Chen Shuo (giantchen_at_gmail)
Blog.csdn.net/solstice
Abstract: As the author of the C ++ dynamic library, virtual functions should be avoided as the library interface. This will cause a lot of trouble to maintain binary compatibility. We have to add a lot of unnecessary interfaces and eventually repeat the same mistakes of COM.
This article mainly discusses the Linux X86 platform, and will continue to use Windows/COM as a negative teaching material.
This article is a continuation of the
structure diagram, how to draw these images, how to use these images to clearly express the solution to the problem, these images are more suitable for expressing what kind of problems, the similarities and differences of similar images, and the scenarios where they are applicable, such innovation is to express the most abundant content in refined languages.
16.7Entrepreneurship-Stick to the current directionVs.Try more new ideas
If my development prospects are good and I find other cool ide
After a semester of study, I think the "Software Engineering" course to study the main purpose is:Be familiar with the whole process of software from design to development, and learn team work.It is a mixture of "software testing" learning, its main purpose is to learn software testing knowledge and skills.Recommendations for the course:1. Can shorten the classroom teaching time, quickly after the classroom study, through a team of cooperative develop
after the development is complete?
12. Is the project delivered at one time?
6.3.2 how teams build software
1. Boss and others seize the market dynamics and obtain requirements
2. Developers propose design solutions as needed
3. Discuss the feasibility of the solution and make improvements
4. Start writing (not agile development, socode and fix)
5. coding is tested at the same time, and a ba
collective completes some work, it ignores the individual's role and focuses on the general purpose. It often regards a collective as a person, the requirements for a person are magnified to the requirements for everyone, and sometimes there is a "one-size-fits-all" feeling.
5. Read the book dreaming in code to analyze the forms and processes of the Chandler team. What are their advantages and disadvantages?
6. Some people say that modern
Chapter One: Introduction1.2.5 The goal of software engineering-creating "good enough" softwareQuestion: What if the "Bug" in the software doesn't get rid of it? Or if there is a small "Bug" but does not affect the software function, can you ignore it?Chapter II: Personal Technology and processes2.4 PracticeQuestion: If your own programming is not very good to change how to practice? And too simple do not want to do, too difficult to find a way, and n
IOS Reverse Engineering Study Notes (5) first taste of the jailbreak plug-in OpenSSH
First, install the OpenSSH plug-in on the jailbreak host, and then check the IP address of the device, which is assumed to be 192.168.xxx.xxx.
Then use Terminal on the Mac to connect to the device through Open SSH (the First Login Password is alpine and must be changed immediately; otherwise, anyone can connect to your ho
First, the title: Returns the number of the largest subarray in a two-dimensional integer array.Second, requirements:Enter a two-dimensional shaping array with positive numbers in the array and a negative number.A two-dimensional array is connected to the end of the line, like a belt.One or more consecutive integers in an array make up a sub-array, each of which has a and.The maximum value for the and of all sub-arrays. Requires a time complexity of O (n).Third, the design ideaThis experiment is
Today I went on to learn C#WPF programming, and fixed some bugs in the program.I added the verification code image modification of the monitoring, we used to sleep waiting for the verification code of the image back to update, now I increased the monitoring, you can know when the verification code picture updated, improve the program speed and stability. And I added the program to delete useless files when shutting down. New FileSystemWatcher (); = System.Environment.Curre
This chapter mainly introduces the basic concepts of the formal method, including the formal specification (that is, the description of the Software specification, the method used to act the software system object, and the description of the behavior of the Self-object). The formal proof and verification (techniques include: detection, theorem proof), program refinement, first-order Linear Temporal Logic of logical tenses, and computing tree logic. Model detection is based on the kripk model, wh
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.