Visual studio feeds

All Visual Studio blogs in one place

Subscribe

Enter your email address:

Delivered by FeedBurner

Increase your website traffic with Attracta.com

Google+

Contact

Email:
Subject:
Message:
Anti-spam: How many eyes has a typical person?

Follow us on FB

Search

SPD2013 Workflow - how to check user is member of group

AddThis Social Bookmark Button
  I want to describe a method that I use to check if a user is a member of a group.   Steps Call a REST webservice Reference MSDN for the correct API Build a RequestURL and a basic RequestHeader Figure out what the results mean Wrap it up in a Workflow Custom Activity   API MSDN (
href="http://msdn.microsoft.com/en-us/library/office/dn268594(v=office.15).aspx">http://msdn.microsoft.com/en-us/library/office/dn268594(v=office.15).aspx - this needs to be a SharePoint Developer's home page) documents a few REST end points that I use for this. http://msdn.microsoft.com/en-us/library/office/dn531432(v=office.15).aspx#bk_Group Says you can get to a sharepoint group via: http:///_api/web/sitegroups() http:///_api/web/sitegroups() The group also has a Users property that points to a Users Collection. http://msdn.microsoft.com/en-us/library/office/dn531432(v=office.15).aspx#bk_UserCollection This expands our example to: http:///_api/web/sitegroups()/users For example: https://sharepointgurus365.sharepoint.com/john/_api/web/sitegroups('john Owners')/users/ redirects to...(Read whole news on source site)

What Is The Difference Between FileFlags.Random (FILE_FLAG_RANDOM_ACCESS) And FileFlags.SequentialScan (FILE_FLAG_SEQUENTIAL_SCAN)?

AddThis Social Bookmark Button
Originally posted on: http://geekswithblogs.net/akraus1/archive/2014/12/14/160652.aspxWhen you want fast and efficient File IO in Windows you can specify a myriad of flags to CreateFile. But which of these many flags help in which scenarios? MSDN says that some read ahead buffering is enabled if Sequential Scan is done. First a little look into the docs can help:   FILE_FLAG_SEQUENTIAL_SCAN  0x08000000 Access is intended to be sequential from beginning to end. The system can use this as a hint to optimize file caching. This flag should not be used if read-behind (that
is, reverse scans) will be used. This flag has no effect if the file system does not support cached I/O and FILE_FLAG_NO_BUFFERING. For more information, see the Caching Behavior section of this topic. Under Caching Behavior is more information: Specifying the FILE_FLAG_SEQUENTIAL_SCAN flag can increase performance for applications that read large files using sequential access. Performance gains can be even more noticeable for applications that read large files mostly sequentially, but occasionally skip forward over small ranges of bytes. If an application...(Read whole news on source site)

Lesser-Known NHibernate Features: Validation and Lifecycle Interfaces

AddThis Social Bookmark Button
NHibernate offers two interfaces that can be used to validate an entity before it is saved or updated or to cancel its saving, updating and deleting: IValidatable and ILifecycle. They are an alternative to events, and don’t need anything else to work other than be implemented by some entity. Here’s what IValidatable looks like:
New', courier, monospace; font-size: 8pt; direction: ltr; background-color: #f4f4f4;"> 1: public class Product : IValidatable 2: { 3: ...(Read whole news on source site)

Spinning the wheel: clustering and near misses

AddThis Social Bookmark Button
The previous post showed a simple model casinos use to manipulate the odds. Instead of relying on the physical wheel for randomness, they rely on a virtual list of indexes that maps to the physical wheel.

Using that same model, it's easy to fiddle with the virtual indexes so that they map to misses right next to the winning pocket, creating "near misses". "Near misses" make players feel less like losing, since you "almost won". Casinos use this technique to get the next spin out of you.

Let's create more specific labels - a label for
each individual pocket.

The winning pocket is in the physical wheel at index two. We need the virtual indexes to make clusters next to the winning label. Four indexes map to Miss2, one maps to Win and three map to Miss3. We intentionally ignore Miss1.


Spinning the wheel one million times reveals the pattern; Miss1 gets ignored, while we hardly ever win but very often "just" miss.

Since the law states that randomness and visualization are two separate concepts, casinos are free to operate in this gray zone, as long as randomness stays untouched....(Read whole news on source site)

A behavior to deal with UI consequences of full screen and Software Keys in Windows Phone 8.1

AddThis Social Bookmark Button
This week I was presented with an interesting challenge. Using this technique, I used the whole screen for my app. The problem was I had not anticipated a Denim feature for the so called software buttons. For those unfamiliar with that – on the newest low and mid-tier phones the back, start and search buttons are not necessarily hardware buttons anymore, but can be a dedicated piece of screen that shows buttons. This enables hardware manufacturers to make phones for all platforms in one (hardware) package. Now the Denim firmware – that comes with the Lumia 73x and
83x - enables users to make those software buttons disappear – so the extra piece of screen can be used by the app itself. Pretty awesome. This can be done by using pressing a little arrow that appears on the left of the button bar:
It can be brought up again by swiping in from the bottom of the screen. Pretty cool, but with a side effect I had not anticipated. If the application view bound mode is set to ApplicationViewBoundsMode.UseCoreWindow in App.Xaml.cs the phone reports the whole screen size – not only the part that...(Read whole news on source site)

Product Recommendation -SaneBox for Email

AddThis Social Bookmark Button
I don’t usually write about individual cool products, but if email is making you crazy this is a product you really want to check out.  It is called SaneBox and it separates your mail for you automagically into inbox, BuilkMail, View … Continue reading → For the complete article and hyperlinks, please visit my blog at http://JesseLiberty.com

Entity Developer Review, Part 2

AddThis Social Bookmark Button
Here’s my second post on Entity Developer, this time, focused on NHibernate. You can find the first part here.I created a new model item of type NHibernate and chose the option to generate from the database:Mind you, you need to have the database providers installed for the databases you want to access, Entity Developer does not include them.I was then presented with a list of database objects:After I selected a few, Entity Developer shows the class and properties naming rules dialog:Next, some more options, pretty complete.
Very useful is the option to detect many-to-many associations and table per type inheritances. These will be the default settings, but we can override them on a class by class basis:Interesting, the next dialog gives an opportunity to split entities among different diagrams according to the database object’s schema:Finally, we get to choose the template that will be used to generate the classes (the only included one is for HBM.XML) and set some of its properties, like, generate a single file or one file per entity, implement standard methods such as Equals or GetHashCode,...(Read whole news on source site)

The Top 5 Mistakes AngularJS Developers Make Part 4: Hacking the DOM

AddThis Social Bookmark Button
This is the fourth part in a five-part series that covers common AngularJS mistakes. To recap, the top five mistakes I see people make are: Heavy reliance on $scope (not using controller as)  Abusing $watch Overusing $broadcast and $emit Hacking the DOM Failing to Test In the previous posts I’ve covered some nuances around controllers and how they communicate with each other and expose information for data-binding. In this post I’ll elaborate on the importance of data-binding and share why it’s important to avoid hacking the DOM when writing an Angular application. Hacking the DOM... [[
This is a content summary only. Visit my website for full links, other content, and more! ]]
...(Read whole news on source site)

Home