Want to know best agile project management software? we have a huge selection of best agile project management software information on alibabacloud.com
. idatareader datareader );
In the database transaction section, apart from opening and closing the transaction normally, I recommend a transaction delegate and method for execution. idataaccessor provides the transactionexecute method, definition of its delegate transactionhandler:
/// /// Define the transaction processing delegate for database operations. This delegate will execute database transactions on behalf of the customer, so that the user does not need to consider the start and end
.
IServer
System session server interface, which is defined as follows:
IServer is the server end of a system session. It defines the server name, location information, and session set established on the server in the interface. One to N sessions can be established on an iServer, that is to say, the server can communicate with N clients simultaneously.
Iclient
System session customer interface, which is defined as follows:
Iclient is a client for system sessions. It defines the
Code is often corrupted. With the addition of one new feature, the structure of the Code gradually degrades when an error is handled. If you ignore this, this kind of degradation will eventually lead to tangled and difficult to maintain chaotic code. The XP (eXtreme Programming) team uses regular code refactoring to reverse this degradation. Refactoring does not change. A series of small modifications are made to improve the system structure on the premise of code behavior. Every transformati
Time is money, waste time is a waste of life "I believe that we have heard a lot of, so in the work we have to be in the limited time possible to complete more things, reflect their own value." In order to reflect their own value, nature can sometimes harm the interests of others. Some time ago in doing a big project, with the cooperative company, the preliminary work is carried out by them, such as some information to find. They passed it on to us. W
the Custom Level, enable "initialize and execute scripts for ActiveX controls that are not marked as secure scripts.
So far, activexform's IE security settings have been completed. If you need to add one point, the big brother and sister of the win7 operating system choose to run as administrator when starting IE.
Webform application subordinates
Agileeas. NET provides a webform running container for pure webform. developers can modifyCodeAnd style. The code structure is as follows:
First, let's analyze the background. What are the most unstable factors in the software development process? -- The answer is demand! Requirements may change all the time during software development. Then, how to flexibly cope with changes is the most important and difficult issue in software structure design. A good design brings great flexibility, and a bad des
processing methods at the data access layer and completes such as transaction processing.
The business logic proxy layer component generates the corresponding business proxy code based on the business layer components to complete the function of transferring requests from the system interface layer to the real business logic layer.
UI development
Interface Layer Development is a very important part in application development. All applications provided by the
results. Activities in this phase include Assembly, system testing, and regression, preparation of training materials, and completion of final documents.The SCRUM process assumes that the development of a product will continue unless it is deemed that it should be stopped after risk assessment. After the product is delivered, the consolidation activities are similar to the maintenance and improvement in the traditional method. The purpose is to sort out the work neglected under the pressure of
For details about how to develop the three branches, see my other article Analysis of the most basic branch management mode in Agile Development>; 3 branch mode:
If you and your development team are faced with the following problems at the same time, I strongly recommend that you consider using at least three branch development models:
· You only use one or two branches for development.
· Your
existing stories. If you have a large user group, it is a good way to prioritize stories on mobile phones during the questionnaire. The questionnaire is very useful when you need to obtain specific answers from a large number of users.
2. Questionnaires are not suitable for capturing new stories. Static questionnaires are not easy to follow based on subsequent questions.
3. Observation
1. Observe the actual use of software. Generally, only internal p
This is the first of a series of Martian previews (one, two, three, four, five questions and answers, six, seven).
One: Demand and story structure
Second: Edit stories, product management, organizational structure
The third: iteration, planning, assigning tasks
Part Four: Storyboard, burndown chart, my work item
V: FAQ
The six: My Space, my notice
The Seven: custom fields
In addition to doing training, blogging, editing manuals, two years
Note: The Development Management Checklists-series of articles are transplanted from my iteye blog. The Development Management checklists column will be updated directly in the future.
This article mainly aims to check your understanding and usage of scrum Sprint plan meeting 2,
Through this article, you can check1. process and steps of your scrum Sprint plan meeting 22. Results of scrum Sprint plan Meeting
The explosion of data in the Information Age allows us to receive massive amounts of information every day, but how much of it is useful to us needs to be selected and processed. However, it is still a process that can truly be transformed into the knowledge in our head. This process is called Personal Knowledge Management. Agile individuals refer to several key points of Personal Knowledge
Note: The Development Management Checklists-series of articles are transplanted from my iteye blog. The Development Management checklists column will be updated directly in the future.
This article mainly aims to check your understanding and usage of scrum,Through this article, you can check1. Are the roles in your scrum project qualified,2. Are there any issues
This is the eighth article in the agile development product management series. (Column directory)
In product development, product performance problems are often encountered, which will greatly affect the product architecture.
However, to solve these performance problems, do not think it is only a matter of technical personnel. The product manager and product director should also participate in the process,
development (requires software methodology support to do software project management)
8. Agile, extreme programming, lean thinking
8.1. Heavy software project
Feathers Branch, and the edge development side is debugged locally, so a version will have multiple Feathers branch, and the new overwrite is constantly submitted.
When the branch code review, the project leader can merge this code into the develop, when all the features are integrated into the develop mainline, release Branch can be released and tested by the tester.
When the test is tested through all the pre-sent branches, develop a bug fix on the
I. Main process of risk management
Risks in software projects refer to the damages or losses that may occur during software development and the software products themselves. The purpose of risk management is to identify potential problems before they arise, so that risk
1. What is configuration management?
Software Configuration Management is a technology that identifies, organizes, and controls software modifications. It is used to coordinate and control the entire process. It is a series of measures to control and standardize software pro
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.