by: Hugh Sparks |
last post by:
If I configure and use two different fragment extractors on the
same XML document, how can I write xslt template match
patterns that distinguish which elements these fragments replaced?
Details:...
|
by: Richard L Rosenheim |
last post by:
Anyone care to express their two cents over pros and cons of encrypting the
data being transmitted (within the SOAP package) versus just utilizing a
HTTPS connection?
Richard Rosenheim
|
by: Zaffar |
last post by:
I am trying use UserNameToken with WSE2. There is always some error or other.
Like Actually the problem lies in Web.Config Settings. Does any one know all
the required settings for WSE2 and...
|
by: Chris Ashley |
last post by:
I am trying to log all the messages sent to/from my web services and
read somewhere that WSE2 would let me do this. I have just installed
this and added the following to my code:
...
|
by: Gustaf |
last post by:
My program is constructing a document from several fragments, which are
created on the fly using XSL transformations. I've managed to store the
output from each transformation (each fragment) in an...
|
by: David G |
last post by:
I have a web service originally written to use soap.tcp transport in WSE2
that now uses http transport under WSE3. The WSE2 method looked like
public IndividualLookupResponse...
|
by: Gauls |
last post by:
Hi I am new with web service security
Here is what i want to achieve
I want to use UsernameToken for Securing Usename and Password and later for ever call to the webservice i want to use the...
|
by: Lee Crabtree |
last post by:
When reading fragments, it seems like XmlReaders try to read too much. I'm
working on a file parser for a new file format, and I've run into a problem.
The format has an XML fragment for a header,...
|
by: =?Utf-8?B?TWFyaw==?= |
last post by:
Hi...
We've got a lot of places in our code where we read relatively small xml
user preference blocks. Currently that's creating a new XmlDocument in every
spot. I was thinking we might see...
|
by: BarryA |
last post by:
What are the essential steps and strategies outlined in the Data Structures and Algorithms (DSA) roadmap for aspiring data scientists? How can individuals effectively utilize this roadmap to progress...
|
by: nemocccc |
last post by:
hello, everyone, I want to develop a software for my android phone for daily needs, any suggestions?
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
|
by: tracyyun |
last post by:
Dear forum friends,
With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each...
|
by: agi2029 |
last post by:
Let's talk about the concept of autonomous AI software engineers and no-code agents. These AIs are designed to manage the entire lifecycle of a software development project—planning, coding, testing,...
|
by: isladogs |
last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM).
In this session, we are pleased to welcome a new...
|
by: conductexam |
last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and...
|