{"id":344,"date":"2017-03-31T11:17:45","date_gmt":"2017-03-31T06:47:45","guid":{"rendered":"http:\/\/www.enhisecure.com\/isecureblog\/?p=344"},"modified":"2017-03-31T11:17:45","modified_gmt":"2017-03-31T06:47:45","slug":"blog-on-design-patterns","status":"publish","type":"post","link":"https:\/\/www.enhisecure.com\/isecureblog\/2017\/03\/31\/blog-on-design-patterns\/","title":{"rendered":"Design Patterns for Programmers"},"content":{"rendered":"<p>In 1986,\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Chernobyl_disaster\">Chernobyl <\/a>was the result of bad designs\/coding. Huge disasters in the world happen due to naive and inappropriate logic built into systems.<\/p>\n<p>From a refrigerator to your car, a mobile to a rocket, everything runs on a microprocessor. It is a logic builder\u2019s responsibility to take care of some cliched issues that might crash the entire system.<\/p>\n<p>In 1995 at <a href=\"https:\/\/en.wikipedia.org\/wiki\/Sun_Microsystems\">Sun Microsystems<\/a> <a href=\"http:\/\/www.oodesign.com\/\">design patterns<\/a>\u00a0were developed by visionaries christened\u00a0as <a href=\"http:\/\/wiki.c2.com\/?GangOfFour\">GOF (gang of four)<\/a>.<\/p>\n<p>This Video blog is an attempt to lucidly present the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Software_design_pattern\">design patterns<\/a>, which have to be considered by every programmer, irrespective of platform of development, for impeccable results.<\/p>\n<p>In this presentation, we spoke about almost all the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Software_design_pattern\">design patterns<\/a> which are\u00a0mostly used in Software\u00a0Development.In a nutshell, the following are the various aspects of <a href=\"http:\/\/www.oracle.com\/technetwork\/articles\/javaee\/j2eepatterns-136748.html\">design patterns<\/a> covered as part of the video:<\/p>\n<ol>\n<li>Creational Design Pattern &#8211; 7 design patterns.<\/li>\n<li>Structural Design Pattern &#8211; 6 design patterns.<\/li>\n<li>Behavioral Design Pattern -11 design patterns.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><iframe loading=\"lazy\" title=\"Design Patterns for Programmers\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/AacYZY30Yd4?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In 1986,\u00a0Chernobyl was the result of bad designs\/coding. Huge disasters in the world happen due to naive and inappropriate logic built into systems. From a refrigerator to your car, a mobile to a rocket, everything runs on a microprocessor. It is a logic builder\u2019s responsibility to take care of some cliched issues that might crash [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[16],"tags":[65],"class_list":["post-344","post","type-post","status-publish","format-standard","hentry","category-technology","tag-coding-standards"],"_links":{"self":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/344","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/comments?post=344"}],"version-history":[{"count":9,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/344\/revisions"}],"predecessor-version":[{"id":352,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/posts\/344\/revisions\/352"}],"wp:attachment":[{"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/media?parent=344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/categories?post=344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.enhisecure.com\/isecureblog\/wp-json\/wp\/v2\/tags?post=344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}