The Art of Writing Software
This content has moved permanently to: https://blog.jonm.dev/posts/using-interface-hierarchies-to-enforce-access-protection/
Would this be an accurate UML picture of the original design, before you tweaked it? Please view the picture here, http://pcolanet.spaces.live.com/Just trying to learn how to model code artefacts like yours, which I find interesting and vital towards flexible designs. Thanks, Danny Rosales
Would this be an accurate UML picture of the original design, before you tweaked it? Please view the picture here, http://pcolanet.spaces.live.com/
ReplyDeleteJust trying to learn how to model code artefacts like yours, which I find interesting and vital towards flexible designs.
Thanks,
Danny Rosales