' Do not go to another monastery with its charter. ... Observe the code guide. It's very simple, look at the next code and do the same.
In the event of disputes or clarify who is to blame, do not get in their irreconcilable attitude ' I have everything is OK, it's you, goats, find a bug in your code '. Let's take up the slack: ... If he's mine, I did, of course, eliminating the. 'If the bug really be yours, then you have nothing to lose. But now, if you are away brushed aside, and the bug was still yours, you ' lose face'.
informal contact. Even if you are not outgoing, you still take part in organizing the ' corporate events ', go to lunch with colleagues, etc. Dr..
>Use defensive programming. When the code they write all kinds of people, we ensure consistent use of the code can not be. Surely there will sooner or later someone will call your procedure with invalid parameters. The program ' fall ' and the call stack will show on your written inside a class. Yes, eventually you will understand that, for example, someone forgot to blunt a class before using it, and who should redirect bug, but the time to find out that losing. Of course, not everything can be controlled, but that validate the input parameters, return parameters of the other functions can be. Long ago, I remember working in a team, which was a great programmer. Programmed very quickly, but very messy. This code is constantly falling and buggy. I programmed the slower, but my code is more reliable and bug free. While one programmer with a ' tongue hanging out ' rule, and ran its bugs, I slowly ' surf ' the Internet, T. to. My all worked. Over time, our subsystem is tightly integrated with each other, and my procedure began to fall because of its code. His headache was and my. Members threw me bugs packs. Then I started to check all input parameters and output parameters are called in my code functions. Tested, literally, manic. Even the most obvious things (eg, id0). Throwing error with explanations. This has helped to quickly figure out the cause of the bug, and flip it to the arguments of another. It's not hard, perfectly suited for this Assertion.
Rigid frame architecture. It is very difficult to do, you have to be an incredible assom to it so. But it's worth it. The question is to design the architecture subsystems so that the structure hindered its misuse, and even more so, a change in the architecture! . Even the use of pattern here is not always helpful, always find a programmer who, for example, attempt to ' squeeze ' of the facade (meaning respectively. pattern ) to get direct access to hidden behind the facade classes. How? . How can you protect yourself from this? . You can use the pending creation of a class who is behind the facade (the first treatment for it), the class itself generated from the plant and remove it if not for him a long time treated (m. e. behind the facade of most of the time there is nothing - no class). In this decision, we save memory, increase speed of loading applications. And besides, ' spoil karma ' to ' bad ' programmer. It is certain, either in your code will not understand, or, if the designer is to assign an object reference a global variable, then drop it all will be. In the end, or take your crap and it did do its ' dirty work ', or too lazy to take her and he was for the ' FD ' will come running to you. That's where you're his brain and may.
Of course, you can write a bunch of tips to follow blindly, they still will not work. The main goal is to give an idea of how to be behave as a team. The above advice, just what I have ' emerged ' in memory. I would like to hear your comments, tips.
PS: I recall that I find out the usefulness of. URL redirection service. If you are interested in it, instead of e-mail simply enter 'yes' if you would like to use it, then leave your e-mail to receive notification when the service will be launched. Address for ballot:.
http://spreadsheets. google. com / viewform? formkey = dGxaeDlYNmdsNDBKSnprcE80Qkd4Umc6MQ.
Quit your address will be used only once to inform you about the launch of the service, then a list of addresses will be removed. Addresses to third parties will not be passed.