In this article I have collated a few training links about Node.JS. I will keep adding to this page as I find other useful free resources. If you have any videos or articles that you feel would be useful here then please let me know in the comments and I will add them to the post. I would like it to be an archive of good material.
It’s funny, when alternative technologies comes out that do a similar thing to a previous technology, people are very quick to pronounce the previous technology as dead. I was talking to someone the other week at a different company who said that their architects wanted to use WebAPI because WCF wasn’t relevant any more. This made me think, WHAT!!, REALLY!!, SURELY NOT!!
In the rest of this article I want to briefly cover what WCF and WebAPI are, talk a bit about the differences, and then suggest the reasons why you may use either. This isn’t an exhaustive discussion, but the point is that you can have various technologies doing similar things, without either one of them being redundant. I have spent the last 7 years of my career being involved in service architectures built using WCF and I am certainly not thinking I need to replace any of those systems just yet.
I have had a few emails from readers of this blog over the last week asking if it has been abandoned. The answer is No. I was off work for a month after having surgery and then on my return to work I was pretty snowed under, but I am definitely continuing to write posts. I am currently half way through my next large article on Service Oriented Architecture Design and will have that posted over the next month.
In the mean time, thank you to everyone that reads this blog regularly. Over the past 3 months, traffic has been rising quite a lot, far more than I ever anticipated, so I will definitely be continuing with it. I have lots of interesting posts in the pipeline, as well as expanding the training section.
This documentation is against the first Safe Pad release, version 1.0.
In this article I am going to cover how the code is structured. To demonstrate the code structure I will use the Architectural Dependency diagrams in Visual Studio 2012.
The main solution file is split into 3 projects. There is the SafePadClientLibrary which contains the code for encrypting the documents, compression, and the handling of the SafePad file format. The domain objects in this library contain all the important routines for making the project work.
Recently I have been doing a bit of travelling for work to visit vendors and this has involved some lengthy train journeys. On these journeys I decided to set about writing a small little application that I had a use for. Initially I wanted a password vault, but when I thought about it more, I realised I wanted a secure way to store all sorts of information, like passwords, license keys, financial data etc.
So, whilst whiling away the hours on the train I started developing Safe Pad. The application is a pretty typical Rich Text based editor, but when you save your documents they are compressed and then stored by encrypting it with AES 256 three times using 2 passwords. This is a similar theory as to when the DES algorithms life was extended by using it to triple encrypt.
AES 256 is already a very strong algorithm, but when used in an application like this people still tend to use rather weak passwords which makes them susceptible to dictionary attacks. Because this application triple encrypts you are prompted to enter 2 passwords, therefore the program encrypts with password 1, then password 2, and then password 1 again. It adds that extra layer of protection for your secrets. Of course, this isn’t an excuse to use weak passwords, I still recommend using strong passwords made up of mixed case letters, numbers and non alpha-numeric symbols.
I have developed the program enough to a stable 1.0 release. It is quite basic, but then again it doesn’t need to be complicated. I have released the source code on CodePlex under the GNU Public license and this marks my first foray into the world of open source software development. Feel free to download the application if you think it will be useful to you. It costs nothing. If you are not interested in messing around with the source code, then there is an installer you can use to install the application. If you feel like adding some features, then the source code is available for you to play around with.
I have also written a blog post explaining the solution and code structure of Safe Pad should anyone wish to contribute to it.
I am a bit of a book worm, especially with technical books. I love nothing more than to extend my knowledge on my craft. I wanted to let you know about a book that I have been reading recently that is absolutely fascinating. The book is called, the Architecture of Open Source Applications.
The idea behind the book is simple. If you were an architect constructing buildings, you wouldn’t do so without studying how other buildings are constructed. The premise is the same for software. As a software developer / solutions architect, how can you design applications without first studying how other applications are designed and built? That is exactly what this book does. This book covers 25 open source applications and discusses how they were built and designed.
please ignore this post.
Wow, this is the first post!! It feels a little empty around here at the moment. My name is Stephen Haunts and I am a software developer currently working in the financial services industry in the United Kingdom. I have decided to start this site as a way of capturing some of my ideas and sharing them with the world.
I mainly work in C# and .NET. This is because that is what my job requires, so I will tend to bias towards the Microsoft Development Stack when talking about actual software development. I also enjoy working with .NET; it is a fun system to write software with.
I don’t intend to just talk about code. This site covers more of the architectural aspects of enterprise software development. Most of these ideas can sit above the actual language and implementation details.
I have ideas for different series of articles that revolve around ideas that I have been thinking a lot about recently. As a little hint to what is to follow, some of these themes are around applications system monitoring, PCI DSS, Zero Downtime deployment models, Agile/Lean development and software development leadership.
I hope you find the content enjoyable, interesting and thought-provoking. Please subscribe to the blog using the subscription widget to the right of the screen. You can also use the sites RSS feed in your favourite news reader. Also, please comment and contribute to the articles if you feel you have something to say. I don’t expect you to agree with everything I say, but the initial articles serve as the starting point of the subject. They can be extended much further by your contribution to the conversation.
Well, that’s the obligatory first post out-of-the-way. That wasn’t as scary as I thought it would be.
Thank you for signing up to our mailing list. You will receive an email containing links to your free books.
If you do not receive the email within 5 minutes, please check your spam folder as the email can sometimes get stuck.
Thank you for signing up to StephenHaunts.com
We have one more step for you too complete. To make sure you own the email account you are signing up for, you will receive a message to verify your email. When that email arrives, please click on the link to verify your own the email account.
If this email doesn’t turn up within 2 minutes, please check your Spam folder, as sometimes it can get stuck in there.
You can opt out of the email list at any point.