Yesterday's attention: Microsoft patterns & Practices Enterprise Library released

Source: Internet
Author: User
Tags mx record

2005-1-30

  • [. Net Development]Enterprise Library (PAG Documentation)#
    The patterns & Practices Enterprise Library is a library of application blocks designed to assist developers with common enterprise development challenges. application blocks are a type of guidance, provided as source code that can be used 'as is, 'Extended, or modified by developers to use on enterprise development projects. enterprise Library features new and updated versions of application blocks that were previusly available as stand-alone application blocks. all Enterprise Library application blocks have been updated with a special focus on consistency, extensibility, lack of use, and integration.
  • [Internet]Sina's content transformation reveals that a blog website faces a fatal threat#
    Currently, the most influential websites in these fields, including blogs in China and 365key. However, Sina's iask applications currently have few similar competitors in China, it is said that 0.5 million of Internet users are already using iask. I have tried iask for a while. As long as your question is clear enough, someone will answer it soon, I don't expect these leaders to be successful at all.
  • [Bookmarks]Looking at Sina's Vivi#
    However, some new things with promising prospects will compete for imitation. as a result, the online retrieval website rushed out. today, even the portal began to intervene in this aspect. however, a problem is revealed, and their network is not filtered. the Vivi favorites of Sina began to become the homepage of skyfly in a few days. secretly think of the past. this is also true for the current network extraction. sina's click ranking list. basically, it is about porn. what is the significance of this question ?. It seems that the road is still long!
  • [Network technology]The risk of correctly using XHTML#
    I have been using XHTML for some years, but I didn't focus until last summer on how to use it correctly, that is, using the MIME type of application/XHTML XML to servo (server) it. I know some of the problems I encountered, but they are far from the same. As you will soon find, when you start to use real XHTML, you will encounter many seemingly small but confusing problems.
  • [Bookmarks]How do Del. icio. us authors understand tags?#
    From this interview, I found that Del. icio. us was not initially considered by Joshua as a social software feature. In other words, he did not design the system according to the concept of social software. His only consideration was useful. At the same time, today's popular tags were originally designed as a memory-friendly thing. When people find that the value of tag is not only to facilitate memory, more and more services absorb tags and make them the most social function.

2005-1-29

  • [. Net Development]How to Use trackback in dottext#
    Trackback is a network communication method or process that uses the HTTP protocol. It is related to a specific blog platform and there is no unified standard yet. Like RSS, it also facilitates information aggregation for the next generation of network content publishing methods represented by blogs.
  • [Network technology]Email Anti-Spam!#
    1: first, let your SMTP server implement the identity authentication for sending emails from local users, so that our local users can send emails without any obstacles. 2: If the recipient is not a local user, verify that it is a valid SMTP server. Take his mail from: declared mailhost value, and strict requirements must be name @ host format, such as xxx@anti-spam.org.cn, otherwise the gun. After obtaining mailhost, parse the host, here is the anti-spam.org.cn, then we query the list of MX values declared by the anti-spam.org.cn through DNS, here only one IP value is 211.157.2.93, compare the IP address of the recipient with 211.157.2.93. If the difference is too far, it is determined to be spammer and shot. The comparison method is classified into strict type and loose type. The strict type requires that the sender's IP address and the MX record of the host specified by the so-called mail from in a C class segment, the loose type must be in the B class segment (MSN. com emails must be authenticated using B class. Most of the other SMTP servers only need C Class authentication ). 3: If one has % u67
  • [. Net Development]Byte stream encoding is so complicated#
    In many cases, we need to know the encoding of the byte stream. For example, 1) when opening a text file using the editor, the editor needs to identify the various encodings of the text file. 2) After uploading a file, you need to know the encoding of the uploaded file byte stream.

365key-automatically generated for daily network Extraction

For more information, visit my 365key (RSS), You can subscribe to it through 365key.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.