Book Image

Practical Remote Pair Programming

By : Adrian Bolboacă
Book Image

Practical Remote Pair Programming

By: Adrian Bolboacă

Overview of this book

Remote pair programming takes pair programming practices to the next level by allowing you and your team members to work effectively in distributed teams. This helps ensure that you continuously improve code quality, share equal ownership of the code, facilitate knowledge sharing, and reduce bugs in your code. If you want to adopt remote pair programming within your development team, this book is for you. Practical Remote Pair Programming takes you through various techniques and best practices for working with the wide variety of tools available for remote pair programming. You'll understand the significance of pair programming and how it can help improve communication within your team. As you advance, you’ll get to grips with different remote pair programming strategies and find out how to choose the most suitable style for your team and organization. The book will take you through the process of setting up video and audio tools, screen sharing tools, and the integrated development environment (IDE) for your remote pair programming setup. You'll also be able to enhance your remote pair programming experience with source control and remote access tools. By the end of this book, you'll have the confidence to drive the change of embracing remote pair programming in your organization and guide your peers to improve productivity while working remotely.
Table of Contents (14 chapters)
1
Section 1: Introduction to Pair Programming
5
Section 2: Remote Pair Programming
9
Section 3: Tools to Enhance Remote Pair Programming

Security for remote access

Perhaps one of the things that programmers don't consider strongly enough when it comes to remote pair programming is security. I would say that there are two types of security, as follows:

  • Personal security: This includes following the best practices for cybersecurity.
  • Technical security: Make sure you respect security guidelines.

Let's understand each of these in the following sections.

Personal security

When talking to security experts, one of the main focuses is on how an individual can make small mistakes that generate holes in the security of a software or hardware system. The most danger comes from how careful we are with our systems, considering that we know how our systems work and what could go wrong.

We might think that most errors come from the technical side and that our systems might have technical problems. However, most problems come from how we, the users, interact with the system, and how we create...