Legacy Code Rocks explores the world of modernizing existing software applications. Hosts Andrea Goulet and M. Scott Ford of Corgibytes are out to change the way you think about legacy code.
If you’re like a lot of people, when you hear the words “legacy code” it conjures up images of big mainframes and archaic punch card machines. While that’s true — it only tells a small part of the story. The truth is, the code you leave behind is your legacy, so let's make it a good one.
There are three groups of people around every legacy system - those who are stuck with it, those who don't want to be with it, and those who love it and see its value. How do we reconcile these three…
One of the reasons why it is difficult to work with legacy code is the lack of preserving the contextual reasons for past coding choices.
Today we talk with Chelsea Troy, a Machine Learning Team Lea…
Mending code while it is running is risky. One wrong move and a small change can bring the entire system to a halt.
Today we talk with Edward Hieatt, Chief Customer Officer at Mechanical Orchard, a …
AI proves to be great at writing new code, but what are its capabilities when it comes to mending the old one?
Today we talk with Ray Myers, a legacy code expert and sceptical enthusiast for AI. With…
Many of the largest companies rely on third-party code to run critical parts of their software. However, there's often little focus on ensuring the quality of these external dependencies.
Today we sp…
How do the love for vintage computers and test automation come together? Can one inspire another and how?
Today we talk with Sophia Mckeever, a software development engineer at Pokemon Company Intern…
In Kubernetes, security is a joint effort between security engineers and DevOps. A perfect tool to bring these two together is Kubescape, an open-source Kubernetes security project.
Today, we talk w…
Reviewing logs for security threats and operational functions can be a cumbersome task. Attention is a finite resource, and it is easy to miss something when faced with megabytes of data.
Today, we …
Cyber security is not a core activity of most software development companies. It is an outsourced activity that simply has to be done so that we can deploy our core services.
Today, we talk with Sco…
How to set up developers for success? For the longest time, companies left developers to their own devices to figure out the workflows and tools they will be using. As the teams grew, so did their pr…
Simply knowing what is in your software is not any guarantee of safety. We need to know what that software does versus what we expect it to do. We need to know its rules of behavior.
Today, we talk …
In the age of rising AI, we cannot neglect the topic of the social and political consequences of the code we leave behind. Today, we talk with Amy Newell, a 24-year veteran of the tech industry and a…
Automating refactoring and code transformation is a fascinating and efficient way to eliminate technical debt. Today, we talk with Jonathan Schneider, a Co-Founder and CEO of Moderne, Inc., and a for…
Imagine if you could counter ransomware by exploiting it to create a backup of your attacked data for you. Now, that would be disruptive!
Today, we talk with Lance James. James is an experienced cyb…
Going from monolith to microservices is one of the most popular topics in software engineering. But jumping the boat without understanding why can be a dangerous (and expensive) adventure.
Today we …
Microsoft invited the Legacy Code Rocks team to attend Microsoft Build Conference and gave us access to the studio on the third floor of the Seattle Convention Center. In this episode, we talk with R…
Microsoft invited the Legacy Code Rocks team to attend Microsoft Build Conference and gave us access to the studio on the third floor of the Seattle Convention Center. In this episode, we talk with D…
Microsoft invited the Legacy Code Rocks team to attend Microsoft Build Conference and gave us access to the studio on the third floor of the Seattle Convention Center. In this episode, we talk with K…
How many of your passwords do you actually know? Now, how many of those passwords are already on the black web? We are living in a fascinating age of transition from personalised passwords dependent …