Attention: This article was published over 14 years ago, and the information provided may be aged or outdated. While some topics are evergreen, technology moves fast, so please keep that in mind as you read the post.In Part One of this series, I reviewed the basic design goals of a Data Access Layer (DAL), those being: Contain all of the …
Programmers and the Amazon Have This in Common
Attention: This article was published over 14 years ago, and the information provided may be aged or outdated. While some topics are evergreen, technology moves fast, so please keep that in mind as you read the post.Have you ever been stuck on a problem, some seemingly un-explainableย production malfunction in the code? Youโve stepped though it with the debugger, run enumerable …
Keyhole Software Recognized as 2012 Top Management Consultant Firm
Attention: This article was published over 14 years ago, and the information provided may be aged or outdated. While some topics are evergreen, technology moves fast, so please keep that in mind as you read the post.Keyhole Software was recognized as a Top Area Management Consultant Firm by the Kansas City Business Journal for the very first time. Tied at …
The Data Access Layer, Part 1 – The Basics (And When Things Aren’t So Basic)
Attention: This article was published over 14 years ago, and the information provided may be aged or outdated. While some topics are evergreen, technology moves fast, so please keep that in mind as you read the post.Today, I’d like to talk about the data access layer (DAL). I’ll start with a brief review: the motivation behind the DAL, the design …
A Method For Creating A Human-Readable File Size
Attention: This article was published over 14 years ago, and the information provided may be aged or outdated. While some topics are evergreen, technology moves fast, so please keep that in mind as you read the post.Recently,ย I was working on a project in which the users needed to see a list of files available for download. While itย wasn’tย a specific requirement, …
