Slices & Articles Get by the slice or add to your own ebook
|James Avery||O'Reilly Media|
Visual Studio 2005 Web Application Projects in a Nutshell
The Web Application Project model for Visual Studio 2005 is exactly what many developers have been waiting for. It adds the performance, manageability, and ease of use of the Visual Studio 2003 Web Application project to Visual Studio 2005, while eliminating the headaches associated with trying to store generated code and user code in a single file. If you are working on enterprise applications or on any sizable web applications, you should seriously consider using the Web Application project instead of the default
8.10 Sharing Your Visual Studio Goodies with the
Content Installer Power Toys
There are a number of ways to extend Visual Studio 2005: you can write add-ins and visualizers, create code snippets and macros, and much more. But after spending time extending Visual Studio, you’ll naturally want to share your creation with the world. That’s where the Content Installer Power Toys become useful.
Visual Studio 2005 includes a new feature called the Content Installer that can be used to automatically install extensions using special installer files with the .vsi extension. The Visual Studio Content Installer Power Toys make it extremely easy to create .vsi files that install any number of the following items:See more
|Simon Foster||Hunter Publishing||ePub|
At the dawn of modern tourism in China in the 1980s foreigners were only allowed to stay in certain designated hotels, but these days many more options are open, from five-star splendor to five-dollar dorms. However, when compared to some other countries, hotels in China are fairly characterless and functional, although there are more and more exceptions to this, and not just in the luxury bracket (see Escaping the Ordinary).
As in most countries, room rates reflect standards to an extent, but mid-range and budget hotels are generically styled and don't tend to reduce their tariff as they deteriorate. Thus the best value (and keenest staff) are often found in newer lodgings. In terms of customer service, expensive hotels may meet the standards of their Western counterparts, but equally they may not, and in many mid-range hotels you may get the distinct impression that the staff thinks customers should feel privileged for being able to stay! Worse still, in places that see few foreigners, I've witnessed reception staff hiding behind the counter to avoid serving the lao wai (foreigners)! Something to remember every time you check into a hotel is to take one of their business cards, which has the hotel's Chinese name. Then you can go out, explore and get as lost as you like, then just jump in a cab when you want to come home.See more
|Jean-François Hubert||Parkstone International|
Le Champa historique e visiteur qui se rend aujourd’hui au Vietnam autour de
Phan Thiêt, Phan Ri et Phan Rang ou encore vers Châu
Dôc, et qui rencontre différentes personnes vêtues parfois curieusement, aurait bien du mal à croire que celles-ci, des Cham, ont été les habitants de pratiquement les deux tiers, en longitude, du
Vietnam d’aujourd’hui. Au Xe siècle, l’empire khmer et le Champa constituaient les principales puissances du Sud-Est asiatique continental, alors qu’au nord, le Dai Viêt n’était qu’un tout jeune royaume après avoir été, pendant plus de mille ans, une province rattachée à l’empire chinois.
Nos sources pour la connaissance de l’histoire du Champa sont à la fois textuelles et archéologiques.
On dispose d’une part, des textes chinois et vietnamiens
(Annales), des récits des voyageurs (chinois, arabes, jusqu’aux missionnaires occidentaux, en passant par Marco Polo), des manuscrits cham (notamment ceux conservés à l’Inventaire des
Archives du fonds de la Société Asiatique de Paris), de l’épigraphieSee more
|Christian Benvenuti||O'Reilly Media||ePub|
The Internet Control Message Protocol (ICMP) is a transport protocol used by Internet hosts to exchange control messages, notably error notifications and information requests. In this chapter, we will look at ICMPv4, the version used by IPv4. IPv6 uses the ICMPv6 protocol, a protocol that includes other functionalities besides the ones in ICMPv4.
Over the years, the ICMP protocol has increasingly been used as the basis for the development of monitoring and measurement applications. Unfortunately, the ICMP protocol is also often used as the basis for security attacks, such as DoS or remote fingerprint collection. For this reason, network administrators often configure routers and firewalls to filter out most ICMP message types. Sometimes they filter too much, going against the RFC recommendations. Regardless of whether messages are filtered, they are often rate limited. It follows that any application built on top of ICMP is not always reliable for measurement or monitoring purposes. However, because measurements were not in its original design goal, ICMP often does not allow monitoring applications to collect all the information they need. Instead, dedicated applications have been written for that purpose, often based on TCP or UDP.See more
|Darrell Young||Rocky Nook-IPS||ePub|
The D700 is one of the Nikon DSLRs with a monitor screen that has enough resolution, size, and viewing angle to really enjoy using it to preview images. Plus, the battery lasts long enough that it doesnt seriously impact shooting time to enjoy the results of your work immediately.
Everything you need to control your D700s image playback is concentrated in a series of menu selections. Theyre found under the first menu in the camera, the Playback Menu, and covered in the Users Manual starting on page 260.
Well examine the nine selections of the Playback Menu in detail in the following sections.
(Users Manual page 262)
The Delete function allows you to selectively delete individual images from a group of images in a single or in multiple folders. It also allows you to clear all folders of images without deleting the folders. This is sort of like a card format that only affects images. If you have protected or hidden images, this function will not delete them.
There are two parts to the Delete screen:See more
Business & Economics