Program Architecture and software and application architecture
Recently, I have been paying attention to zhang3's research on new programming languages in Douban [1] and some related discussions. Here is a place that fits with my key domain model and modeling and architecture, that is, the
advent of Runtime pm and mature as soon as possible, it is particularly important.3. Software Architecture for Generic pmAfter introducing the basic concept of generic PM, let's take a look at its overall implementation in the Linux kernel and abstract the simple software architecture so that the main components of ge
A good start is half the success
The initial architecture design determines the survival of software products. "A good start is half the success ".
The initial architecture design is also the most difficult. We need to investigate the situation and technical characteristics of similar products and learn about the theoretical support and technical platform suppor
Chapter 2 PrefaceThere are already a lot of automated testing tools available on the market, but it is difficult to find or pay for the testing tools that meet your needs, for software products running on the Linux/Unix background, you can develop an automatic testing tool that not only meets the software testing requirements, but also saves a lot of money.The design of this automatic testing system
obtain the required network resources, and the server provides the client with the required network resources.
It is a software system architecture. It can take full advantage of the advantages of both ends of the hardware environment, and assign tasks to the client and server, thus reducing the communication overhead of the system. Currently, most application softwa
Hardware and software are two parts of a chip system that are mutually dependent. This article summarizes the hardware and software components of a chip.(1) Hardware
Master CPU: computing and control core. The basic architecture of the Baseband Chip adopts the structure of microprocessor + Digital Signal Processor (DSP). The microprocessor is the control center o
I personally think that there are too many concepts in this book. The architecture and development of software are not a combination of concepts. Just use the appropriate words to describe some empirical things.
The so-called risk-driven model selects the appropriate design strength based on the project situation to avoid over-design. For complex software systems
Content:
Simple law (subtraction design)
Subtraction design is a strategy, and creation is a strategy to win
What is EIT Software creation?
Use of EIT Creation
Features of EIT Creation
EIT-shaped internal elements
Conclusion
The complexity of software design and future changes are essential and cannot be deleted (because deletion is no longer a complete and life-saving system ). The subtract
the enterprise access the webserver/application server via the Internet? b/S structure;? Users are not directly interviewed for data, data security.§ "Internal and external" model is the disadvantage of the enterprise external users to change and maintain data, slow, more complex lock. The dynamic interactivity of data is not strong§ Mixing principle Two: the principle of "the search and Change is different":– no matter where the user is located inside or outside the enterprise (local area netw
: Data and operations. In C language, struct is only a collection of data. We can use a function pointer to simulate struct as a "class" that contains data and operations ". The following C program simulates the simplest "class ":
# Ifndef c_class# Define c_class struct# EndifC_class{C_class A * a_this;/* This pointer */Void (* Foo) (c_class A * a_this);/* behavior: function pointer */Int A;/* Data */Int B;};
We can use the C language to simulate three features of the forward Obje
operations on specific data. The class contains two categories: Data and operations. In C language, struct is only a collection of data. We can use a function pointer to simulate struct as a "class" that contains data and operations ". The following C program simulates the simplest "class ":
# Ifndef c_class# Define c_class struct# EndifC_class{C_class A * a_this;/* This pointer */Void (* Foo) (c_class A * a_this);/* behavior: function pointer */Int A;/* Data */Int B;};
We can us
system; finally, we will focus on the distributed computing mode language, which describes the technical topics related to the creation of distributed systems.This book applies to software architects and developers
Directory
Part 1 OverviewChapter 2 mode and mode language 21.1 Mode 21.2 mode insider 31.3 relationship between modes 51.4 mode language 7Connection in 1.5 Mode 8Chapter 2 distributed system 92.1 Advantages of distributed 92.2 distributed
this field, and architects will have the opportunity to re-engineer the front-end architecture, or even the development process, to make the entire software production more efficient.This article will explore the changes it brings to this field.Text: Features of enterprise application front-endEnterprise Application System is a very common software system, the c
servers are used, when one server goes down, only part of the data in the system is unavailable, not all. Therefore, database splitting can not only use multiple servers to share the load pressure on the database, but also improve the overall availability of the system.
There are two ways to split data::Vertical Split and horizontal split.1.1 Vertical Split
Vertical splitting refers to splitting the data tables accessed by each module into different
-slave backupAnd so on, the specific cache strategy needs you to combine the project consideration, the personal comparison recommendation Memcached, enough on the line.WCF,WCF Restful,webservice,webapi?For. NET system, these technologies are able to decouple resources and services, and which technology needs to depend on your application scenario.Personally, I prefer to use the WCF TCP pattern for enterprise intranet applications, which is highly efficient and supports duplex communication.When
perspective of the entire hierarchy, development tools and applications belong to the same level, because they all use an interface, that isOperating System Application Programming Interface (API). The application interface provider isRuntime Library, What kind of Runtime Library provides what kind of API, such as the posix api provided by the glibc library in Linux; Windows API provided by the Windows Runtime Library.
The Runtime library usesSystem Call Interface(System Call Interface), system
"Disclaimer: Copyright, welcome reprint, please do not use for commercial purposes. Contact mailbox: feixiaoxing @163.com "Recently seldom write blog, mainly because they have been looking at the school of wheat things, learning more time. Wheat College is an online video learning website, mainly about it development related content, interested students can pay attention to. Another site I think is a good one is geek college. Of course, these are off-topic.A few days ago, just a former colleague
An excellent architect always has a good balance between the merits of various solutions and the corresponding cost, which is the architect's rich experience and broad knowledge system. The message-based software construction model is the architect's necessary knowledge point, this article will describe the model's evolution process in detail. Remember the first time I was dealing with the company's software
Tags: HTML relationship design best case sharing picture equals a time20172305 2018-2019-1 "Java software architecture and data structure" the first week of learning summary textbook study content this week is mainly about the contents of the first and second chapters of the book:
Chapter I.
Software quality:
Accuracy (the degre
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.