Read about most common software used in business, The latest news, videos, and discussion topics about most common software used in business from alibabacloud.com
development method similar to workshops. It is good for writing hundreds of lines of small programs, but this method is not satisfactory for any scale of development. The main problem is:(1) The software structure cannot be modified because of the lack of planning and design processes;(2) Ignoring demand links brings great risks to software development;(3) It is very difficult to maintain the
20 common sense that you must know as a software engineer
| 22922 times |Source: oschina [65 comments already exist] Comment
| Author: junwong |Add this information to favorites
As a good software development engineer, do you know the following common sense? Has it been summarized in actual work? Let's share with you t
decompression tools (which can be installed without being supported by the archive manager itself)Enables the built-in archive manager to support RAR and 7z compressed files.Sudo apt-Get install RAR unrar p7zip p7zip-rar p7zip-fullCreate soft linkSudo ln-fs/usr/bin/RAR/usr/bin/unrarIn this way, you only need to enter unrar in the command line to decompress Or compress the file. After the installation is complete, the archive Manager also integrates the RAR component.
8. Firefox settingsAbout: c
Currently, the installation and use of software requires us to enter registration code or install registration information such as KEY, which brings some trouble to computer enthusiasts. Sometimes it is a headache to find the original registration information of software installed on our computer that has been registered. In response to this situation, the author recorded registration information of some
Commonly used logs for SQL Server diagnosis: (1) Windows event log (2) SQLSERVERErrorLog1. Windows event log EventLog is used as a service program enabled and managed by Windows, windows records the startup, normal shutdown, and abnormal shutdown of the SQLSERVER service in its system log systemlog.
Common logs used to
From: http://www.scriptlover.com/post/664
1. Software Testing: manual and automatic means are used to run or test a system. The purpose is to check whether the system meets the specified requirements or to identify the differences between the expected and actual results.
2. Differences between testing and debugging:
The purpose of the test is to find out the existing error, and the purpose of debugging is
Transferred from ThoughtWorks
Agile Software Development is a kind of new software development method which has been paid more and more attention since the 1990 's, and it is a kind of software development ability that can cope with the fast changing demand, it is applied to the software project more and more as a new
of the last new record echo 'data inserted successfully'. mysql_insert_id ().'';} Else {echo' failed to insert data, error code: '. mysql_errno ().' error message: '. mysql_error ().'';} // Close the connection mysql_close ($ link);?>
II. PHP processes the select query result set
Execute the select statement in PHP to return a result set, which can be used to process each field
$ Result = mysql_query ('select * from test'); // Obtain the number of
MySQL extension in PHP: A common extension function used by PHP to access MySQL.
Source: http://www.ido321.com/1024.html
I. PHP database connection and basic operations
MySQL adopts the 'client/Server' architecture. Using the MySQL extension function installed in PHP is the same as directly accessing the MySQL database server using the client software zone. In th
, there is a need for comments. Remember to say that a perfect life does not need to be explained, and a perfect code does not need to be commented out. This is a little too powerful. A perfect code without comments can only show that the business logic of this project is too simple.
2. What is good software design?
A perfect design cannot be increased, but reduced. This is the most appropriate sentence for defining excessive design. In my opini
Current LINUX packages can usually be found from the release CD or from the Internet. Its general format source code and executable code two kinds. To save disk space or download time, most of the software is packaged to exist in a compressed file format.
Common packages are like file.tar.gz, file.src.tar.gz, file.rpm, and so on.
Before introducing the common in
As a newbie who has just been familiar with Mac OS x lion, the biggest experience is that various tools such as Perl, PHP, Python, Vim, and Emacs that have been configured on Mac OS X lion are very convenient. This not only facilitates developers to reduce the size of software packages, but also facilitates common users to use these for development.
I have been familiar with some
Web security practices (7) Introduction to web servers and common attack software
Through the previous discussion, we have learned how to determine the type of web server. From this section, we will discuss web platform vulnerability attacks. The defect mentioned here is the defect of the server itself, not the defect caused by the Administrator's configuration. This defect can only be avoided by upgrading
Most developers with the experience of the growth, will enter a management position (team leader, of course, Bo Master only graduated for six months, not the development team leader, just in advance to share to everyone), need to be responsible for software system design (System function design and database design). Then pass on your design ideas to other colleagues (also a process of discussion and refinement), and let them assist with coding to comp
command on the IP address until the IP address is interrupted by Ctrl + C.
Ping IP-l 3000The Data Length in the Ping command is 3000 bytes instead of the default 32 bytes.
Ping IP-nRun the Ping command for a specified number of times. Ii. Netstat command usage skills
Netstat is used to display statistics related to IP, TCP, UDP, and ICMP protocols. It is generally used to check the network connection of e
, for users, it is strongly recommended to bind Google authenticator to the lastpass. After binding, even if the user's lastpass password is stolen, there will be no user's mobile phone or password-protected mailbox, hackers cannot log on to the lastpass website.
Open-source password management software
Although online password management looks cool, many people are not at ease. They prefer to store and manage passwords locally. Currently, some
There are three main methods for installing software in Linux: source code installation, manual compilation, and RPM package (RedHat Linux packet manager ), the RPM command can be used for installation. Another method is the *. binfile, which is similar to the installation process in windows. Here we will not introduce it. This article mainly introduces the installation of source code and RPM packages.
I. I
available in Linux. You can also install gnash, which can play the Flash program.
Chmsee is a good CHM reading software.
DiaIt is an open-source flowchart software and part of the GNU program. The program creator is Alexander Larsson. Dia uses the Single Document Interface (csdi) mode, similar to gimp.
Dia Modular Design of Multiple requirements, such as flowcharts, network diagrams, and circuit diagram
security scanner. It is more frequent than some free Web scanning programs, such as Whisker/libwhisker and Nikto, it claims to contain "30000 vulnerabilities and vulnerability programs" and "a large number of vulnerability checks are added each day", but such claims are questionable. Note that all common VA tools, such as Nessus, ISS Internet components, Retina, SAINT, and Sara, contain Web scanning components. (Although these tools do not always mai
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.