SOLID is the acronym for a set of best coding practices
S Single Responsibility Principle
O principles of openness and closure
L Liskov (in-house) substitution principle
I Interface Separation principle
D Dependency Injection principle
By applying these best practices at the same time, you can improve your code's ability to adapt to changes. But all things have to be degree, over-use a
1) SELECT * FROM table where state!=0 and state!=1 not in/not exists so try not to appear in the search statementCan be changed to select * from order where State in (2,3);2) A leading fuzzy query is not able to use the indexSELECT * FROM table desc like '%XX ';However, non-leading fuzzy queries can be:SELECT * FROM table where desc like ' XX% ';3) No index is recommended for fields with small data sensitivitySELECT * from table where sex=1;In gender, only men and women, every time the data filt
No best practices
Chen nengtech
2007-7-24
Article 1 of the seven basic principles of context-driven testing:
The value of any practice depends on its context.
The value of any practice depends on the context of its application.
For this principle, James Bach made an in-depth analysis in "no best practices: how to think about methodology.
There is no best practice.
Not most people think that g
Nine best practices that DevOps must understandGuideDevelopment and O M best practices seem to be more important than ever. On the one hand, due to the rapid development of mobile and IOT technologies, enterprise development teams are facing an increasing pressure to deliver more applications at a faster speed.
In December 2015, Gartner predicted that "by the end of 2017, the market demand for mobile appli
Development and implementation of the business intelligence platform for Small and Medium Enterprises (data warehouse, Bi system, and real project practices)Course category: data and data warehouseSuitable audience: elementaryLesson count: 76 lessonsTechnologies used: Data Warehouse, Bi system, and real project practiceInvolved projects: business intelligence platform for small and medium-sized enterprisesConsult QQ: 1840215592Course content Introduct
Programmer A has met programmer B. "Scrum is terrible," said programmer. "Why? I heard that SCRUM is good. Our company is also preparing to implement scrum ." Programmer B answers. "Never, you will regret it ." "Are you implementing real scrum ?" "Of course, we have three roles, four meetings, and three products in scrum ."
Agility is very simple, but extremely difficult. Agile Methodology consists of a series of agile practices, but when people imple
How to make your Silverlight ApplicationProgramHigh performance, fast and smooth operation? From the very beginning, we should know what practices will lead to poor performance of your Silverlight application? Which of the following best practices can improve the performance of our Silverlight application? Silverlight performance-related
Article Recommendation
These articles on Silverlight performance and
Best practices for exceptions in PHP5.3. Exception in PHP5.3 best practices each new feature will create an exponential random number when added to the PHP runtime, in this way, developers can use and even abuse the best practices of this new feature exception in PHP 5.3.
Every new function is added to the PHP runtime to create an exponential random number. in
flags, such as 0644, whose usage is the same as the mode pattern flag used when creating the file (but Message Queuing does not have X (execute) permission)return value:Successfully returns the message queue number, which is the identification code for the message queue; 1 failure returnProgramming practices[CPP]View Plaincopy
//Practice 1:IPC_PRIVATE: Macro with a value of 0
int Main ()
{
//ipc_private each time you create a message que
Introduction
IBM WebSphere Application Server officially supports EJB 3.0 from version 7.0 (in the previous 6.1 release of the feature package for EJB 3.0). EJB 3.0 applications that are currently built on the was V7 are not common. In the actual project, the author summarizes some of the problems (partly development details) and best practices that have been encountered in deploying EJB 3.0 applications using was V7, and attempts to demonstrate thes
websites to be accessible to people with disabilities. Browsing devices designed for disability awareness, such as listening browsers, are highly restrictive to the requirements of CSS.
3, let the site update and maintenance more relaxed
Using the right way, CSS allows you to quickly apply the adjustment to all pages in one page.
The first choice you have to make is which style sheet to use. When it comes to best practices, the analysis of the dif
Web Front-End optimization Best practices the second part is oriented to the Server. A total of 6 rules of practice are currently in line. "Note, this is the most technical note, view the most original content, also please visit: Exceptional performance:best practices for speeding up Your Web Site"
1. Using CDN (use a Content Delivery network)
The popularization of domestic CDN is not enough. However, we
Spring is a powerful Java application framework that is widely used in Java applications. Provides enterprise-class services for Plainoldjavaobjects (POJOs). Spring uses a dependency injection mechanism to simplify work while improving testability. Springbeans and dependencies, as well as the services required for the beans class, are described in detail in the configuration file, which is a typical XML format. But it is both lengthy and impractical. It's hard to read and manage for big projects
Linux and security practices four--elf file format analysis One, elf file format Overview 1. ELF: Is the format of an object file that defines what is put in different types of object files and what format to put them in. Ii. Analysis of an elf fileTake one of the simplest HelloWorld procedures for example1. elf File headerUsing the tool to view elf file headers: readelf-h objThe file header structure definition can be found in/usr/include/elf.h:A tot
JavaScript is the world's first programming language, the language of the web, the language of mobile hybrid apps (such as PhoneGap or Appcelerator), the server-side language (such as Nodejs or Wakanda), and has many other implementations. It is also an enlightening language for many novices, as it can not only display a simple alert message on the browser, but also can be used to control a robot (using Nodebot, or Nodruino). Developers who master JavaScript and can write code that is well-organ
We know that Dependency injection (DI) is a technique that implements loose coupling between an object and its collaborators or dependencies. ASP. NET core contains a simple built-in container to support constructor injection.We are trying to bring the best practices of Di into a. NET core application, which is reflected in the following areas:
Constructor injection
Registering components
DI in testing
Constructor injectionWe can
. NET domain driven design-first taste (one: questions, patterns, principles, tools, processes, frameworks, practices)2013-04-07 17:35:27Tags:. NET DDD Driver Design original works, allow reprint, please be sure to use hyperlinks in the form of the original source of the article, author information and this statement. Otherwise, the legal liability will be investigated. http://wangqingpei557.blog.51cto.com/1009349/1173006
1.1. Questions
handlers are separated, and an event handler should get relevant information from the event object and pass that information to a method that handles the application.
Benefits: You can more easily change the events that trigger a particular process, and second you can test the code without attaching to the event, making it easier to create unit tests or automated application processes.
Several principles of loose coupling between application and business logic:
Do not
development: we had developed content for the Pocket PC platform and were familiar with Flash 4 ActionScript syntax, which is supported by the Flash Lite. But we do not realize how small the world has become. In this article, I'll share the experience gained by porting "2001" Animations to mobile phones (and winning the best animated content award). The techniques mentioned in this article also apply to creating new games and applications for mobile devices.
Flash Lite CDK (optional)Flash Lite
Diagnosing. NET application memory leaks using. NET Memory Profiler (methods and practices)
Blog Categories:Troubleshooting tuning. NET asp.net loadrunner ASP algorithm
The application diagnosis and optimization of friends know the memory leak and the harm caused by this situation is generally difficult to analyze and locate, especially in. Net/java applications, implicit heap memory management and complex referential relationships between managed o
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.