A look at version control from the game developers perspective
Please Sign up or sign in to vote.
4 Feb 2018
V.
A guide to estimating work and time for a project
Please Sign up or sign in to vote.
3 Mar 2018
Anonymee
Overengineering vs. underengineering - a guideline to prevent them both
Please Sign up or sign in to vote.
7 Dec 2020
Greg Utas
Open-heart surgery on your Big Ball of Mud
Please Sign up or sign in to vote.
7 Sep 2019
Shameel
This article describes a way to create a Facade Database to provide restricted access to specific tables in your databases to specific users without granting direct access to any of the underlying databases/tables.
Please Sign up or sign in to vote.
24 Apr 2017
Habibur Rony
This topic will cover the bad design practice using STUPID and good design practice using SOLID. Detailed explanation for Single Single Responsibility Principle, Open and Closed Principle, Liskov Substitution Principle, Interface Segregation Principle and Dependency Inversion (DI) Principle.
Please Sign up or sign in to vote.
6 Aug 2019
Rob Kraft
Best practices that software professionals follow most of the time
Please Sign up or sign in to vote.
21 Feb 2018
Charles Oder
To optimize, or not to optimize, that is the question...