Number
int64
1
7.61k
Text
stringlengths
2
3.11k
2,801
The variation and complexity of requirement documentation make it a proven challenge. Requirements may be implicit and hard to uncover. It is difficult to know exactly how much and what kind of documentation is needed and how much can be left to the architecture and design documentation, and it is difficult to know how...
2,802
The need for requirements documentation is typically related to the complexity of the product, the impact of the product, and the life expectancy of the software. If the software is very complex or developed by many people , requirements can help better communicate what to achieve. If the software is safety-critical an...
2,803
Traditionally, requirements are specified in requirements documents . To manage the increased complexity and changing nature of requirements documentation , database-centric systems and special-purpose requirements management tools are advocated.
2,804
In Agile software development, requirements are often expressed as User Stories with accompanying acceptance criteria.
2,805
Architecture documentation is a special type of design document. In a way, architecture documents are third derivative from the code . Very little in the architecture documents is specific to the code itself. These documents do not describe how to program a particular routine, or even why that particular routine exist...
2,806
Another type of design document is the comparison document, or trade study. This would often take the form of a whitepaper. It focuses on one specific aspect of the system and suggests alternate approaches. It could be at the user interface, code, design, or even architectural level. It will outline what the situation ...
2,807
A very important part of the design document in enterprise software development is the Database Design Document . It contains Conceptual, Logical, and Physical Design Elements. The DDD includes the formal information that the people who interact with the database need. The purpose of preparing it is to create a common ...
2,808
When talking about Relational Database Systems, the document should include following parts:
2,809
It is very important to include all information that is to be used by all actors in the scene. It is also very important to update the documents as any change occurs in the database as well.
2,810
It is important for the code documents associated with the source code to be thorough, but not so verbose that it becomes overly time-consuming or difficult to maintain them. Various how-to and overview documentation guides are commonly found specific to the software application or software product being documented by...
2,811
Code documents are often organized into a reference guide style, allowing a programmer to quickly look up an arbitrary function or class.
2,812
Often, tools such as Doxygen, NDoc, Visual Expert, Javadoc, JSDoc, EiffelStudio, Sandcastle, ROBODoc, POD, TwinText, or Universal Report can be used to auto-generate the code documents—that is, they extract the comments and software contracts, where available, from the source code and create reference manuals in such f...
2,813
The idea of auto-generating documentation is attractive to programmers for various reasons. For example, because it is extracted from the source code itself , the programmer can write it while referring to the code, and use the same tools used to create the source code to make the documentation. This makes it much ea...
2,814
A possible downside is that only programmers can edit this kind of documentation, and it depends on them to refresh the output . Some would characterize this as a pro rather than a con.
2,815
Respected computer scientist Donald Knuth has noted that documentation can be a very difficult afterthought process and has advocated literate programming, written at the same time and location as the source code and extracted by automatic means. The programming languages Haskell and CoffeeScript have built-in support ...
2,816
Elucidative Programming is the result of practical applications of Literate Programming in real programming contexts. The Elucidative paradigm proposes that source code and documentation be stored separately.
2,817
Often, software developers need to be able to create and access information that is not going to be part of the source file itself. Such annotations are usually part of several software development activities, such as code walks and porting, where third-party source code is analysed in a functional way. Annotations can...
2,818
Unlike code documents, user documents simply describe how a program is used.
2,819
In the case of a software library, the code documents and user documents could in some cases be effectively equivalent and worth conjoining, but for a general application this is not often true.
2,820
Typically, the user documentation describes each feature of the program, and assists the user in realizing these features. It is very important for user documents to not be confusing, and for them to be up to date. User documents do not need to be organized in any particular way, but it is very important for them to h...
2,821
User documentation can be produced in a variety of online and print formats. However, there are three broad ways in which user documentation can be organized.
2,822
Tutorial: A tutorial approach is considered the most useful for a new user, in which they are guided through each step of accomplishing particular tasks.
2,823
Thematic: A thematic approach, where chapters or sections concentrate on one particular area of interest, is of more general use to an intermediate user. Some authors prefer to convey their ideas through a knowledge based article to facilitate the user needs. This approach is usually practiced by a dynamic industry, ...
2,824
List or Reference: The final type of organizing principle is one in which commands or tasks are simply listed alphabetically or logically grouped, often via cross-referenced indexes. This latter approach is of greater use to advanced users who know exactly what sort of information they are looking for.
2,825
A common complaint among users regarding software documentation is that only one of these three approaches was taken to the near-exclusion of the other two. It is common to limit provided software documentation for personal computers to online help that give only reference information on commands or menu items. The jo...
2,826
Like other forms of technical documentation, good user documentation benefits from an organized process of development. In the case of user documentation, the process as it commonly occurs in industry consists of five steps:
2,827
User analysis, the basic research phase of the process.
2,828
Planning, or the actual documentation phase.
2,829
Draft review, a self-explanatory phase where feedback is sought on the draft composed in the previous step.
2,830
Usability testing, whereby the usability of the document is tested empirically.
2,831
Editing, the final step in which the information collected in steps three and four is used to produce the final draft.
2,832
For many applications it is necessary to have some promotional materials to encourage casual observers to spend more time learning about the product. This form of documentation has three purposes:
2,833
To excite the potential user about the product and instill in them a desire for becoming more involved with it.
2,834
To inform them about what exactly the product does, so that their expectations are in line with what they will be receiving.
2,835
To explain the position of this product with respect to other alternatives.
2,836
"The resistance to documentation among developers is well known and needs no emphasis." This situation is particularly prevalent in agile software development because these methodologies try to avoid any unnecessary activities that do not directly bring value. Specifically, the Agile Manifesto advocates valuing "worki...
2,837
A survey among software engineering experts revealed, however, that documentation is by no means considered unnecessary in agile development. Yet it is acknowledged that there are motivational problems in development, and that documentation methods tailored to agile development may be needed.
2,838
Data exists in three states: data at rest, data in transit and data in use. Data within a computer, in most cases, moves as parallel data. Data moving to or from a computer, in most cases, moves as serial data. Data sourced from an analog device, such as a temperature sensor, may be converted to digital using an analog...
2,839
Physical computer memory elements consist of an address and a byte/word of data storage. Digital data are often stored in relational databases, like tables or SQL databases, and can generally be represented as abstract key/value pairs. Data can be organized in many different types of data structures, including arrays, ...
2,840
Metadata helps translate data to information. Metadata is data about the data. Metadata may be implied, specified or given.
2,841
Data relating to physical events or processes will have a temporal component. This temporal component may be implied. This is the case when a device such as a temperature logger receives data from a temperature sensor. When the temperature is received it is assumed that the data has a temporal reference of now. So the ...
2,842
Fundamentally, computers follow a sequence of instructions they are given in the form of data. A set of instructions to perform a given task is called a program. A program is data in the form of coded instructions to control the operation of a computer or other machine. In the nominal case, the program, as executed by...
2,843
To store data bytes in a file, they have to be serialized in a file format. Typically, programs are stored in special file types, different from those used for other data. Executable files contain programs; all other files are also data files. However, executable files may also contain data used by the program which is...
2,844
The line between program and data can become blurry. An interpreter, for example, is a program. The input data to an interpreter is itself a program, just not one expressed in native machine language. In many cases, the interpreted program will be a human-readable text file, which is manipulated with a text editor prog...
2,845
For example, a user might first instruct the operating system to load a word processor program from one file, and then use the running program to open and edit a document stored in another file. In this example, the document would be considered data. If the word processor also features a spell checker, then the diction...
2,846
In an alternate usage, binary files are sometimes called data as distinguished from human-readable text.
2,847
The total amount of digital data in 2007 was estimated to be 281 billion gigabytes .
2,848
Keys in data provide the context for values. Regardless of the structure of data, there is always a key component present. Keys in data and data-structures are essential for giving meaning to data values. Without a key that is directly or indirectly associated with a value, or collection of values in a structure, the v...
2,849
Data can be represented in computers in multiple ways, as per the following examples:
2,850
The taxonomic rank-structure of classes, which is an example of a hierarchical data structure; and
2,851
at run time, the creation of references to in-memory data-structures of objects that have been instantiated from a class library.
2,852
It is only after instantiation that an object of a specified class exists. After an object's reference is cleared, the object also ceases to exist. The memory locations where the object's data was stored are garbage and are reclassified as unused memory available for reuse.
2,853
In computer science, a library is a collection of read-only resources that is leveraged during software development to implement a computer program.
2,854
Historically, a library consisted of subroutines . The concept now includes other forms of executable code including classes and non-executable data including images and text. It can also refer to a collection of source code.
2,855
For example, a program could use a library to indirectly make system calls instead of making those system calls directly in the program.
2,856
A library can be used by multiple, independent consumers . This differs from resources defined in a program which can usually only be used by that program.
2,857
When a consumer uses a library resource, it gains the value of the library without having to implement it itself. Libraries encourage code reuse in a modular fashion.
2,858
When writing code that uses a library, a programmer only needs to know high-level information such as what items it contains at and how to use the items – not all of the internal details of the library.
2,859
Libraries can use other libraries resulting in a hierarchy of libraries in a program.
2,860
A library of executable code has a well-defined interface by which the functionality is invoked. For example, in C, a library function is invoked via C's normal function call capability. The linker generates code to call a function via the library mechanism if the function is available from a library instead of from t...
2,861
The functions of a library can be connected to the invoking program at different program lifecycle phases. If the code of the library is accessed during the build of the invoking program, then the library is called a static library. An alternative is to build the program executable to be separate from the library file....
2,862
Most compiled languages have a standard library, although programmers can also create their own custom libraries. Most modern software systems provide libraries that implement the majority of the system services. Such libraries have organized the services which a modern application requires. As such, most code used by ...
2,863
The idea of a computer library dates back to the first computers created by Charles Babbage. An 1888 paper on his Analytical Engine suggested that computer operations could be punched on separate cards from numerical input. If these operation punch cards were saved for reuse then "by degrees the engine would have a lib...
2,864
In 1947 Goldstine and von Neumann speculated that it would be useful to create a "library" of subroutines for their work on the IAS machine, an early computer that was not yet operational at that time. They envisioned a physical library of magnetic wire recordings, with each wire storing reusable computer code.
2,865
Inspired by von Neumann, Wilkes and his team constructed EDSAC. A filing cabinet of punched tape held the subroutine library for this computer. Programs for EDSAC consisted of a main program and a sequence of subroutines copied from the subroutine library. In 1951 the team published the first textbook on programming, T...
2,866
COBOL included "primitive capabilities for a library system" in 1959, but Jean Sammet described them as "inadequate library facilities" in retrospect.
2,867
JOVIAL has a Communication Pool , roughly a library of header files.
2,868
Another major contributor to the modern library concept came in the form of the subprogram innovation of FORTRAN. FORTRAN subprograms can be compiled independently of each other, but the compiler lacked a linker. So prior to the introduction of modules in Fortran-90, type checking between FORTRAN subprograms was imposs...
2,869
By the mid 1960s, copy and macro libraries for assemblers were common. Starting with the popularity of the IBM System/360, libraries containing other types of text elements, e.g., system parameters, also became common.
2,870
In IBM's OS/360 and its successors this is called a partitioned data set.
2,871
The first object-oriented programming language, Simula, developed in 1965, supported adding classes to libraries via its compiler.
2,872
Libraries are important in the program linking or binding process, which resolves references known as links or symbols to library modules. The linking process is usually automatically done by a linker or binder program that searches a set of libraries and other modules in a given order. Usually it is not considered an ...
2,873
The references being resolved may be addresses for jumps and other routine calls. They may be in the main program, or in one module depending upon another. They are resolved into fixed or relocatable addresses by allocating runtime memory for the memory segments of each module referenced.
2,874
Some programming languages use a feature called smart linking whereby the linker is aware of or integrated with the compiler, such that the linker knows how external references are used, and code in a library that is never actually used, even though internally referenced, can be discarded from the compiled application....
2,875
Some references in a program or library module are stored in a relative or symbolic form which cannot be resolved until all code and libraries are assigned final static addresses. Relocation is the process of adjusting these references, and is done either by the linker or the loader. In general, relocation cannot be do...
2,876
When linking is performed during the creation of an executable or another object file, it is known as static linking or early binding. In this case, the linking is usually done by a linker, but may also be done by the compiler. A static library, also known as an archive, is one intended to be statically linked. Origina...
2,877
All of the modules required by a program are sometimes statically linked and copied into the executable file. This process, and the resulting stand-alone file, is known as a static build of the program. A static build may not need any further relocation if virtual memory is used and no address space layout randomizatio...
2,878
A shared library or shared object is a file that is intended to be shared by executable files and further shared object files. Modules used by a program are loaded from individual shared objects into memory at load time or runtime, rather than being copied by a linker when it creates a single monolithic executable file...
2,879
Shared libraries can be statically linked during compile-time, meaning that references to the library modules are resolved and the modules are allocated memory when the executable file is created. But often linking of shared libraries is postponed until they are loaded.
2,880
Although originally pioneered in the 1960s, dynamic linking did not reach the most commonly-used operating systems until the late 1980s. It was generally available in some form in most operating systems by the early 1990s. During this same period, object-oriented programming was becoming a significant part of the prog...
2,881
At the same time many developers worked on the idea of multi-tier programs, in which a "display" running on a desktop computer would use the services of a mainframe or minicomputer for data storage or processing. For instance, a program on a GUI-based computer would send messages to a minicomputer to return small sampl...
2,882
Soon the majority of the minicomputer and mainframe vendors instigated projects to combine the two, producing an OOP library format that could be used anywhere. Such systems were known as object libraries, or distributed objects, if they supported remote access . Microsoft's COM is an example of such a system for local...
2,883
For some time object libraries held the status of the "next big thing" in the programming world. There were a number of efforts to create systems that would run across platforms, and companies competed to try to get developers locked into their own system. Examples include IBM's System Object Model , Sun Microsystems' ...
2,884
Class libraries are the rough OOP equivalent of older types of code libraries. They contain classes, which describe characteristics and define actions that involve objects. Class libraries are used to create instances, or objects with their characteristics set to specific values. In some OOP languages, like Java, the ...
2,885
Today most class libraries are stored in a package repository . Client code explicitly declare the dependencies to external libraries in build configuration files .
2,886
Another library technique uses completely separate executables and calls them using a remote procedure call over a network to another computer. This maximizes operating system re-use: the code needed to support the library is the same code being used to provide application support and security for every other program...
2,887
However, such an approach means that every library call requires a considerable amount of overhead. RPC calls are much more expensive than calling a shared library that has already been loaded on the same machine. This approach is commonly used in a distributed architecture that makes heavy use of such remote calls, no...
2,888
Code generation libraries are high-level APIs that can generate or transform byte code for Java. They are used by aspect-oriented programming, some data access frameworks, and for testing to generate dynamic proxy objects. They also are used to intercept field access.
2,889
The system stores libfoo.a and libfoo.so files in directories such as /lib, /usr/lib or /usr/local/lib. The filenames always start with lib, and end with a suffix of .a or of .so . Some systems might have multiple names for a dynamically linked library. These names typically share the same prefix and have different su...
2,890
The system inherits static library conventions from BSD, with the library stored in a .a file, and can use .so-style dynamically linked libraries . Most libraries in macOS, however, consist of "frameworks", placed inside special directories called "bundles" which wrap the library's required files and metadata. For exam...
2,891
Dynamic-link libraries usually have the suffix *.DLL, although other file name extensions may identify specific-purpose dynamically linked libraries, e.g. *.OCX for OLE libraries. The interface revisions are either encoded in the file names, or abstracted away using COM-object interfaces. Depending on how they are comp...
2,892
A computer-aided design library or CAD library is a cloud based repository of 3D models or parts for computer-aided design , computer-aided engineering , computer-aided manufacturing , or Building information modeling . Examples of CAD libraries are GrabCAD, Sketchup 3D Warehouse, Sketchfab, McMaster-Carr, TurboSquid, ...
2,893
CAD libraries can have assets such as 3D models, materials/textures, bump maps, trees/plants, HDRIs, and different Computer graphics lighting sources to be rendered.
2,894
Thus, these are different from distributed computing problems that need communication between tasks, especially communication of intermediate results. They are easy to perform on server farms which lack the special infrastructure used in a true supercomputer cluster. They are thus well suited to large, Internet-based v...
2,895
A common example of an embarrassingly parallel problem is 3D video rendering handled by a graphics processing unit, where each frame or pixel can be handled with no interdependency. Some forms of password cracking are another embarrassingly parallel task that is easily distributed on central processing units, CPU cor...
2,896
"Embarrassingly" is used here to refer to parallelization problems which are "embarrassingly easy". The term may imply embarrassment on the part of developers or compilers: "Because so many important problems remain unsolved mainly due to their intrinsic computational complexity, it would be embarrassing not to develop...
2,897
An alternative term, pleasingly parallel, has gained some use, perhaps to avoid the negative connotations of embarrassment in favor of a positive reflection on the parallelizability of the problems: "Of course, there is nothing embarrassing about these programs at all."
2,898
Some examples of embarrassingly parallel problems include:
2,899
Cryptography, or cryptology , is the practice and study of techniques for secure communication in the presence of adversarial behavior. More generally, cryptography is about constructing and analyzing protocols that prevent third parties or the public from reading private messages. Modern cryptography exists at the int...
2,900
Cryptography prior to the modern age was effectively synonymous with encryption, converting readable information to unintelligible nonsense text , which can only be read by reversing the process . The sender of an encrypted message shares the decryption technique only with the intended recipients to preclude access ...