|
imho, an excellent article, by one of .NET's true guru-of-gurus. Well worthy of "insider news" release, and fervent discussion by our loquacious community.
I must dare disagree with my esteemed colleague, Marc, and assert, au contraire, that Properties are really a meta-construct ... a higher-level abstraction ... of Fields; 'getter and 'setter methods are virtual utilities nicely abstracted out of the picture for us if we use the automatic property declarations, as is the hidden virtual "private backing field."
In classic OOP: Properties (usually) nicely model the attributes of Objects; Methods more commonly model behavior.
“I speak in a poem of the ancient food of heroes: humiliation, unhappiness, discord. Those things are given to us to transform, so that we may make from the miserable circumstances of our lives things that are eternal, or aspire to be so.” Jorge Luis Borges
modified 21-May-14 0:17am.
|
|
|
|
|
|
Kent Sharkey wrote: When should I write a property?
Never. If something is a method it should look like a method, not like an assignment.
|
|
|
|
|
A security study drawing data from more than 1,600 networks over a six-month period found that 97 percent of the networks experienced some form of breach—despite the use of multiple layers of network and computer security software. So, don't bother.
|
|
|
|
|
The other 3% are the hackers.
|
|
|
|
|
While all the rumors suggested Microsoft was going to announce a teeny-tiny Surface RT today, but instead we got a big (and promising) Surface Pro 3. What happened to the mini? According to a report by Bloomberg it was a thing, and then Microsoft nixed it. No, they shipped it. It's just reeeeeeeealy small.
|
|
|
|
|
But of course! It collapsed after Win 8 installation!
I'm not questioning your powers of observation; I'm merely remarking upon the paradox of asking a masked man who he is. (V)
|
|
|
|
|
The Angler exploit kit favors Silverlight and Flash exploits over Java, researchers from Cisco said. See, you can still develop in Silverlight
|
|
|
|
|
A feature long in coming greatly reduces boilerplate code. All the other kids were doing it!
|
|
|
|
|
Unfortunately, the way they were designed is lame, ugly and confusing. The times I "brilliantly" though lambas would be a great solution, they weren't. I would also have preferred anonymous methods like C#.
|
|
|
|
|
Nobody's perfect -- especially computer security professionals. Fortunately, there's a pattern to the mistakes. Here are some of the most common ones to watch for. Bonus #7: Letting the users on the system
|
|
|
|
|
OT - There is any reason, that the links from Infoword are to the printable version of the article?
I'm not questioning your powers of observation; I'm merely remarking upon the paradox of asking a masked man who he is. (V)
|
|
|
|
|
I got into that habit as I hate the people that spread one article across multiple pages to boost their page count. The print view is the closest I could find to a suitable replacement.
TTFN - Kent
|
|
|
|
|
Kent Sharkey wrote: I hate the people I see... Do not read my articles
I'm not questioning your powers of observation; I'm merely remarking upon the paradox of asking a masked man who he is. (V)
|
|
|
|
|
They look perfectly cromulent to me.
TTFN - Kent
|
|
|
|
|
Would that be because you don't mind Code Project boosting their page count perchance?
"If you don't fail at least 90 percent of the time, you're not aiming high enough."
Alan Kay.
|
|
|
|
|
Quote: 3. Miseducating end users Hey! End user is protected from any kind of education!
I'm not questioning your powers of observation; I'm merely remarking upon the paradox of asking a masked man who he is. (V)
|
|
|
|
|
Compile and Execute your favorite programming languages online, click any of the following to proceed! Well, that's it. I don't need VS anymore.
|
|
|
|
|
Wow, that's ballsy.
I thought running code you don't know and don't trust from an source you don't trust was just begging for a disaster to happen!
Who knew?
|
|
|
|
|
Dave Kreskowiak wrote: I thought running code you don't know and don't trust from an source you don't trust was just begging for a disaster to happen!
The code is running on the server not on your machine
|
|
|
|
|
Oh, well, that's alright then.
You'll never get very far if all you do is follow instructions.
|
|
|
|
|
Yeah, I know. Say goodbye to your server if you're the one running the site!
|
|
|
|
|
It's a virtual machine...I just wrote a infinite loop to write a file and it crashed, but not the server only the virtual machine for me
I'm not questioning your powers of observation; I'm merely remarking upon the paradox of asking a masked man who he is. (V)
|
|
|
|
|
Any bets on how long it takes for someone to find a security flaw that allows them access to the host?
|
|
|
|
|
5 minutes?
I'm not questioning your powers of observation; I'm merely remarking upon the paradox of asking a masked man who he is. (V)
|
|
|
|