policy

Is there a valid reason for enforcing a maximum width of 80 characters in a code file, this day and age?

Seriously. On a 22" monitor, it only covers maybe a quarter of the screen. I need some ammo to axe down this rule. Edit: I'm not saying that there shouldn't be a limit; I'm just saying, 80 characters is very small. ...

How often does your company pay for your training courses?

Does your company offer you training courses to enhance your skills? How many courses per year are you allowed to take part in? Does your company pay for the training courses or do you have to pay for them? Please let me know what you think about this subject and how your company treats this. EDIT: Not many answers up to now, but it ...

How to enforce locking workstation when leaving? Is this important?

Within your organization, is every developer required to lock his workstation when leaving it? What do you see a risks when workstations are left unlocked, and how do you think such risks are important compared to "over-wire" (network hacking) security risks? What policies do you think are most efficient to enforce locking the workstat...

Java RMI Tutorial - AccessControlException: access denied (java.io.FilePermission ...

Yesterday I tried to get started with Java RMI. I found this sun tutorial (http://java.sun.com/docs/books/tutorial/rmi/index.html) and started with the server implemantation. But everytime I start the pogram (the rmiregistry is running) I get an AccessControlException with the following StackTrace: LoginImpl exception: java.security.Acc...

Hotkeys override

Difficult question. The answer is probably no, if all I found in the Intertubes is right, but it is worth a try. I need to override the CTRL+SHIFT+ESC and the CTRL+ESC combinations. It would be good to be able to override the WIN key combinations, but I have a low level hook that does such, I only wish I didn't need it. If I can manage t...

Key ingredients for good tools policy?

A mere sub-standard screwdriver can turn a quick Do-It-Yourself job round the house into an exercise in frustration that makes you feel really exhausted, annoyed and helpless at the same time. This is a feeling that is just too familiar not only to anyone who ever attempted to use a bogus screwdriver but most software professionals who a...

Error adding policy file to GAC

Hi all I'm trying to add a publisher policy file to the gac as per this thread but I'm having problems when I try and add the file on my test server. I get "A module specified in the manifest of assembly 'policy.3.0.assemblyname.dll' could not be found" My policy file looks like this: <configuration> <runtime> <assemblyBinding...

Code review policy example?

I was asked to author a formal code review policy document. It was to meet PCI requirements, but I have no idea what such a document might look like or include. Are there any examples of such a document? ...

System Backup policy -- tell me what you think of this new company policy

We used to have a company policy that stated that we were to use an automated back up tool to back up the important directories on our workstations to network drives. I was just informed by one of our Architects that we were no longer allowed to backup our workstations to network drives, or even use our network drives. We have been instr...

How can I convince IT that F/OSS software isn't evil?

When trying to link some well established tools to my company's active directory, I hit a roadblock. I was told that: "Sorry, I cannot trust our domain admin password to [F/OSS] software...". This question deals specifically with how to convince IT that F/OSS software isn't (automatically) less trustworthy than any other software j...

Do you have any commit policies?

My boss announced yesterday a new commit policies for checkins into the repository. This policies are valid for commits into head/trunk and branches. A commit message must have the following items: Reason (Bug ID,Project ID, or non functional change) Name of the reviewer After the commit we also have to create a change blog entry in...

Have you ever had to file "TPS reports"?

No, not literally. Rather, do you have any red tape horror stories of policies that affected your ability to produce quality software? I'm not talking about general human resources or systems administration policies like this question, but policies that were directly targeted at the development process, such as bad source control polic...

Developer hiring policies and practices

What qualities are you looking for in a developer? How do you find the kind of people you are looking for? Would you settle for less if no suitable candidate presented him/herself within a reasonable period of time? ...

Do you pseudo-code?

Do you use pseudo-code to help you program? Does it help you write your programs faster with less bug-prone code or does it simply waste time? Should it be standard practice to declare what you're going to program before being allowed to get your hands dirty writing? (See Literate Programming) Please write your opinions and the benefit...

Trusting an assembly located on a network share.

Hello all, I've been meaning to post on here for a while but always find the information I need; up untill now of course! I would appreciate any help you may be able to offer in regards to code access security, and in particular dll's on a network share. I am looking for a way to dynamically load assembles for reflection, instantiation...

Embedding publisher policy into assembly

Hello there, I'm developing a shared assembly, version 2.0.0.0. For future compatibility, I'd like to bind all the 2.0.x.x versions to the latest version installed. To do so I need a publisher policy file. Is there a way to embed the publisher policy directly in the "code" assembly instead of having to install two different assemblies? ...

Sql 2008 "Public Not Granted Server Permission" policy

I recently started looking into the new Policy Management in SQL Server 2008 and when I checked for compliance with the "Public Not Granted Server Permission" policy, my server failed the check. The reason was, and I am pretty sure this is the default, public has TCP Endpoint permission so that users can connect to the server. If I wer...

Enterprise Library 4.1 Exception policy

Hello, I am using Enterprise Library 4.1 and want to implement Exception handling and logging. I am able to setup one policy that handles general Exceptions of the System.Exception type. I call this policy 'Data Access Policy'. In a general application development rule, how many policies should I create? What are the best practices for...

Time restricted service

Hi, i'm developing an app that make requests to the Musicbrainz webservice. I read in the musicbrainz manual to not make more than one request per second to the webservice or the client IP will be blocked. What architecture do you suggest in order to make this restriction transparent to the service client. I would like to call a me...

provide assembly with full trust in sharepoint by custom policy level not working

Hello All, I'm building a couple of ucercontrols. These usercontrols will be hosted within the return of the smartpart. The problem i'm facing is that my assembly that goes with them, is not properly provided with sufficient rights. To achive this you've (basically) got three options; 1. set the site to full trust level (do not want t...