<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title>DEV Community: Dustin Byrne</title>
    <description>The latest articles on DEV Community by Dustin Byrne (@dustinbyrne).</description>
    <link>https://dev.to/dustinbyrne</link>
    <image>
      <url>https://media2.dev.to/dynamic/image/width=90,height=90,fit=cover,gravity=auto,format=auto/https:%2F%2Fdev-to-uploads.s3.amazonaws.com%2Fuploads%2Fuser%2Fprofile_image%2F500281%2F05e27af6-a2a3-4924-b5f6-7d6e2d4e85fb.png</url>
      <title>DEV Community: Dustin Byrne</title>
      <link>https://dev.to/dustinbyrne</link>
    </image>
    <atom:link rel="self" type="application/rss+xml" href="https://dev.to/feed/dustinbyrne"/>
    <language>en</language>
    <item>
      <title>Survey: State of Application Architecture Quality</title>
      <dc:creator>Dustin Byrne</dc:creator>
      <pubDate>Wed, 27 Jan 2021 22:41:30 +0000</pubDate>
      <link>https://dev.to/appmap/survey-state-of-application-architecture-quality-56dk</link>
      <guid>https://dev.to/appmap/survey-state-of-application-architecture-quality-56dk</guid>
      <description>&lt;p&gt;We, at AppLand, are excited to be conducting a market survey for product and software architecture quality.&lt;/p&gt;

&lt;p&gt;This 10-minute survey is designed to learn more about both software structural quality and developer efficiency initiatives in software development organizations. “Software structural quality” refers to how well the code meets requirements other than functionality, such as robustness, security, performance and maintainability.&lt;/p&gt;

&lt;p&gt;Why should you take it? As with surveys of this type, we will be making the results of this survey public and if we hit our goal of 300+ responses, we will be donating $1,000 to the Girls Who Code organization. By taking a few minutes of your time you will have access to the results and help a good cause.&lt;/p&gt;

&lt;p&gt;You can find the survey here:&lt;br&gt;
&lt;a href="https://www.surveymonkey.com/r/archsurveygeneral"&gt;https://www.surveymonkey.com/r/archsurveygeneral&lt;/a&gt;&lt;/p&gt;

</description>
      <category>codequality</category>
      <category>programming</category>
    </item>
    <item>
      <title>Uncovering critical data access using AppMaps</title>
      <dc:creator>Dustin Byrne</dc:creator>
      <pubDate>Tue, 27 Oct 2020 19:45:03 +0000</pubDate>
      <link>https://dev.to/dustinbyrne/uncovering-critical-data-access-using-appmaps-3fn3</link>
      <guid>https://dev.to/dustinbyrne/uncovering-critical-data-access-using-appmaps-3fn3</guid>
      <description>&lt;p&gt;As part of a recent hackathon project, I pulled together some data insights from &lt;a href="https://appland.org"&gt;AppMap data&lt;/a&gt;.&lt;/p&gt;

&lt;p&gt;For those unfamiliar, the AppMap framework is a suite of tools that allows developers to record runtime data from their applications. An AppMap client, essentially an agent, is responsible for capturing this data from a live application. It emits a file containing the recorded execution flow, data snapshots, high level process I/O (think HTTP, SQL queries, etc.) and some application metadata. I figured it would be an interesting experiment to identify different types of data accessed and label their usage.&lt;/p&gt;

&lt;p&gt;Here's what I came up with in two days: &lt;a href="https://appmap-data-inspector.netlify.app/?url=https%3A%2F%2Fapp.land%2Fapi%2Fscenarios%2Ffbc57147-b947-4423-bd60-ef0d3369726d"&gt;The AppMap data inspector&lt;/a&gt;. The demo link contains some example data so there's no need to come up with your own.&lt;/p&gt;

&lt;p&gt;This proof of concept makes some attempt at identifying the following:&lt;/p&gt;

&lt;ul&gt;
&lt;li&gt;Sensitive values such as passwords, auth tokens&lt;/li&gt;
&lt;li&gt;Encrypted values such as password hashes&lt;/li&gt;
&lt;li&gt;Unencrypted values which &lt;em&gt;should be&lt;/em&gt; encrypted&lt;/li&gt;
&lt;li&gt;Data persisted within a database&lt;/li&gt;
&lt;li&gt;Data provided by a user, such as an HTTP request parameter&lt;/li&gt;
&lt;li&gt;Personally identifiable information: SSNs, emails, IP addresses (this may not count as PII, but I left it in for the proof of concept)&lt;/li&gt;
&lt;li&gt;Data logged to &lt;code&gt;stdout&lt;/code&gt;
&lt;/li&gt;
&lt;/ul&gt;

&lt;p&gt;A single object can have multiple labels. PII in your application logs? Uh oh! Sensitive data persisting in your database unencrypted? Whoops! References to unencrypted passwords all over the place? Might be a code smell... &lt;/p&gt;

&lt;p&gt;I see a ton of potential improvements for this project, but I'm inclined to let it live on as a proof of concept for now. &lt;/p&gt;

&lt;p&gt;If you have some ideas of your own, I'd love to hear them in the comments below!&lt;/p&gt;

&lt;p&gt;Thanks for reading!&lt;/p&gt;

</description>
      <category>rails</category>
      <category>java</category>
      <category>security</category>
      <category>showdev</category>
    </item>
  </channel>
</rss>
