StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

CIS126 U1 Discussion 2 - 1 - Essay Example

Cite this document
Summary
The evolving nature of Object Technology has caused many companies to reexamine their legacy codes to ensure that it matches it. The…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.7% of users find it useful
CIS126 U1 Discussion 2 - 1
Read Text Preview

Extract of sample "CIS126 U1 Discussion 2 - 1"

The Dark Side of Object Technology Insert Insert Object technology became prevalent in industrial languages as from 80’s but became established in other languages like Java and UML in the 90s. The evolving nature of Object Technology has caused many companies to reexamine their legacy codes to ensure that it matches it. The progress and acceptability of Object Technology have been growing significantly in the market. In the recent years, some languages like C++ and Java have considerably advanced in the use of Object Technology.

Despite the many benefits that object technology poses, its weaknesses include them being complex legacies that scare its owners. The latter has made timely delivery a complicated process. TDD, for instance, face the challenge of their own code with its developers not willing to continue that path. It is important to define correctly the APIs for use in the system other than just using the IDE to refactor the code that requires a very constructive intervention. Object oriented code becomes difficult to handle mainly due to the absence of modularity.

The lack of limits in modularity has made frequent developments almost an impossible thing. It significantly compromises the risk of making alterations to the legacy code. Further, there are extra dependencies brought about by frameworks in the open source community. The result is frequent errors and slows down the speed of development. In such environments, code refactoring becomes such a complicated process that is not worth pursuing. Other challenges include non-experts in Object Oriented code involved in the development process of these systems.

Since these persons do not uphold the disciplines in the development, they compromise the use of libraries or frameworks. Consequently, there is a lot of codes that is purely reproduced.ReferencesThomas, D. (2008). The Legacy and Liability of Object Technology The Dark Side of OO. JOT, 7(6), 27. doi:10.5381/jot.2008.7.6.c3

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS126 U1 Discussion 2 - 1 Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1694731-cis126-u1-discussion-2-1
(CIS126 U1 Discussion 2 - 1 Essay Example | Topics and Well Written Essays - 250 Words)
https://studentshare.org/information-technology/1694731-cis126-u1-discussion-2-1.
“CIS126 U1 Discussion 2 - 1 Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1694731-cis126-u1-discussion-2-1.
  • Cited: 0 times

CHECK THESE SAMPLES OF CIS126 U1 Discussion 2 - 1

U4 Discussion

Considering both file permissions and shared folder permissions (and any other situation that may be applicable), what steps would you go through… List the different reasons the user may be having trouble accessing the file. Trouble shooting a problem on a computer network works if one follows a logical U4 discussion U4 discussion Part I Consider the situation in which a user is trying to access a file through a network share....
1 Pages (250 words) Coursework

Florence Nightingale and Public Health Policy

Therefore, we must ensure that health policies built in every society is directed on the basis of experiences and recommendations discussion Forum Introduction (can be used with any of the below subheads/answers) That health policy benefits greatly from the observations providedby nurses, came to common notice when Florence Nightingale in her inimitable way provided everyone directives in health policy and administration....
2 Pages (500 words) Essay

U1 Discussion

As a network administrator, I am tasked with maintaining the computer software and hardware systems which make up the computer network, such as, monitoring and maintaining of either converged infrastructure or active data network, monitoring network traffic, testing the network… The Dynamic Host Configuration Protocol (DHCP) is a network protocol which enables the server to assign automatically an IP address to a computer from a definite scope configured from Cause of IP Address Conflict and its Resolution s Cause of IP Address Conflict and its ResolutionAs a network administrator, I am tasked with maintaining the computer software and hardware systems which make up the computer network, such as, monitoring and maintaining of either converged infrastructure or active data network, monitoring network traffic, testing the network for weakness, and installing and implementing security programs (Bautts, Dawson, & Purdy, 2010)....
1 Pages (250 words) Coursework

Preventing Intellectual Property Theft

The south-Korea gigantic electronic manufacturer, Samsung, has been able to thrive in the contemporary competitive world due to possession of two important IP including patents and trademark.... Patents gives the company the right to sue anyone who reproduces their electronic… ts without the company's consent while the trademarks bars anyone from using the company's name or logo to market their products (Burgess & Power, 2008). Ideas are the hardest IP for an organization to protect since they are so simply copied or imitated either in full and DISCUSION 2 [Insert al Affiliation] Intellectual Property (IP) and Preventing IP Theft The south-Korea gigantic electronic manufacturer, Samsung, has been able to thrive in the contemporary competitive world due to possession of two important IP including patents and trademark....
1 Pages (250 words) Essay

CIS212 U1 Discussion

It is inclusive of how the security controls are.... It has to be in a manner that advances the security and integrity of the data in the… It also ensures that users are not services that should be available at all times.... Testing will ensure a smooth operation and prevent attacks that take advantage of obsolete concepts....
1 Pages (250 words) Essay

Nuclear Plant Password Policy

A threat is anything that poses the danger to the computer system whereas vulnerability refers to a loophole or a weakness that hackers or attackers can use to attack a system.... Atheotherhandlikelihoodloss There are situations where a risk is said to be vulnerability but in other… 3) A biometric handprint scanner is as part of a system for granting access to a facility....
4 Pages (1000 words) Essay

CIS212 U3 Discussion

Access control tools are concerned with determining the allowed activities of legitimate users, mediating between every attempt by a user to access a particular resource in the system.... Its main objective is to make sure that undesired users do not get access to certain… Role-based access control and Discretionary Access Control both are based on defining the roles and adding each user to the system....
1 Pages (250 words) Essay

CIS256 U3 Discussion

These names represent the names of particular hosts.... When the domain name is said to be fully qualified, it means that the hostname is a… For instance, gendersoft.... omain.... om. I would prefer Microsoft domain name service as compared to BIND DNS.... The reasons for this include the centrality of access to the role as a part of the Windows server package (Minasi, 2014)....
1 Pages (250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us