Solved

Software design patterns

Posted on 2003-12-02
7
324 Views
Last Modified: 2013-12-04
I have heard this term "Software Design Patterns" quite often but not able to understand what it is.
Could somebody  tell me as to what it means?any basic online tutorials would be of great use.
0
Comment
Question by:asl_narayanan
  • 2
7 Comments
 
LVL 10

Expert Comment

by:ADSaunders
ID: 9859473
Hi ziwez0,
 .. ?? SELECT DISTINCT ??

Regards .. Alan
0
 
LVL 10

Expert Comment

by:ADSaunders
ID: 9859478
Sorry , Wrong Question
0
 
LVL 11

Accepted Solution

by:
KurtVon earned 25 total points
ID: 9859592
A "Design Pattern" is really just a fancy way of saying "a standard solution to a problem".

Okay, there is a little more to it, but not a whole lot (and I'm likely to be burned at the stake as a heretic for saying that).  It all falls back to a book http://www.amazon.com/exec/obidos/tg/detail/-/0201633612/103-5906391-5428643?v=glance which came up with the idea to find a nice standard way to describe these solutions so it is easier to figure out which solution you need and to catalog the solutions you have.  It sounds obvious, but every idea sounds obvious after someone comes up with it.  It was considered pretty brilliant when it first came out.

Here's a simple overview: http://www.cs.wustl.edu/~schmidt/patterns.html
0
 
LVL 2

Assisted Solution

by:override_y2k
override_y2k earned 25 total points
ID: 9866080
One particualr definition is:

Design patterns are recurring solutions to software design problems you find again and again in real-world application development. Design patterns are about design and interaction of objects, as well as providing a communication platform concerning elegant, reusable solutions to commonly encountered programming challenges.  

The Gang of Four (GOF) patterns are generally considered the foundation for all other patterns. They are categorized in three groups: Creational, Structural, and Behavioral.

Examples of design patterns are Singleton, Factory and Observer
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
countHi challenge 25 100
advertisement module in core php 4 145
Device same like our heart 12 77
C# code editing and collaboration 3 99
This article is meant to give a basic understanding of how to use R Sweave as a way to merge LaTeX and R code seamlessly into one presentable document.
In this post we will learn how to connect and configure Android Device (Smartphone etc.) with Android Studio. After that we will run a simple Hello World Program.
Viewers will learn how to properly install Eclipse with the necessary JDK, and will take a look at an introductory Java program. Download Eclipse installation zip file: Extract files from zip file: Download and install JDK 8: Open Eclipse and …
In this fifth video of the Xpdf series, we discuss and demonstrate the PDFdetach utility, which is able to list and, more importantly, extract attachments that are embedded in PDF files. It does this via a command line interface, making it suitable …

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now