2005-4-12
[Internet; Slashdot] Internet era publication: From the cat and slashdot to content # This result is a system of his development. This system allows 25 most trusted users to issue system assessments. Those who continue to be praised "host" identity. Every half an hour, the computer checks all posts and gives the online readers at the time. At any time, there will be 300 to 500 readers to accumulate enough scores and have become the host. The host itself can also obtain a certain fractional allocation, which makes them to comment on a certain number of posts. They can use all their scores within three days, and they have been elogenous. This creates a self-running system - during the traditional news acquisition process, the reporter and editor tries to figure out the facts of the outside world, then balance the experts' opinions, and use some brief quotations to express the facts, SlashDot basically does the same thing, but the expert's opinion is dominated, the introduction is complete, the entire press institution is maintained at very fast speed and very low cost - its soul people are no longer a summary, It is a necklace. [Financial stock] "Tray" reveals the latest trading method of the Manistor # for the dealer's trader, A said that due to the current market environment, the techniques of the soldiers have also been greatly different compared with the past. [.NET development; ajax] AJAX .NET Wrapper DLL Video # Because I do not have time to write a documentation I added a small video that will show you how to use the AJAX .NET Wrapper DLL First I will show the old way. using postbacks to the Server. Two textboxes (username and password) will be verified on the server. If the username is not michael and the password is wrong I will show a error message. Please note that every click on the Login button will start a Introduction to Postback (Server Round Trip). Introduction: Preliminary Dynamic Download Structure of Microsoft's Unified Programming Model "Indigo" for building a service-oriented application. This paper covers the relationship between Indigo and the existing distributed application technology in .NET Framework, the basic knowledge of Creating and using Indigo services, and overview of Indigo functions, including security, reliable messaging, and transaction support. (This article contains links to English sites.) [Mathematics] Zhao Shuang "Prove" The proof of the 勾 定 定 证 证 证 证 证 # # # # # # # # # # # # # # # 证 中 中 中 中There is indeed four right triangles and a small "hole" in the middle, but how to ensure that the big square can be made? It is necessary to prove here. For example, it may be necessary to prove the establishment of this graphic in the "triangular inner angle and equal angle or 2x right angles". The theorem of "triangular inner angle and equal angle or 2 times the right angle" may require parallel axiom to prove.
[Search technology; google] Google Intros Q & A Service # Google today began delivering factual answers for some queries at the top of its results page to save users from having to navigate over to other sites and look for the information.For example, if a user enters the query 'Portugal population', Google returns the answer - 10.5 million - along with a link to the Web page where the information came from, which in this case is the population page of the US Central Intelligence Agency's Factbook [the Internet. Outsourcing: Communication costs and logo Design Online Outsourcing Services # I hope to design logo's business registration requirements on Logoworks website, which will release more than 200 free designers to participate in design, logo design costs on an internal platform. From 265 to $ 549, it is not necessary (depending on how many designers will submit to you), these free designers share part of the income, and customer service is directly responsible by LogoWorks. Its business model is obvious: as a platform, connect to the company customers with demand for logo, and some free LOGO designers, which are responsible for the responsibility of intermediary and project management, thus obtaining economic benefits. [365Key reports; tag] Dongli weapon: 365key TAG # tag emergence, providing machine processing information with a human reference, and the uncertainty and diversity is exactly the characteristics of human society. Once, this is the most reluctant to face, because the machine likes precise, like black and white, like 0 is 0, 1 is 1. The emergence of folk class has suddenly showed another possibility of information technology development, which may make many people feel excited. [.NET development]. NET memory management, GC mechanism, memory release process # as a .NET programmer, we know that the memory management of managed code is automatic. .NET can guarantee that our managed procedures are all released at the end, which saves our programmers to save a lot of trouble. We can do not want to manage memory, anyway .Net will guarantee everything. Ok, it makes sense, there is a certain reason. The problem is that when we use unmanaged resources. Net can't be automatically managed. This is because the non-hosting code is not controlled by the CLR (Common Language Runtime), which exceeds the management scope of the CLR. So how do you deal with these unmanaged resources, how do .NET manage and release managed resources? [.NET Development] C-Omega Overview # c-Omega language is an interesting attempt to build a bridge for typical enterprise development work in the "impedance mismatch" involved in the relationship, object-oriented and XML. Many of the language has been accepted within the academic circles and Microsoft, and the comments made in Anders Hejlsberg for the development direction of C # 3.0. Since then, developers can learn what to program more about data-oriented programming languages by downloading C-Omega compilers or Visual Studio.net plugins.
[365key report; tag] 365key why to support TAG and use suggestion # 365key is a platform for information collection, for the finishing of information, each person has a method of everyone. Usually we use the Taxonomy to induce, organize and store our information, and the library is an excellent example. However, when the information organization is discovered after a certain amount, some information is not classified, and some information is not the same for each person, often confused our classification. This kind of thinking and randomness gave birth to Folksonomy. [.NET Development] Send .aspx files and pictures into DLL #, I saw someone in the 9CBS forum before how to compile the .aspx page to DLL, when I learned. Later, I felt that someone would have to use it, so I will put the article recently. 365key- 天天 网 摘 Automatic generation
For more news, please visit my 365Key (RSS), you can subscribe to 365Key.