Microsoft have released what should be the final beta version of IE 7.
Download Build 7.0.5450.4
I just installed it and I am going to test it
Great news: You can create shortcut on desktop wiht ClickOnce Deployment. Here is described how... but a bit tricky:
first you have to get the code form this article - Creating a Desktop Shortcut in .NET Code by Les Smith
and then make modifiacation according this one: ClickOnce and Desktop Shortcuts - A cheesy way to make it work
Wow! I just came across the great artile on CodeProject about C# Anonymous methods and guess what I learned - Anonymous methods can accept arguments. I did not know about this feature and I think I am going to use it a lot.
As shown in the following example, an anonymous method can accept arguments of any type. You can also use the keywords ref
and out
to tune how arguments are passed to the method:
class Program {
delegate int DelegateType( int valTypeParam, string refTypeParam,
ref int refParam, out int outParam);
static DelegateType GetMethod() {
return delegate( int valTypeParam , string refTypeParam,
ref int refParam , out int outParam ) {
System.Console.WriteLine( "Hello valParam:{0} refTypeParam:{1}",
valTypeParam, refTypeParam);
refParam++;
outParam = 9;
return valTypeParam;
}; // End of the body of the anonymous method.
}
static void Main() {
DelegateType delegateInstance = GetMethod();
int refVar = 5;
int outVar;
int i = delegateInstance( 1, "one", ref refVar, out outVar );
int j = delegateInstance( 2, "two", ref refVar, out outVar );
System.Console.WriteLine( "i:{0} j:{1} refVar:{2} outVar:{3}",
i, j, refVar, outVar);
}
}
For more information see C#2 Anonymous Methods
NenoLoje wrote:
Seriously, there a lots of applications that implement their own user & role administration and permission concept.
What many of them do not know is there is a ready-to-use-solution - called Authorization Manager (short: AzMan) - by Microsoft that allows you to provide Role-Based Access and Control of your applications and providing a greater degree of flexibility to the IT staff running it.
Don't reinvent the wheel every time - especially in the case of security / identity / authentication - systems!
Thanks Neno, This is great info