Learn about software development best practices checklist, we have the largest and most updated software development best practices checklist information on alibabacloud.com
Today's books are amazing. 45 habits of efficient programmers, 97 things that software architects should know... but I always think that I am a FIFO pipeline, and I don't remember much after reading it.
Perhaps only a handful of things in this age of hustle and bustle can be truly remembered and practiced from time to time. On a public car, I forced myself to cut down the last few items from practices that
Technical requirements for software development and related books and materials
For web technologies, HTML, XML, and ASP. net, C #, Java, JavaScript, Ajax, WebService, CSS, website reconstruction, SQL Server, Oracle, IIS server, server security, and other related technologies cover a wide range. How can we master so many technologies? Our practical work experience tells us that we must have a deep understan
client program asks for a change to the Fat class, it affects all other client programs. Therefore, client programs should rely solely on the methods they actually invoke. This can be achieved by decomposing the fat-like interface into multiple client-specific interfaces. Each client-specific interface declares only those functions that are called by its specific client or client group. The Fat class can then inherit all the client-specific interfaces and implement them. This relieves the depen
and TextBox do not know the existence of the mediator. It stayed quiet, imposing its statutes on those objects without their permission or knowledge.ConclusionIf the statute covers a wide range and is visible, then the facade model can be used to apply the statute from above. On the other hand, if the scope of the statute design is small and freely customizable, then the mediator model is a better choice. The facade pattern is usually the agreed attention point. Everyone agrees to use the facad
I will mainly talk about the award-winning bibliography (because I have recently been engaged in testing and defect management, I will talk about these two products later)
Unfortunately, I have never read any of the general books, and I have read three of them in the second type of technical books, which are accurate to being browsed. To be honest, it is not easy to write impressive books.
I noticed that both of the first prizes were published by o'reilly.
Complete list of winners: http:/
. idatareader datareader );
In the database transaction section, apart from opening and closing the transaction normally, I recommend a transaction delegate and method for execution. idataaccessor provides the transactionexecute method, definition of its delegate transactionhandler:
/// /// Define the transaction processing delegate for database operations. This delegate will execute database transactions on behalf of the customer, so that the user does not need to consider the start and end
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.