Alibabacloud.com offers a wide variety of articles about best books on design principles, easily find your best books on design principles information here online.
Uncle Bob mentions seven symptoms of poor design in his book, Agile Software Development-Principles model and practice:1, rigidity: Refers to the design is difficult to change;2, vulnerability: Design is easy to be destroyed;3, Stubborn: design is difficult to reuse;4, visco
As computer technology is increasingly widely used in various fields of the national economy, while computer hardware is constantly miniaturization, application systems are evolving towards a more complex and large-scale direction. Database is the core of the entire system. Its design is directly related to the efficiency of system execution and system stability. Therefore, in software system development, database
At present, computer technology has been widely used in various fields of the national economy. While computer hardware is constantly miniaturization, application systems are gradually becoming more complicated and larger. Database is the core of the entire system. Its design is directly related to the efficiency of system execution and system stability. Therefore, in software system development, database design
1. Remote Deployment and nearby Route access to eliminate single point of failure;
(Principles of distributability and scheduling)
2. Data Reporting and monitoring platform;
(User behavior data, system performance monitoring data, reporting of system exceptions and business-related data)
Iii. Hierarchical Data Storage principle: Single-memory cache storage, memory cache + asynchronous update, memory cache + synchronous update;
(Analyze the user beha
Labels: Object-oriented Design Principles
After the previous in-depth explanation, we have basically made it clear about the solid principle. However, if you want to skillfully apply the solid principle, it is not enough to know what the solid is, we also need to know when and when the solid principle is applied (when or where ).
Fortunately, the five independence prin
1 OO design principlesThe use of object-oriented analysis and design ideas, for us to analyze and solve problems to provide a new way of thinking. After we get the demand (omit Ooa, complete later), the next question is: How to object-oriented design of the system?According to the theory of software engineering, the core problem that object-oriented
A day ago, I finally finished the second pass of the design pattern. In these two times, I learned a lot of knowledge. Before looking at OoTV design competition, always mentioned the principle of object-oriented design, which makes me unclear so, until after reading the whole book, only to know that the book has its own gold house. This article mainly writes abou
Principle. Therefore, the name "alias" is the essential meaning. The so-called "one thief first and one king" means that we must first understand the design principles when studying design patterns. All models are developed on the basis of these principles. Some are focused on one, while others are involved. After read
, there are few and relatively simple ideas about database design. Most designs only stay on the surface, which is often fatal and leaves many risks for the system. Either the problem is discovered only during code development, or the problem occurs not long after the system goes online and runs, and it may increase the workload for later maintenance. If you want to modify the database design or optimize it
, there are few and relatively simple ideas about database design. most designs only stay on the surface, which is often fatal and leaves many risks for the system. Either the problem is discovered only during code development, or the problem occurs not long after the system goes online and runs, and it may increase the workload for later maintenance. If you want to modify the database design or optimize it
("System Security Engineering Capability Maturity Model ") and ISO17799 (Information Security Management Standards) and other international standards, comprehensive consideration of implementation, manageability, scalability, comprehensive completeness, system balance and other aspects, the network security protection system should follow the following nine principles in the overall design process:
1. Netw
At Robert C. Martin (Uncle Bob)Agile Software Development: Principles, patterns, and practices)In his book, he proposed some principles for designing components (or packages. The traditional object-oriented design principles, such as solid, carp, and levels of detail, are mainly used to
Article Reprinted from http://www.52robot.cn/bbs/viewthread.php? Tid = 319 extra = Page % 3d1
Industrial Robot Operator
Operating Machine Design Principles and Methods1. Operating Machine Design Principles(1) the principle of minimum inertia is subject to impact and vibration due to frequent changes in the movemen
inheritance in the design, first assume that you have made a mistake. If you do not make a mistake, try to prove it.
(56) as long as inheritance is used in object-oriented design, I have two questions: (1) is the derived class a special type of the thing it inherits? (2) is the base class part of the derived class?
(57) If you find multiple inheritance relationships in an object-oriented
The stable abstraction principle sap is the last of the six component design principles. It is usually combined with the stable dependency principle SDP to create a high-quality component dependency structure. Finally, it is the last one ,.
The stable abstraction principle (SAP)
A component shoshould be as abstract as it is stable.The degree of abstraction of components should be consistent with its degree
a unified manner according to the design.
(13) do not create all-powerful classes/objects in your system. Be especially careful about the classes whose names include Driver, Manager, System, and Susystem. Plan an interface instead of implementing an interface.
(14) Be careful with classes that define a large number of access methods in public interfaces. A large number of access methods mean that related data and behaviors are not stored in a central
is, the top-level classes should share work in a unified manner according to the design. P30(13) do not create all-powerful classes/objects in your system. Be especially careful about the classes whose names include driver, Manager, system, and susystem. P30Plan an interface instead of implementing an interface.(14) Be careful with classes that define a large number of access methods in public interfaces. A large number of access methods mean that re
1. Relationship between the original document and the entityCan be a pair of one or one-to-many, many-to-many relationships. In general, they are one-to-one relationships: a single original document corresponds to and corresponds to only an entity.In special cases, they may be one-to-many or many-to-one relationships, that is, a single original document corresponds to multiple entities, or multiple original documents corresponding to an entity.The entities here can be understood as basic tables.
Content Overview What are the six design principles of one, single responsibility principle two, the Richter substitution principle three, the dependence inversion principle four, the interface isolation principle Five, the Dimitri Law six, the open closure principle content elaboration one, the single responsibility principleSingle principle of responsibility: The English name is Responsiblity Principle, a
reasons such as the need to modify the original code of the software, may introduce errors in the old code, or we will have to refactor the entire functionality, and the original code needs to be tested again. This has a special impact on our entire system, which also fully shows the coupling of the system if too high, will greatly increase the later expansion, maintenance. In order to solve this problem, people have summed up the principle of opening and closing. The fundamental solution to th
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.