Note
Software Documents exist in two forms: external and internal. External documents (such as specifications, help files, and design documents) are maintained outside the source code. Internal documents are composed of comments written by developers in the source code during development.
The availability of external documents is not considered. The source code list should be independent because the hard copy document may be put in the wrong place. Ex
Design engineers must follow the following design specifications:
Latest key keepout options:
1) when using PROTEL 99 or dxp software design engineers, be sure not to check the keepout option in online attribute options regardless of the layer when drawing the wire, once the keepout option is selected, this line cannot be made (as long as this option is selected, this line is disabled ),
I. Most common errors related to engineer design:
1) character
change the part to be changed
Support collaboration and interconnection
If possible, add a sense of realism and physical dimensions to the application, as much as possible like real-world items so that users can easily get started
Nice user interface
Try to make the user pay more attention to the content rather than the interface
Minimize the number of forced user-mode operations
Reduce the usage list and change it to another form
Support multi-finger gestures as much as possible
A pop-up windo
Interpretation of json-rpc 2.0 specifications
The JSON-RPC2.0 specifications are maintained by the JSON-RPC Working Group (json-rpc@googlegroups.com) and released on 2010-03-26 (based on the version), the most recent update on 2013-01-04.
Overall, the 2.0 version of The JSON-RPC specification change is very small, the major changes are about 3 points:
You can use arrays or named parameters for parameters.
O M specifications: During write operations, do not open two securCRT windows and securcrt windows connected to different hosts.
O M specifications: During write operations, do not open two securCRT windows connected to different hosts.
This article describes write operations. For query operations, you can open only the securCRT window of one host, and do not open the securCRT window of the two hosts.
Converted from msdn: http://msdn.microsoft.com/zh-cn/library/ms228593 (vs.80). aspx
So much, I can't remember it all at once. I plan to review these specifications frequently. If I have some experience in the following aspects in my daily work or study, I will give it a rough display. Used to remind you.
The following is based on fxcop. net
Code Write specifications for reference only.
I. Design)
1. a
must also place the style sheet at the top of the page for no special reason.
In the past, most style sheets were not allowed to be topped because of masterpage. We tried our best to follow this principle when modifying masterpage.Optimization rules-it is recommended that the script be placed at the bottom
Generally, the browser can allow parallel downloads, depending on the number of hosts and bandwidth.
(By default, ie is 2, FF is 8)
Parallel download is actually disabled during script downlo
Java programming specifications, java programmingI. Compiling background this document is simplified. The vast majority of content is listed in terms or forms without too many additional instructions. The code format standards follow the default coding specifications of eclipse.2. Applicability of background developersGeneral provisions and regulations general provisions • simple and easy to implementNaming
Here we mainly introduce the Service Set Identifier (SSID), including the port access control technology (802.1x) and the link peer-to-peer Security (WEP. Nowadays, wireless Internet access is becoming increasingly popular, but the security of wireless Internet access is also becoming in danger. To protect personal privacy, the awareness of wireless Internet access security needs to be enhanced. Let's talk about wireless Internet access security specificatio
In the integrated cabling system, the IDC cabling engineer believes that the workspace system is the most closely related to the owner. It is the end of the cabling system and the most important position of customers in the cabling system. What are the requirements of information points in the new specifications? Note the following in the design specifications for the latest GB50311-2007 integrated cabling
a part of the Weak Current System of buildings. During the pipeline design of construction projects, it is generally considered as a whole with the subsystems of other weak current systems. When the space is limited, most of them are laid in a hybrid manner. Therefore, in the cable tray of the Integrated Wiring System, the cables of other weak current subsystems, including the ground wires, are sometimes seen ).
In the new specification, it is clearly required that the integrated cabling cable
Bluetooth protocol specifications (irOBEX, BNEP, AVDTP, AVCTP ),Chapter IV Bluetooth protocol specifications (irOBEX, BNEP, AVDTP, AVCTP) I. IrDA Interoperability Protocol
IrOBEX infrared object interaction protocol (OBEX) enables high-level protocols to operate simultaneously on wireless links of Bluetooth and infrared.
Main Operation Commands include: Connection operation, disconnection operation, Put op
What are the security specifications of wireless WLAN? Here we will introduce it in detail. First, we need to know the wireless WLAN security specifications. There are roughly three types: WEP, WPA, and WAPI. Let's take a look at the specific content for each type.
WLAN Security Specification 1: WEP
WEP (WiredEquivalentPrivacy) is a security standard used by 802.11b to provide an encryption mechanism to pro
Here's a look at some of the Tomcat security specifications that we need to be aware of in our daily work:One: Protection of Telnet management port
Category
Configuration content and its description
Standard configuration
Note
TelnetProtection of management portsForce
(1) The default port in the configuration file is 8005 management port, so in order not to attack easily, the best port is changed to ot
I didn't know much about code specifications before. But after three years of studying software engineering, I think code specification is a very important requirement, especially for programmers, code specification is indispensable. At the beginning of this understanding is at the time of the freshman, at that time, just beginning to learn programming, learning process consists of three parts, first observing the code to understand others, and then s
ES6 (ECMAScript 2015) coding specifications and detailed attention points, combined with a large number of GF securities ES6 practice projects organized,Already open from GitHub, continuous update, welcome PR and issue.GitHub Address: https://github.com/gf-web/es6-coding-style/This specification is based on the JavaScript specification and is only intended for ES6 related contentRefer to the JavaScript specification if the variable is named and if a s
YII Preference specification is better than configuration. Following the specification allows you to create a mature yii application without the need to write and maintain complex configurations. Of course, when necessary, YII can still be customized in almost all aspects through configuration.
Below we explain the recommended development specifications in YII programming. For simplicity's sake, let's assume that WebRoot is the directory where the YII
Having learned about the Java EE recently, it is mentioned that the study of this project has to mention its 13 specifications:The Java EE platform consists of a suite of services, application interfaces (APIs), and protocols that provide functional support for developing Web-based multi-tier applications, with a simple description of the 13 technical specifications in the Java EE:1.JDBC (Java Database Connectivity):The JDBC API provides a unified way
I. Concepts of opening data and opening data
It is usually called a fully-open sheet of raw paper split according to national standards. In order not to waste paper, facilitate printing and binding production operations, cut the whole paper into several smaller sheets with equal area, which is called the number of opening, and bind them into a book, which is called the number of opening.For the text of a book, The number of openings is the same as the meaning of the book, but for the number of
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.