work, you should expect your efforts to be magnified 10 times times, 100 times times, or even 1000 times times.After reading this story, you need to rethink how to make the software developed to achieve amplification effect? That is to say how to sell to more people. At the same time, it is also necessary to reflect on the work of how to make their work have amplification effect. For example, a company's r
After completing the hardware design of the custom peripherals, you need to write software to test whether the design of the peripherals is correct.
Before doing so, you must first find out the address alignment in the nioeix. For avron slave, there are two address alignment Methods: Dynamic address alignment and static address alignment.
Dynamic address a
What is a corrupt system and poor software design? Poor software design includes one or more of the following features:
1) rigid2) Fragile3) Strong4) stickiness5) obscure
What design principles should a good system follow?
1) Open-Close principle (OCP)2) single responsi
I really shouldn't have read this book based on my current level and experience. Translate the Chinese name of the thoughtworks anthology into the "Meditation on software development. This book contains many short articles to discuss all aspects that need attention in Agile development. Unfortunately, I am not experienced enough to understand it.
One article in the book is named "Object aerobics", which proposes nine rules for excellent
Above is Burndown chartThese two days our team breached (fill ">", "One of the sub-Peng completed the comparison of the size of the main core code writing,Zhang Qiqun, once Cypress completed the work of the app function detection.Chen, Wang Jianing completed the framework code needed for the application.This two-day workload is relatively high, because it is the beginning of the project to do software engineering, the type of structural framework we h
adapter, which transfers the object to the adapter and implements interface method transformation)
② Adaptive Mode:
Through multi-inheritance and interface implementation, a single adaptation for a class is realized.
What is the role of the adapter?
1. Transparency: the adapter client can call a unified interface, which is transparent to the client. This can be more concise, direct, and compact.
2. Reuse: existing classes are reused to solve inconsistent environmental requirements.
3. Low cou
2017-12-29 10:09:01Two data access policies to help the organization persist layer:
Repository
Data Access Objects (there is a one-to-one match between DAO and data table)
Data patterns and principles that gracefully address data access needs:
Lazy Loading
Identity Map
Unit of work
Query Object
OrmNhibernate/ms Entity FrameworkThe basis of the DAL strategy: Transaction management, data integrity, data query.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.