From Small Scale Guerrilla Warfare to a Wide Range of Army Operations the Development Direction of Software Production and Education
With the great improvement of computer computing power, the requirement of the software can be greatly improved in terms of performance, scale and reliability. From the programming of one or several people, it has rapidly transitioned to the collective programming of hundreds or even thousands of people. The increase in quantity has brought qualitative changes, and the era of programming that relies on individual ability no longer exists. It’s unavoidable that large-scale group army will be fought. Group army is different from guerrilla warfare, which will require more discipline and cooperation of teams. Our software education also needs to cater this change.
KeywordsGroup army operations Guerrilla warfare Strategies of fighting
This research is supported by 2016 key projects of Online Education Research Fund (General Education) of the online education research center of the Ministry of education.
- 1.Churchill, W.: World war II memoir. Southern publishing house (2003)Google Scholar
- 2.[Japan] Real pine.: 365 Days Before Pearl Harbor. Shanghai Translation Publishing House China (2008)Google Scholar
- 3.[US] Michael corsomaro: Microsoft’s Secret. Peking University Press, Beijing (1996)Google Scholar
- 4.Yang, J., Xu, D., Liu, H., Qi, W.: Research on the Teaching Reform of C Language Course. Science Education Article Collects (2014)Google Scholar
- 5.Li, N., Wang, W.H., Wang, Y.: Teaching innovation beyond “Path-depended” on C language course. J. Anyang Inst. Technol. 2, 033 (2012)Google Scholar
- 6.Shi, H., Zhang, J.M.: Discusses several difficulties’ teaching method in C language course. Comput. Knowl. Technol. (2012)Google Scholar
- 7.Jin-fang, T.: Exploration on teaching method of C language course. High. Educ. Forum 3, 030 (2007)Google Scholar
- 10.Chen, X., Lin, C.: Tetris game system design based on AT89S52 single chip microcomputer. In: IITA 2009, Third International Symposium on Intelligent Information Technology Application, pp. 256–259. IEEE (2009)Google Scholar