Technical Exchange Conference Summary

Source: Internet
Author: User

The projects that everyone is responsible for are almost OK. The previous day, it took about a whole day for everyone to communicate with the business, problems, and technologies of their own development projects.

It takes about three to four months to complete the project. An educational administration system with profound memory. It is divided into four subsystems: Foundation, course selection, evaluation, and examination. This is one of the projects that involve the largest and most people.

Educational Administration-basic part design:

Do not set foreign key constraints for the database. All links are maintained using the third table. That is to say, as long as two tables have a relationship, you need to add a table to maintain their relationship. The purpose is to increase the flexibility of the basic table by reducing the efficiency;

The primary key generator is used to ensure that the generated primary keys are not duplicated: A class returns an ID (different each time), which is available in both the donet and the database;

Trigger batch problem: cascade trigger. When a second-level trigger is triggered, only the first data item is deleted by default. All data cannot be deleted. The solution is to use a cursor to force all objects to be deleted.

Deletion, such as the school, Major, class, and student. You need to delete it backwards, just like there is a foreign key, otherwise there will be various problems.

Using the view, after the first query, it is not written to the memory for storage; each query will execute a query. Therefore, it is time-consuming to use a view to query data in many tables. Solution: after checking the data, write the data to the dynamically created table. Then, it is used only for queries in this table;

The timestamp problem: there is no need to be too precise, too precise, and get yourself stuck when you are too perfect.

Engineering concept: vague, almost a university problem. Only by looking at the problem in a vague manner can the problem be solved.

The concept of true and false deletions: Field tags do not really delete historical data, and data is silenced at most.


Educational Administration-course selection part:

One semester is filled with data in the basic database for students to choose courses. During the second selection, the data is placed in the history and then retrieved again.

The data volume displayed on the client is inaccurate: I think it can be ignored and there is no need to lock it.

Path Problem: CSS is the path relative to the CSS file, and JS is the path relative to the project;

Nesting of transactions:

Educational Administration-evaluation part:

Use of pie charts, third-party controls;

SQL statement: Order by newid. The query results are sorted randomly;

Learning should focus on interest, and keep the interest of continuing learning first;

Distributed is not used to solve the backup problem. When one machine is unable to process a task, multiple nodes need to work together to do one thing, and distributed is used;

When using too many JavaScript codes, consider security issues.

Educational Administration-examination part:

Dashuai encapsulated a cascade control, which is very fashionable and novel. Jia Lin wrote a parent page to encapsulate more common methods.

Convert Chinese characters to PinYin: an array of Chinese characters and numbers for string comparison;

Problem: the Ajax concurrency is large. Because the database connection is not manually closed, it takes some time for the system to release resources, resulting in a large amount of resource occupation at a time, and the test cannot continue;

Jquery UI introduction.

Remote check:

Using the css framework Bootstrap, browser compatibility is a big problem;

Manually adjust incompatible pages and introduce them in the CSS file, which is equivalent to patching;

Learn the original tools, and then exchange and learn;

A permission framework is used to dynamically change menus;

Use of the Crystal Report: The field type stored in the database is blob;

SOCKET protocol transmission is used for interaction between the mobile phone and the background;

JSON serialization: JSON object; deserialization: JSON object;

Brief Introduction to the Android app on the mobile phone end (in the future, the academic Clerks will be on the agenda );

Ajax + XML and XML are identified to achieve the minimum regionalization of refreshing.

Dialing system:

Tree Structure: maintains two data copies: database and XML. Recursive Implementation;

SQL Server Mode of session;

Introduction to the use of the IFRAME framework;

Chemistry System:

Implement the tree structure of comments;

Video play, courseware play, and Flash play.

Yonghe Soy Milk:

Discussion 1: whether the B-layer method can call each other. In the end, most people think that layer B can call each other. If you use a method from another place, you can write one by yourself. duplicate code will appear everywhere in a large system, modification is also a hassle.

Discussion 2: How to implement a query that requires multiple tables. One is to combine and splice the return values of multiple D-Layer Methods in layer B; the other is to splice the views in layer D and then query the views. The final solution depends on the needs.

Interface: the parent class instantiates a subclass of the parent class. New Methods of the subclass can be used internally, but external calls cannot be performed;

Thermal printer, not explained, if used now to learn;

QR code report (in the future, Li Xiang will make a report, and the Academic Committee will be on the agenda );

Crystal Report report (Jiang qianlan will make a report in the future, and the Academic Committee will be put on the agenda );

Minimal release, incremental development:Http://blog.csdn.net/xiaoxian8023/article/details/8715837;

Implement the dynamic menu on the left; Use the event to dynamically modify XML;

Concept of dynamic compilation: many buttons can be dynamically generated. In a program, dynamic generation classes are used. When using this class, dynamic compilation is required;

When loading ActiveX Code on the server, you only need to manually install the client. Then you can use the functions in ActiveX. If this method is not used, it is inconvenient to register the control on the client that uses the system. However, this method requires CA authentication for the ActiveX control.

Ordering System:

Use code detection in global. As long as the IIS service is enabled, real-time monitoring can be performed.

Business Requirements: order meals in advance. If you do not eat at that time, you will be fined accordingly. If you do not pay a fine, you will not be able to order the next meal.

Summary:

The biggest achievement of this Technical Exchange conference is to solve the problem of "don't know. Many of the technologies used give me a fresh feeling. A lot of knowledge, people feel difficult, mainly because they are unfamiliar with it, it is a layer of window paper, It will be discovered when it is broken, in fact, very simple.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.