Book review expert to work from an early age 3

 Chapter IV pragmatic paranoid, you can not write perfect software, because there is no perfect software in the computer's short history, no one no one had ever written a perfect software unless you put things accept it, or you will eventually waste time and energy in the pursuit, the similarity of the encoded dream impossible to achieve very clear that we continue to combine the code with others at home, it may not meet our high standards code and processing may be effective, it may be invalid inputs, imperfect time scale, ridiculous fallacy tool system, as well as impossible to achieve demands, let us safe driving in such a world, when everyone but you really want to unfavorable piece is a good idea to deal with the computer system is very difficult, more difficult to deal with people, but as a Leizhu, we spend on the issue of clear human interaction and longer, and then the last few years, we get some solutions can be applied to write software to ensure one of the best solutions is frankly contract, contract of Your rights and responsibilities, but also provides other's rights and responsibilities, in addition to any party fails to comply with the contract agreement I doubt any dependence and agent technology systems, reliance on contract negotiations are crucial, in fact, they are dynamically generated, imagine can poke each other through enough trauma contracts, in order to achieve a gradual and purpose of a proxy, we may be able to resolve the crisis of productivity software, software to let us solve it, but if we can not use the manual contract, we can not use them automatically, so the next time also to design his contract when you design software, if your code is trying to open a file for reading, but the file does not exist, it should lead an exception is thrown? Our answer is, it depends on the situation, if the file should be where? Then it will throw an exception is justified, a piece of unexpected things happen, you expect the existence of the file seems to disappear, on the other hand, if you do not know the file exists, then you can not find he is not the case in Yichang the error returned is appropriate, error handler is called when the course error is detected, you can log on a determined course of processing errors category, as long as the programming, we have to manage memory resources, a limited number of field time lock file, most of the time mode uses resources consulting predictable allocation of resources to use, and then deallocated, but for resource allocation and de-allocation process, many developers do not consistently plan, so let us propose a simple fact, support the language may be abnormal lifting the allocation of resources is very difficult, if there is a constant




Chapter bent or broken, we do not write code in order for us to catch up with the pace of change today is approximately crazy, we need to front-line efforts to prepare as soon as possible, as much as possible the loose flexible code we found our code may occur soon become obsolete or too fragile or, acetaldehyde is difficult to repair, and may end up in the mad onrush toward the future of the Left behind, we want to consult the same model in the software, when we asked pending completion of an object, service, we want to him instead of us complete the service, we do not want the object to give us a third party objects, we must deal with it, dynamic configuration, we want to postpone the definition most of the details until the last minute, and may make details hard to keep soft, easy to change as far as possible, through elaborate, allowing us to quickly make changes in the solution, we will be better able to cope with the destruction of many projects turn, for less complex logic, we could be using a small language expression, thereby eliminating recompile and redeploy environmental change Needs, without metadata, your code can not get his due adaptability and flexibility, this is a bad thing? Ah, the outside world can not meet the species will perish, we need to allow concurrent, and consider lifting rely on any time or order to do so we can gain flexibility and reduce any development in many fields based on the time of dependent workflow analysis architecture design, as well as deployment, analysis workflow has improved concurrency, you can try to inherit and customize them with different color lettering numbers marked in whiteget Chinese model, by the target object abstract data type model for any view or the controller does not have direct knowledge, trying to explain how the model, who subscribe to changes in the model and logic events from the controller, the controller controls the view, and provide a new way to signs of collapse several new data model, the model is also trying to hair publishing events, blackboard combined package of legal rules engine needs, is an elegant program to solve this problem encountered, we can coordinate with blackboard, completely different thing is the facts and factors, but the parties involved to remain independent, even isolation, of course, the harder way you can get the same result But you get will be more vulnerable systems, and when he failed, perhaps all the king's men could not get him up in the work program

Guess you like

Origin www.cnblogs.com/kongfanbing/p/11774132.html