How to use analysis tools to analyze the performance of software? The following are some tools and methods used for reference only: (1)StaticCodeAnalysis: Mainly through some existing code writing rules to analyze whether the current Code has some
Http://www.redmine.org/
Multiple projects support
Flexible Role Based Access Control
Flexible issue tracking system
Gantt chart and calendar
News, documents & files management
FEEDS & Email Notifications
Per project Wiki
Per Project
Address: http://www.infoq.com/articles/agile-kanban-boards
I have refined the original article, reserved some core ideas, and removed the advertisement in Japan.
1. task board
Tasks are the actual tasks at hand.
Paste the tasks, tasks, and
Recently, I have written several commercial software programs with false positives and viruses. Kabbah and rising all reported that (Kingsoft and QQ computer manager did not talk about it, and spam fighters ).
I thought it was because of shell
As mentioned above, I wrote a language learning tool for my daughter to solve the word problem in Primary School Chinese learning. After the software is complete, a few good friends and friends have a hand, and made several agreements with them to
Yesterday, I thought about this topic and went to bed. In the morning, I saw whether the customer was a God. Continue :)
Whether it's XP, TDD, or scrum, the essence is plan-control-re-plan-re-control. How should we segment plan and control?
This jquerypad was accidentally seen when I checked the page on the Internet. After downloading it and trying it out, I felt very good. This software was developed using WPF (but it is not open-source and needs to be installed. net Framework 3.5),
Mythical man-month: Software Interface interaction and usability Improvement summary
Software intelligence and memory functions
1. You are advised to remember the user name and ID on the user logon interface. The focus is directly located in the
Telling the truth is always easy to get rid.
Today, I talked to my friends about software promotion.
How to determine if a software is toxic? &............ % &*()(*&.................. %
Well, those are too complicated. I have more efficient and
First search for software packages on the SuSE official website (http://software.opensuse.org/search), such as locate
Then download the corresponding rpm
Findutils-4.4.2-17.1.2.i586.rpm
Findutils-locate-4.4.2-17.1.2.i586.rpm
Install it. Note
ArticleDirectory
Install the createrepo package
Create and install a DVD Image
Create a local software source
The purpose of this experiment is to use two centos DVD installation discs as the local software source to avoid
ThinkC/SThe Architecture Software login box is in the center of the screenYou can also open an input box when you need to log on to the website background.,After the account password is correct, open the page.(Our predecessors may have already
Most Chinese people prefer to use martial arts novels to compare software development. However, in practice, only the sunflower collection is the most powerful, and it can be called "unbeaten" only after mastering the sunflower collection ".
But
First, let's analyze the background. What are the most unstable factors in the software development process? -- The answer is demand! Requirements may change all the time during software development. Then, how to flexibly cope with changes is the
Software design method (reproduced)
In order to solve a problem on the platform, the last basic discovery can be implemented after a long time.
During migration to the project, we found that there was an issue that could not be solved by the
With the growing number of software document systems, document testing has become an important part of software testing. The testing objects of this document are as follows:
Wrap text and graphics;Marketing materials, advertisements, and other
Due to the constraints of power consumption, cost and volume, the processing capability of the embedded microprocessor is also significantly different from that of the desktop system processor.ProgramThe running space and time requirements are more
8. No fish in shuiqing District
My friend opened a small fart company, with a total of 10 million sprees. Every year, I still don't die, but I am still living very hard. What we do at ordinary times is the 20 thousands or 30 thousands list, so we
26. Lions
Many people have said: Your method is not a method of getting dozens of shots from three to five people, such as project manager and publicCodeDevelopers, testers, Dockers, and the number of companies that need to be matched with
Vdisk. sys and ramdrive. sys in DOS. They must be in config. the sys file cannot be loaded directly on the DOS command line. Once loaded, the memory disk size cannot be adjusted or deleted. The memory disk has a capacity limit, which generally
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service