Feeds

Stuck in a dull conference? You need Verity's survival guide

Getting your own back on technical seminar speakers

Seven Steps to Software Security

Pattern: Fizz-Buzz

Motivation: Speaker needs to add credibility to whatever programming technique he is pushing

Intent: The key has a strong awareness of which words and phrases are currently fashionable.

Implementation: This brief extract from a recent talk demonstrates the point:

Talk giver, hitting a climax: ...so you see, you can use this approach to inject a functional approach into an existing framework.

Delegate, raising arm: Isn't that very object-oriented?

Talk giver, hastily: Oh, no. It's not object-oriented. It's not object-oriented at all. It's very fluent and lightweight.

Delegate subsides, satisfied and impressed.

Examples: Long ago, the writer heard Bjarne Stroustrup himself complain that "object-oriented" had become a marketing synonym for "good". Many clichés have coursed through the culvert since then, and now it has become a coded term for "old-fashioned" - which is pretty much the same as "bad", to one decimal place.

It is not enough, then, for a speaker to speak in buzzing-words and fizzing-phrases. The key is to be aware of how much of their credibility remains to be spent, and to avoid worn-out terms loaded with non-technical debt.

Here is a small kut-out-'n'-keep table of examples, current as of writing, to get you started:

Buzziness of Buzzwords, May 2012
Jargon Credibility
(1.0 best, -1.0 worst)
agile -0.17
design by contract -0.82
data-driven -0.76
fluent 0.97
functional 0.95
injection 0.65
inside-out/outside-in 0.32
lightweight 0.57
native 0.81
object-oriented -0.84
pattern -0.13
performant -0.21
pushback 0.77
seam
0.93
technical debt
0.16
test-driven
0.12
top-down/bottom-up -0.72
unit test (as noun)
0.36
unit test (as verb)
0.43
virtual
-0.53


Observation: What's that Sooty? This whole article depends on the jargon word "pattern", and you have shown it to be a spent force?

Aaargh, you got me. ®

Reducing security risks from open source software

More from The Register

next story
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Chrome browser has been DRAINING PC batteries for YEARS
Google is only now fixing ancient, energy-sapping bug
Do YOU work at Microsoft? Um. Are you SURE about that?
Nokia and marketing types first to get the bullet, says report
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
EU dons gloves, pokes Google's deals with Android mobe makers
El Reg cops a squint at investigatory letters
Big Blue Apple: IBM to sell iPads, iPhones to enterprises
iOS/2 gear loaded with apps for big biz ... uh oh BlackBerry
prev story

Whitepapers

Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.