This article from http://www.cnblogs.com/allanbolt/archive/2010/09/06/1801549.html
There are many aspects of project development and occasional insights. Now let's record them and hope you can talk about your own views and experiences.
1. Understanding of project development Standardization
Nowadays, many Chinese software enterprises are not flattering in the development process. Of course, Chinese enterprises are learning this or that dev
First, Hadoop installation1. Set static IP, view virtual machine IP under Windows, colleague Change CentOS network link to host-only mode, change Addresscip, Netmask.gateway.Execute #service Network restartVerify #ipconfig2. Use the tool pietty, resume remote login, modify the hostname, #hostname host name. Then #vi/etc/sysconfig/network permanently change the hostname#vi etc/hosts Change host name and IP bindings.3. Turn off the firewall, #service iptables stopTurn off the self-start function #
later, can be installed in advance from Microsoft Official download, or WSUS installation will be prompted to find net.framework. When you install SCCM, you need to install the ADK Toolkit for Windows 8.1, which you can install in advance at Microsoft's official download, and if you do not install it, you will be prompted to fail when the SCCM installation checks later.V. Installation of SCCMThe SCCM process needs to be updated from Microsoft's official download patch, which requires an externa
Recently in the read C + + Primer 13th Chapter Copy Control. Exercise 13.4 has a pointer member pstring, when the write constructor initializes an object, it is assumed that Noname (string A,int b,double c) {pstring=a;i=b;d=c;} was not found when it was written. Because A is a temporary object in this constructor, when the Noname constructor is finished, the variable destroys itself, causing the pointer to hover directly. The correct way is to write a reference to a string.#include Copyright NO
); javax.servlet.http.cookie[] diskcookies = Request.getcookies (); Response.sendredirect ("Recivecookie");Seventh: Read about cookies:String cookiename = "UserName"; Cookie cookies[] = request.getcookies (); if (cookies!=null) {for (int i=0;iEighth: About the use of cookies and session:1, the cookie is not very safe, others can analyze the cookie stored in the local and cookie deceptionConsider that security should use the session.2. Session will be saved on the server for a certain period
tracker to help BT downloadA: The advantage of adding a tracker is that it increases the rate of connection to the peer (most of the cases are useless), and the lack of a waveThe more tracker the computer and the bandwidth, the more it will increase the rate of connection to the peer.Adding a bunch of tracker will sometimes get counter-productive, as long as it's good to join a tracker that doesn't need to be registered.Q: Why did I download a speed of more than 100 kb/s, but now it becomes 0kb
assuming that the underlying principle is not understood, even learning how to use the tool will be very quickly forgotten. Maybe I'm too old-fashioned. But I always remember what the teacher who taught computer programming said. Do not use the IDE before compiling a complete program in person with the command line.It's much easier to Kprobe and jprobe, and then to learn the tools that are based on their encapsulation. Once learned is more difficult to forget.PostScript: About PanicProgramming
. Groups and users cannot be directly assigned permissions.
2. Roles can no longer be assigned to other roles.
3. Admin_role and Group_admin_role should be separated from other role areas in the design. Make some restrictions on both of them, such as cannot be edited, cannot be assigned to groups, etc. Do not set these two role, just set a separate tag for user (whether an administrator), in the user edit page, provide "set this user as administrator" tick action.
4. Separate the "ro
, But it is from these weeks after the formal experiment my life attitude has a very obvious change, I more and more cherish their time, every day feel their time is not enough, I have a lot of things to do, time every second in the sneak away, I constantly urge themselves, over and over tell themselves, life is really precious, Since live to let this second live meaningful, so unconsciously I insist on this experiment has been almost 3 months, a day has not interrupted, in this period, this exp
compilation error similar to the following :Synthesized property ' XX ' must either is named the same as a compatible Ivar or must explicitly name an IvarAt 64-bit, the runtime automatically adds Ivar to the class, adding Ivar prefixed with an underscore "_".The above declares part of the @synthesize Window=_window; This means that the window property synthesizes accessor methods for _window instance variables. In other words, the Window property generates an access method, which is the access
(command line user interface ). My understanding of shell is to translate users' instructions into instructions for internal nuclear power understanding.
For the execution process of a program that I understand.
650) This. width = 650; "src =" http://s3.51cto.com/wyfs02/M01/4D/40/wKiom1ROUYjRg8EHAAH6ShMrxZ0686.jpg "Title =" 2014-10-27_220448.png "alt =" wkiom1rouyjrg8ehaah6shmrxz0686.jpg "/>
The main features of the operating system kernel are process management, memory management, providi
functions
2. Advanced functions are gradually supplemented
3. Remove dispensable functions as much as possible (development cost and time)
4. Redefinition (transformation)
Ii. Product Establishment
The product establishment here can be thought of as the product idea establishment.
1) collection requirements
1. user feedback
2. Data Analysis
3. Benchmarking (benchmark comparison)
4. Shoot your head (developed by leaders)
2) Priority sorting
There are only two points:
1. Impact breadth
2. impact
ProgramWhen the members grow up, they will have a lot of insights. Here I want to record what I have learned so far. I personally think it can be used as a programmer's level watershed.
Level 1 realm: One day, I suddenly realized that a complex system isCodeProduct of continuous accumulation, reconstruction, and optimization. I realized this last year. This seems empty talk and common sense. However, it is difficult to have a profound understanding
[size]P is tantamount to abandoning s pointing to a new memory, when the function returns,s still pointing to the original place (NULL). Also, a memory leak can occur.The right thing isvoid Mallocmem (int **p,int size){*p = new Int[size];}Several other linked list operators that must use a level two pointer also have: delete nodes.Therefore, any operation that involves a dynamic allocation of memory that would cause the pointer to occur (new delete) must be secured with a level two pointer. What
"Learning and knowledge are built on the diversity of insights ." ---- George Siemens
"As for attitude, the test taker's Jin Ke Yulu is when the plane enters the intense tremor. If you don't know how to do it, you don't want to do anything. The Administrator seems to understand this point. However, we don't know why ." ---- Huang yixiao
"I believe many people share the same confusion with me. In terms of attitude towards Japan, the position has neve
a more straightforward way of explaining, then in this case, if you want to modify the value is thread-safe, that is, you two can not modify the value at the same time, you think, if you are in the modification, your partner will wait for you to modify the completion of the changes before you can modify, Does this end up being the result of the changes you want to make?Suffering in our computer, we all know that the computer is a process to exist, and each process has a lot of threads, then the
this token value, the background dynamically get the current model name, controller name, method name, time, And in the database to read the key, and then MD5, also generate a token, and then two token value for comparison, if equal, then the interface request is successful, the background processing its request, if it fails, and the number of failures more than 5 times, the IP will be in half an hour, Or one hours cannot be in the calling interface. On the mobile side of the problem, you can a
class name Footer-wrap,footer fixed absolute positioning with the bottom of the screen
Get the offset () of footer and Footer-wrap, respectively. Top, calculate the difference, remove the fixed property of footer, and assign the value to footer Margin-top
After the keyboard is lifted, the page looks like this:Then, this problem is solved, of course, this is a very simple layout of the page, can do a perfect solution does not leave the bug, but for more complex pages can also be perfect
class name Footer-wrap,footer fixed absolute positioning with the bottom of the screen
Get the offset () of footer and Footer-wrap, respectively. Top, calculate the difference, remove the fixed property of footer, and assign the value to footer Margin-top
After the keyboard is lifted, the page looks like this:Then, this problem is solved, of course, this is a very simple layout of the page, can do a perfect solution does not leave the bug, but for more complex pages can also be perfect
Think, or continue to write, because, too bored, daughter-in-law son also has half an hour to work.In front of the procrastination with three articles to do bedding, this article began to seriously.First, I want to add a few linksHttp://www.cnblogs.com/xing901022/p/3933675.htmlThis article is too dick, write very good, the other PPT also suggested that we look carefully, very good, very stick.Well, next, what should be done, should write code! The code should be written! The code should be writt
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.