-
as seen on Stack Overflow
- Search for 'Stack Overflow'
Hi,
Let me start by saying I feel very silly asking this, hence the newbie tag.
I am trying to investigate how to develop an UI application that will run directly on hardware. This will be very much like when you access the web based application within your router.
I don't really know how what…
>>> More
-
as seen on Programmers
- Search for 'Programmers'
My team is entering into some discussions on source control (process and possibly tools) and we would like a tool agnostic terminology for the various activities. The environment does have multiple (old) VCS's, and multiple desired (new) VCS's. Is there a standard definition of activities, or at least…
>>> More
-
as seen on Geeks with Blogs
- Search for 'Geeks with Blogs'
There are several terms commonly used to describe claims-based identity, and it is important to clearly define these terms. · Identity In terms of Access Control, the term identity will be used to refer to a set of claims made by a trusted issuer about the user. · Claim You can think of a claim…
>>> More
-
as seen on Programmers
- Search for 'Programmers'
Where I work, employees use a third-party desktop program for their clients. This program saves data to a flat file. My colleague wants to write a Java program that uploads that flat file to a remote server, opens the desktop program when the flat file is downloaded from a Web site, and checks if…
>>> More
-
as seen on Programmers
- Search for 'Programmers'
I get casually asked a lot to take a couple days to teach someone how to program. Most people really think they can learn what I know in a few days. When I tell them I have been doing this for many years and I can't teach them to be a programmer in a few days, they look at me like I am being a jerk…
>>> More
-
as seen on Programmers
- Search for 'Programmers'
On the Wikipedia page on dependency injection, the disadvantages section tells us this:
Dependency injection increases coupling by requiring the user of a subsystem to provide for the needs of that subsystem.
with a link to an article against dependency injection.
Dependency injection makes…
>>> More
-
as seen on Gooder Code
- Search for 'Gooder Code'
It’s no secret I am a fan of dependency injection. So I was happy to hear that Dick Wall of the Java Posse recently released a dependency injection framework for scala. Called SubCut, or Scala Uniquely Bound Classes Under Traits, the project is a ‘mix of service locator and dependency…
>>> More
-
as seen on Stack Overflow
- Search for 'Stack Overflow'
I find that my constructors are starting to look like this:
public MyClass(Container con, SomeClass1 obj1, SomeClass2, obj2.... )
with ever increasing parameter list. Since "Container" is my dependency injection container, why can't I just do this:
public MyClass(Container con)
for every class…
>>> More
-
as seen on Stack Overflow
- Search for 'Stack Overflow'
I'm trying to introduce DI as a pattern here at work and one of our lead developers would like to know: What - if any - are the downsides to using the Dependency Injection pattern?
Note I'm looking here for an - if possible - exhaustive list, not a subjective discussion on the topic.
>>> More
-
as seen on Stack Overflow
- Search for 'Stack Overflow'
Can anyone point me towards some good documentation / code examples on how best to manage the configuration of a DI container in a scenario where you need different configuations sets?
We have a layered, distributed application that has multiple entry points (ie; a website, winforms app, office plugin…
>>> More