|
by: PHLICS_Admin |
last post by:
Hi All,
There are two network cards in one computer (named A) , and there is one
network card in another computer(named B).
On computer A: one network card is used to connect to internet, and the
other network card is used in intranet whose ipaddress is 192.168.0.1
On computer B: the network card's ipaddress is 192.168.0.2.
These two computer can connect to each other.
|
by: Flare |
last post by:
Hi i have a qusstion about events and delegates. Especially the precis role
of the Event.
Eg. We have a class wich want to fire events so we declare:
public delegate void TestEventHandler(object sender, EventArgs arg);
public event TestEventHandler Test;
And fire the event with
|
by: Andrew Hayes |
last post by:
Having to remember to unregister for events to prevent a ref count seems to
be quite a burden to place on a developer. I have reviewed the
WeakMulticastDelegate solution proposed by Xavier Musy
(http://www.seedindustries.com/blog/x/2004_06_01_archive.html) and Greg
Schechter’s Avalon solution.
1) Is there a more general solution in C#?
2) Why are delegates not weakreferences? It would seem a logical decision to
make - if the only...
|
by: Naveen Mukkelli |
last post by:
Hi,
I'm using multicast using C#. When receiver disconnects from the server and
reconnects, following exception is occuring
System.Net.Sockets.SocketException: Only one usage of each socket address
(protocol/network address/port) is normally permitted
at System.Net.Sockets.Socket.Bind(EndPoint localEP).
I guess, this exception is occuring because, I'm trying to bind the multicast-
|
by: Christoph Nahr |
last post by:
The task: I want to let a background thread and a Windows Forms
foreground thread communicate via callback methods.
Now synchronization of a *single* delegate works just fine with the
usual Control.Invoke or Control.BeginInvoke methods.
However, I couldn't find any information on using this technique with
multicast delegates, i.e. the magic thingie created by the "event"
keyword in C#.
|
|
by: Larry Smith |
last post by:
Hi there,
Given a delegate that points to a non-static member function, is there a
cleaner way to change the object instance it's called on other than invoking
"Delegate.CreateDelegate()" (and changing the object instance while leaving
the same member function intact). Thanks in advance.
|
by: =?Utf-8?B?aGVyYmVydA==?= |
last post by:
What are the different features (in VB.NET) between a) Custom Events and b)
Multicast Delegates to raise events?
On the bottom line my class ad a) manages a list of handlers or ad b)
obtains a list of handlers (using GetInvocationList) and invokes them
one-by-one. So where is the difference?
eg are Custom Events the only way to raise an event asynchronously?
thanks herbert
|
by: damiensawyer |
last post by:
Hi,
Can someone please explain to me something about delegates?
My understanding is as follows. A delegate is basically an object that
can hold a reference to a "method" somewhere. That is, it's
essentially a pointer to a piece of code somewhere else in memory.
It therefore (to me anyway) makes sense to define delegates with their
signatures and be able to use those signatures at different points in
|
by: raylopez99 |
last post by:
Hello all—
I’m trying to get the below to work and cannot get the format right.
It’s from this example: http://msdn.microsoft.com/en-us/library/8627sbea(VS.71).aspx
What it is: I’m trying to store multicast delegates in a hash table,
and then fire the delegates one of two ways (after registering/
creating the delegates, etc).
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed.
This is as boiled down as I can make it.
Here is my compilation command:
g++-12 -std=c++20 -Wnarrowing bit_field.cpp
Here is the code in...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth.
The Art of Business Website Design
Your website is...
|
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing, and deployment—without human intervention. Imagine an AI that can take a project description, break it down, write the code, debug it, and then launch it, all on its own....
Now, this would greatly impact the work of software developers. The idea...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules.
He will explain when you may want to use classes instead of User Defined Types (UDT). For example, to manage the data in unbound forms.
Adolph will...
|
by: TSSRALBI |
last post by:
Hello
I'm a network technician in training and I need your help.
I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs.
The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols.
I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
|
by: 6302768590 |
last post by:
Hai team
i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
|
by: muto222 |
last post by:
How can i add a mobile payment intergratation into php mysql website.
|
|
by: bsmnconsultancy |
last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...
|