Select Page
Chow #187 – Switch Point Analysis

Chow #187 – Switch Point Analysis

I hope you read our post on Bayesian Method – MCMC. Probably you may see a mixed Poisson distribution on the number of COVID-19 cases reported during the past 16 days from 12-Apr-2020. As hinted in the Post there will be a mixed distribution From 1st Apr to 15...
To reveal the hidden elephant – TDD

To reveal the hidden elephant – TDD

Thirumanthiram, translated as Holy Incantation, has a famous hymn: மரத்தை மறைத்தது மாமத யானை, மரத்தின் மறைந்தது மாமத யானை.  A partial explanation of the hymn is “For a skilled wood carver,  a log of wood manifests as an elephant. The artisan reveals the...
CHOW #167 – The coin tender  kata

CHOW #167 – The coin tender kata

The challenge of this week is a very famous Code Kata called as Coin Tender. This kata assumes very important and have subtle association with the Post.  Hence I suggest you to first attempt to practice this Code Kata before reading the post. Then again return to this...
Safe transformation of the design – Part II

Safe transformation of the design – Part II

Suggestions by Examples Organisations though recognise adoption of Specification by Examples and Test Driven Development, as one of the proven ways, to develop and enhance features, they are desperate in adopting these models because of several reasons. One of the...
Safe transformation of the design – Part I

Safe transformation of the design – Part I

The constraints imposed by legacy systems and external systems often turn the situations very interesting to work with. Here is one such interesting situation, where I accepted the behaviour of the legacy system as it is, but devised a layer of facade to alter and...