I wrote a class that can be loaded like a control and called draw during painting. I still think it is quite convenient. What is missing now is the support of the designer, it would be perfect if there is one. With regard to the support of the
After more than half a year of consideration and preparation, we made a difficult decision the night before: Let the eldest son study at home.
I'm tired of my child's Sea of questions and tactics. I don't have time to read any extra books, and his
My colleagues and I both joined hands to build a system. Later, the customer thought we were practical, the following two projects hope to be delivered to us.Therefore, we are looking for someone to help. the requirement is not high, as long as
At night, one person ran to the shaxian snacks on the street to eat a fast food.
The store was very small and had only six tables. I was just bored with dinner. I suddenly heard a man angry with me. I looked up and saw a tall young man, about one
The article "arraylist original code analysis" mentions "Why does removerange (INT fromindex, int toindex) be protected ?"
First, the source code of the removerange (INT fromindex, int toindex) method is provided.CodeI will not explain what it is,
Today, we can see that there is a battle in the blog Park. This is actuallyCommunityThe atmosphere, without argument, is just getting angry. I don't agree with you, but I swear to defend your right to speak.
Gossip~The cause of the argument is
I remember that no matter what system was developed a few years ago, log4net was introduced to record the system logs. At that time, I was only addicted to the powerful log functions provided by this component. However, we soon learned the negative
The "three levels of idle talk permission design realm" takes permission design as an example to talk about my understanding of system design. However, some garden friends asked some details about permission design in their comments, so I explained
In a recent project, the customer proposed that the database should be used. MSDE . Currently MSDE The version is 2000 , Which is provided on Microsoft's official website Download it And provides detailed MSDEInstructions for use ,
Online Bug Management System
After registration, you can create a project, enter and track defects, and manage bugs in different regions. Project properties can be set to confidential so that no bug information is visible to irrelevant personnel.
Note: The installation of the modules in the Chinese package is the same.
1. Download the Language Pack. If you cannot find it, there is a Chinese Language Pack for dnn 4.6.2.
2. Log On with the host
3. Go to "Host-> language"
4. Select
There is a website to be developed, mainly to complete the release of merchant and commodity information. In addition, I chose dnn as the framework for completely data-driven scenarios. For the following reasons:
(1) I and another colleague used to
1. Which of the following constellation do you belong?
Capricorn, Aquarius, cancer, or Gemini → starting from question 2nd
Taurus, Sagittarius, Leo, or Virgo → starting from question 3rd
Scorpio, Pisces, Aries, or Libra → starting from
yesterday, L Jun in m SN chat with me. He had a good relationship with me when he was at school. Although he had no contact after graduation, he was very affectionate. L after graduation, Jun went to the network department of a
I recently developed a website based on dnn and found an interesting thing.Because the business logic has many commonalities that can be extracted, I made a filter function into a user control (usercontrol, which is called filter for ease of
When Integrating enterprise applications, there are various systems that have both self-developed, transplanted, purchased, and many old systems,
These systems generally have their own independent user modules. Integrating the User Logon of these
Microsoft, please let me tell you that, as a web programmer on a windows platform, you are like a God in my mind. You lead me into one magical and beautiful" country ", from asp. net, from process-oriented to object-oriented, from coding to system
After readingAdaptive software ......Of"Today, when we were working on a new system function permission restriction, I had a new idea. I don't know if it was a shift or not, so I 'd like to throw some eggs! After that, we found that everyone is
Many people should be familiar with DI injection. If you are not familiar with DI injection, you can look at the evolution history of DI, DIP, and IOC in yuanyou's article.
DI injection is often used in Mvc projects, domain layers, and persistence
I have developed a module that can use the TreeView control to display a three-layer data structure. In fact, three tables are associated with two-layer Master-Detail cascade: Headquarters/branch/office. There may be n headquarters.
The first time
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.
A Free Trial That Lets You Build Big!
Start building with 50+ products and up to 12 months usage for Elastic Compute Service