Feeds

Practical Development Environments

From soup to nuts

Reducing security risks from open source software

Book review Given the foundations of computing in symbolic logic and discrete mathematics, it should be something of a surprise that developers are so prone to religious disputes, schism and sectarianism. It’s not just the big things - Java vs C#, Python vs Ruby - that developers get factional about: it’s everything, from IDEs to operating systems to code indentation (tabs vs spaces), and naming standards.

Practical Development Environments

Mundane considerations of programming language or IDE are pretty much outside the scope of Matthew Doar’s ‘Practical Development Environments’. Rather than NetBeans vs Eclipse vs IntelliJ, the book takes a much broader definition of development environment, and encompasses build management, software configuration management (SCM), unit test environments, documentation, bug tracking and release management.

The first couple of chapters put things in context by discussing the different phases of a typical project, from coding to release, documentation to bug tracking. While development methodologies differ in quite fundamental ways, there’s also a great degree of commonality between them. Where unit testing sits in the life-cycle varies by process, but it’s there in pretty much every process worthy of the name. And as for SCM, it’s pretty much essential on anything but the smallest of projects.

With some context and some definitions in place, the rest of the book looks at each of these major areas, as parts of a development environment, in turn. Starting with a look at the issues involved and the technical requirements that a product should meet, this is followed by a more detailed survey of a range of products. The product survey takes in many of the major open source projects in each given area, along with one or two of the leading commercial applications.

The chapter on SCM, for example, looks at the complex issues involved in managing multiple source files for multiple versions of products to be used by multiple developers. Branching, tagging, merging and the like are a logistical nightmare and even basic functionality, such as concurrent access to source files, varies widely between products. In this case the product survey includes CVS, Subversion, Arch, Perforce, BitKeeper, ClearCase and Visual SourceSafe.

Aside from the technical aspects of a development environment, the book does not neglect some of the other aspects of projects. For example, there is a chapter on project communication that looks at building a project web site that is more than just a ‘nice to have’ having a central repository for looking at build status, error reports, unit test results etc is a good idea.

Additionally there’s a chapter on the politics of ‘toolsmithing’. As with introducing a new development process, building a development environment of the type outlined in this book is a political as well as technical process. All developers have a personal toolbox of utilities that they know how to use, so replacing these personal favourites with project-wide tools can be a tricky process that can easily be derailed. Devoting a chapter to this is a good idea and underlines the fact that the discussion throughout the book is focused on project practicalities rather than on theoretical issues.®

Practical Development Environments

Verdict:Recommended for an end-to-end view of development environments.

Author:Matthew Doar

Publisher:O’Reilly

ISBN:0596007965

Media:Book

List Price:£28.95

Reg price: £23.16

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.