Breaking Dependencies: The SOLID PrinciplesBreaking Dependencies: The SOLID Principles Klaus Iglberger, CppCon 2020 klaus.iglberger@gmx.de2 Klaus Iglberger C++ Trainer since 2016 Author of the C++ math library (Co-)Organizer The SOLID Principles Single-Responsibility Principle Open-Closed Principle Liskov Substitution Principle Interface Segregation Principle Dependency Inversion Principle9 The SOLID Principles Single-Responsibility Inversion Principle Robert C. Martin Michael Feathers10 The SOLID Principles11 The SOLID Principles I will introduce the SOLID principles … … as guidelines not limited to OO programming … as general0 码力 | 96 页 | 2.14 MB | 6 月前3
Back to Basics TestingBottom Up Integration Boundary Value Branch Breadth Code-driven Comparison Compatibility Compliance Component Concurrency Condition Coverage Configuration Conformance Context Driven Conversion familiar with the design principles ‣ Then consider trying TDDwrite a failing test write just the code to make the test pass refactor start end are we done?DesignThe SOLID principles Single Responsibility0 码力 | 79 页 | 25.86 MB | 6 月前3
Conan 2.0 Documentationthe task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended recommendations also apply when consuming packages from external sources in any package manager. 5.1.3 Compliance and security Some industries such as finance, robotics and embedded, have stronger requirements0 码力 | 652 页 | 4.00 MB | 1 年前3
Conan 2.1 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 694 页 | 4.13 MB | 1 年前3
Conan 2.3 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 748 页 | 4.65 MB | 1 年前3
Conan 2.5 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 769 页 | 4.70 MB | 1 年前3
Conan 2.2 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 718 页 | 4.46 MB | 1 年前3
Conan 2.4 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 769 页 | 4.69 MB | 1 年前3
Conan 2.10 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 803 页 | 5.02 MB | 10 月前3
Conan 2.6 Documentationexecutable, test results, coverage data and many other different files needed for traceability, compliance and business purposes. See also: • Metadata files blog post 2.17 Third party backup sources the task with other approaches, that will be explained later. This is just an introduction to the principles and concepts. The important idea is that now we got 2 versions of matrix in the lockfile, and following guidelines contain a series of recommendations to ensure repeatability, reliability, compliance and, where applicable, control to enable customization. As a summary, it is highly recommended0 码力 | 777 页 | 4.91 MB | 10 月前3
共 83 条
- 1
- 2
- 3
- 4
- 5
- 6
- 9













