The buffers do not function at their best when they are overloaded with data, so when excess data is forced into the buffer it overruns into another buffer. It is a three-fold problem that the buffers have, since the second buffer is not designed to hold data that overflows from the first. In order to store the overflow data the existing data in the second is destroyed or prone to...
Port Assignments for Commonly-Used Services... →
Self-Initializing Fake →
Consumer Driven Contracts →
ความรู้นั้นเป็นสิ่งที่ใครๆก็เอาไปได้ ไม่ว่าบนกระดาษหรือการสนทนา...– Maria De Ochin
There are only two hard things in Computer Science: cache invalidation and...– Phil Karlton
Test Double is a generic term for these terms: Dummy objects are passed around but never actually used. Usually they are just used to fill parameter lists. Fake objects actually have working implementations, but usually take some shortcut which makes them not suitable for production (an InMemoryTestDatabase is a good example). Stubs provide canned answers to calls made during the test,...
Fuzzy Framework →
DOTNET Times (this is WOW!!) →
TC Labs: TPL Dataflow →
Free Azure (30days)! →
The jQuery ‘live(…)’ Function →
Google Periordic Table →
jQuery Masonry →
Things I need to read and I must know!...
http://www.codeproject.com/KB/install/13disasters.aspx http://www.codeproject.com/KB/database/fastqueue.aspx http://www.codeproject.com/KB/aspnet/ProdArch.aspx
Comparisons DCOM and .NET Remoting
These technologies are rather old. But we just want to see their comparisons anyway : DCOM technology is based on the COM architecture whereas .NET Remoting is primarily based on .NET Frameworks. DCOM is based on proprietary binary protocol which is not supported by all object model, thus has big drawbacks in the internet world. DCOM is based on RPC protocol whereas .Net Remoting can use...
Vote Games on Mozilla Website →
Codebook Correlation Technology (CCT)
Codebook Correlation Technology (CCT) Abilities: Automatically analyze any type of problem in any type of physical, logical, or virtual object in any complex environment Build intelligent analysis into off-the-shelf solutions Automatically adapt the intelligent analysis to the managed environment even as it changes Provide instant results The premise of CCT is simple: Each problem in a networked...
graph on the web →
Concept of Deployment Pipeline
The way the deployment pipeline works is as follows. Every change that is made to an application’s conﬁguration, source code, environment, or data, triggers the creation of a new instance of the pipeline. One of the ﬁrst steps in the pipeline is to create binaries and installers. The rest of the pipeline runs a series of tests on the binaries to prove that they can be released. Each test that...
If somebody thinks of a good idea, how do we deliver it to users as quickly as...– Continuous Delivery
Continuous Delivery Highlighted
After extensive reengineering, teams were able to achieve a cycle time of hours or even minutes for a critical. This was possible because a fully automated, repeatable, reliable process was created for taking changes through the various stages of the build, deploy, test, and release process. Automation is the key. It allows all of the common tasks involved in the creation and deployment of...
Improving collaboration through better visibility and faster feedback– Continuous Delivery
How long would it take your organization to deploy a change that involves just...– Implementing Lean Software Development, p. 59.
Agile Best Practices →
MONODRIOD LAUNCHED! →
Load Your Visual Studio Faster →
สัมภาษณ์สด ผู้จัดการวง Boomansion นาย John (โดย...
Considering Serialized LOB pattern
[Cut from Patterns of Enterprise Application Architecture Book] Serialized LOB saves a graph of objects by serializing them into a single large object (LOB), which it stores in a database field. BLOB use minimum of space simple (if the programming platform supported) but have the problems on - readability - versioning CLOB need a parser to create textual format zipped XML...
ต่อจากนี้ไปจะตั้งใจทำงานครับ ชีวิตที่เหลือ อยากทำงาน หาเงิน เอาไปช่วยเหลือคนด้อยโอกาส ต่อจากนี้ผมจะทุ่มเทให้มากขึ้น มากขึ้นขึ้นไป ผมสัญญา…
Client Templating with jQuery - CodeProject →
Microsoft Test and Lab Manager and Visual Studio... →
2-Layer and 3-Layer Architecture
If the application was all about the display and simple update of relational data, then the client-server systems worked very well. The problem came with domain logic: business rules, validations, calculations, and the like. Usually, people would write these on the client, but thiswas awkard and usually done by embedding the loic directly into the UI screens. As the domain logic got more complex,...
Books on Patterns →
Watts Humphrey has passed away...
http://www.cmu.edu/news/archive/2010/October/oct28_wattshumphreyobit.shtml I just know this news. It’s sad you know.
Book: Just Enough Software Architecture | Rhino... →
The value of the pattern” is not that it gives you a new idea; the value...– Patterns of Enterprise Application Architecture Book
Sensitivity, Efficiency , and Scalability
I cut these from Patterns of Enterprise Architecture Book: Load sensitivity is an expression of how the response time varies with the load. Let’s say that - System A has a response time of 0.5 seconds for 10 through 20 users - System B has a response time of 0.2 seconds for 10 users that rises to 2 seconds for 20 users. In this case, system A has a lower load sensitivity than system B. We ...
Example of applying inappropriate architecture
For example, a simple expense-tracking system for a small company. Such a system has few users and simple logic and can easily be made accessible across the company with an HTML presentation. The only data source is a few tables in a database. As simple as it is, a system like this is not devoid of a challenge. You have to build it very quickly and you have to bear in mind that it may grow as...
Small Application and Enterprise Applicatoin
Today I read Enterprise App Book from Martin Fowler. Grasp some useful thought, it’s this: “For some people the term ‘enterprise application’ imples a large system. However, it’s important to rememeber that not all applications are large, even though they can provide a lot of value to the enterprise. Many people assume that, sonce small systems fails, it usually...
Insights on WCF →
Query Notification using SqlDependency and... →
umbrella extension framework →
The .NET Zone - CodeProject →
.NET Best Practice No: 1:- Detecting High Memory... →
c# - Does WCF use the ThreadPool to bring up new... →
/define (C# Compiler Options) →