Free

CIS126 U1 Discussion 2 - 1 - Essay Example

Comments (0) Cite this document
Summary
The evolving nature of Object Technology has caused many companies to reexamine their legacy codes to ensure that it matches it. The…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER93.8% of users find it useful
CIS126 U1 Discussion 2 - 1
Read TextPreview

Extract of sample "CIS126 U1 Discussion 2 - 1"

The Dark Side of Object Technology Insert Insert Object technology became prevalent in industrial languages as from 80’s but became established in other languages like Java and UML in the 90s. The evolving nature of Object Technology has caused many companies to reexamine their legacy codes to ensure that it matches it. The progress and acceptability of Object Technology have been growing significantly in the market. In the recent years, some languages like C++ and Java have considerably advanced in the use of Object Technology.
Despite the many benefits that object technology poses, its weaknesses include them being complex legacies that scare its owners. The latter has made timely delivery a complicated process. TDD, for instance, face the challenge of their own code with its developers not willing to continue that path. It is important to define correctly the APIs for use in the system other than just using the IDE to refactor the code that requires a very constructive intervention.
Object oriented code becomes difficult to handle mainly due to the absence of modularity. The lack of limits in modularity has made frequent developments almost an impossible thing. It significantly compromises the risk of making alterations to the legacy code. Further, there are extra dependencies brought about by frameworks in the open source community. The result is frequent errors and slows down the speed of development. In such environments, code refactoring becomes such a complicated process that is not worth pursuing.
Other challenges include non-experts in Object Oriented code involved in the development process of these systems. Since these persons do not uphold the disciplines in the development, they compromise the use of libraries or frameworks. Consequently, there is a lot of codes that is purely reproduced.
References
Thomas, D. (2008). The Legacy and Liability of Object Technology The Dark Side of OO. JOT, 7(6), 27. doi:10.5381/jot.2008.7.6.c3 Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS126 U1 Discussion 2 - 1 Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1694731-cis126-u1-discussion-2-1
(CIS126 U1 Discussion 2 - 1 Essay Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1694731-cis126-u1-discussion-2-1.
“CIS126 U1 Discussion 2 - 1 Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1694731-cis126-u1-discussion-2-1.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF CIS126 U1 Discussion 2 - 1

Arbitration Law Assignment

8 Pages(2000 words)Assignment

Latinos Communityeth

7 Pages(1750 words)Essay

Week 1 discussion 2

...Week discussion Although rare, children learning a language for the first time might also struggle with pronunciation of certain sounds indicating that pronunciation difficulties are not limited to children learning a second language. Research findings identify strategies that are useful in rectification of pronunciation difficulties (Gagen, 2007). These include; Good modeling: children learn different aspects of language through mimicking those around them. Therefore, it is crucial for instructors and parents to pronounce the words that children are struggling with slowly putting emphasis on the important phonetic sounds. For example, pronunciation of words with /s/ or /z/ requires one to keep the tongue locked behind...
1 Pages(250 words)Essay

MGMT444 U1 IP

...Running Head: MGMT444 U1 IP MGMT444 U1 IP Teacher’s ID Since it is a senior level position, the candi is expected to have an ability of taking initiatives and taking charge of projects and day-to-day tasks. Please tell us how you were performing these tasks in your current job. Also what kind of projects and ideas you have introduced yourself during your career. This question is expected to indicate if the candidate is creative enough to introduce new ideas and take control of situations like a business leader. 2) We need someone who has 360 degree vision of everything going around them as leaving out necessary information means losing productivity and foresight for potential...
2 Pages(500 words)Research Paper

MGMT442 U1 IP

...Running Head: MGMT442 U1 IP MGMT442 U1 IP Teacher’s ID Q1. During your career, what are your most successful initiatives? Something that you are proud of or can quote as your achievement? The candidate should have experience of setting up a new service department in similar industry. If not, he should exhibit that he has entrepreneurial qualities and can take initiatives. Q2. While taking such initiatives, did you ever-encountered resistance (related to both material and human) and how did you managed it? This question should elaborate the interpersonal skills along with controlling and management skills of the candidate. Q3. Can you give some examples of your achievements as a team player or while...
2 Pages(500 words)Research Paper

Unit 1 Discussion 2

...History of World Wide Web History of World Wide Web The history of the World Wide Web had been explored and published inthe official website of the World Wide Web Foundation. World Wide Web as presented in the website’s About page has been invented by Tim Berners-Lee in 1989. This is a milestone that occurred 20 years after the invention of the internet. It came about based on the need of the scientists of CERN, Conseil Européen pour la Recherche Nucléaire", or European Council for Nuclear Research, to share data and results. He took advantage of this and led to the idea of connecting the computers from different locations through a system. He submitted the proposal to CERN about his plan in 1989 but it was only accepted... of World Wide...
1 Pages(250 words)Coursework

U1 Discussion

...Cause of IP Address Conflict and its Resolution s Cause of IP Address Conflict and its Resolution As a network administrator, I am tasked with maintaining the computer software and hardware systems which make up the computer network, such as, monitoring and maintaining of either converged infrastructure or active data network, monitoring network traffic, testing the network for weakness, and installing and implementing security programs (Bautts, Dawson, & Purdy, 2010). The Dynamic Host Configuration Protocol (DHCP) is a network protocol which enables the server to assign automatically an IP address to a computer from a definite scope configured from a certain network. The DCHP allows the network administrator to supervise... of IP Address...
1 Pages(250 words)Coursework

CIS 206 U1 Discussion

...Fedora Comparison to other Linux Distributions School Linux operating system has many distributions that come up with several operating systems. The major operating systems and distributions are Debian, Ubuntu, Arch, and Red hat. Debian distribution produces operating systems like Ubuntu while Red-hat produces fedora and arch produce the Arch Linux. Other notable Linux distributions include OpenSuse, CentOS, Mint, Mandriva and Kali Linux formerly backtrack. In the text, we will focus on Fedora, Ubuntu and Arch Linux. Fedora started in 2002 as a spun off from an undergraduate project called Fedora Linux and is supported by the open-source community. Ubuntu is a fork of Debian, that is on of the oldest Linux distributions available...
1 Pages(250 words)Essay

CIS212 U1 Discussion

...Security Management Process Insert Insert Security management entails ensuring that the integrity, confidence and consistency in theavailability of services and data in an organization. It is inclusive of how the security controls are. It has to be in a manner that advances the security and integrity of the data in the organization. It also ensures that users are not services that should be available at all times. Testing will ensure a smooth operation and prevent attacks that take advantage of obsolete concepts. Further, management of intrusions is crucial (Poulsen & LaPage, 2011). The mission is to identify and counter attacks. These should level to a situation that is accommodating to the organization at least. The preceding... Management...
1 Pages(250 words)Essay

Week 1 - Discussion 2

...Discussion 2 According to Dreher and Dougherty (2002) managers play a critical role in influencing the performance of theirworkers. They seek to improve employee performance by conducting a periodic appraisal of the employee performance at their workplace. A Better performing staff is critical for a competitive organization. However, the organizational performance is largely dependent on the employees strategies to control and coordinate the human resources in the organization. However, to achieve better performing staff managers should understand the potential and motivate them to ensure they relinquish that potential towards achieving organizational objectives. The motivation factors may include a...
1 Pages(250 words)Coursework
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic CIS126 U1 Discussion 2 - 1 for FREE!

Contact Us