Tag:Write off

  • Modular programming and untrusted verification thinking


    1、 Background In software development, there will always be such an image, colleague Xiaojia developed a sub function module, colleague Xiaob developed another sub function module. A complete business process needs to call two sub function modules developed by two colleagues. The business data is abnormal. Colleague a and colleague B check the problem according […]