proof-of-concept

How do you move from the Proof of Concept phase to working on a production-ready solution?

I'm working on a project that's been accepted as a proof of concept and is now on the schedule as an actual production project. I'm curious how others approach this transition. I've heard from various sources that when a project starts as a proof of concept it's often a good idea to trash all of the code written during that rapidly-evo...

Proof of Concept

I need to provide a proof of concept to my boss. Our application is written in WPF, but I know Windows Forms back to front. Acheiving the POC in WPF is taking 3-4 times as long as it would in windows forms. How would you go about this, either use WPF and get an ugly looking POC that takes thrice as long to create, or use windows forms a...

Code that causes physical effects in hardware?

A couple of years ago, I remember reading about an academic project that executed a specific sequence of instructions whose effect was to cause the targeted processor to catastrophically overheat and fail, by exceeding the tolerance limits of the processor's design. It was interesting because it was the only example I've ever seen of a p...

Does a design solution need a proof of concept?

When do we need to prove (with prototyping or any other kind of proof) that a design solution that we came up with is good before implementation? Does it depend on how much the actual implementation would take in comparison to the proof of concept? Does it depend on whether there's any uncertainty about the effectiveness of the solution...

Short-cut/Bypass Spring Security 2.0 authentication using custom AuthenticationManager

For an existing working app, I want to provide a secondary AuthenticationProvider, probably with a DaoAuthenticationProvider. Let's say it's for authenticating a "back up" password, or a prior password that was changed due to strict password policies and the user forgot the new password. ;-) For proof of concept, what would the implemen...

Valid Email Addresses - XSS and SQL Injection

Since there are so many valid characters for email addresses, are there any valid email addresses that can in themselves be XSS attacks or SQL injections? I couldn't find any information on this on the web. The local-part of the e-mail address may use any of these ASCII characters: Uppercase and lowercase English letters (a...

Programming languages & proof of concepts

There are plenty of programming languages out there, as you all may know. I am primarily looking for a list of programming languages WITH some very neat proof of concepts. I would really like to learn a new language, but whenever I dive into something new and popular, it isn't what I expected. Any tutorial out there will give you code, s...

proof of concept document

Hi, i have been asked to submit a Proof of Concept Document before working on the iphone app (for my college) which would include the feasibility of the project, the working of the app and so on. i've never done this before and need a template of a POC for my reference. couldn't find much on the web. ...

SHA1 collision demo / example

This question is similar to this, but that one only references MD5 collision demos. Are there any actual SHA1 collision pairs of arbitrary messages known so far ? I'd like to use these to test how various software products (my own one and some third party) deal with it. Doing some Google searches only turned up the oh-so prominent MD5...

Proof of detecting the start of cycle in linked list

From several posts inside stackoverflow and outside, I have come to know how to detect cycles in a linked list, the length of a cycle. I also found the method on how to detect the start of the loop. Here are the steps again for reference. Detecting Loop: Have two pointers, classically called hare and tortoise. Move hare by 2 steps an...

Generic POC Application

Hello, When looking into new techniques, technologies or frameworks a company would test it through a process using a Proof of Concept (POC). Question: Does your company use a generic application which to apply the concept to, if so what is your application? examples are petshop, northwind, AdventureWorks, shop etc Or does you compan...