Hi,
In short, could you encounter a deadlock whilst accessing a Dictionary
object in a thread-unsafe manner ?
Consider a class containing a Dictionary and a method to add to the
Dictionary. Assume 2 threads call Add( )
public class SomeClass
{
Yes, you could encounter a deadlock during threads writing un-synchronised
to a dictionary.
Not necessarily what happened in your case, but as an example imagine a
linked list having its links modified incorrectly, you could end up with 2
links pointing to each other with .Next never
Hi Mitch,
In my specific example are linked lists used? (curious on implementation)
Wal
From: ozdotnet-boun...@ozdotnet.com [mailto:ozdotnet-boun...@ozdotnet.com]
On Behalf Of Mitch Wheat
Sent: Thursday, 3 June 2010 10:24 PM
To: 'ozDotNet'
Subject: RE: Dictionary thread-safe-ness
It's a hashtable, and it uses an array of linked lists
From: ozdotnet-boun...@ozdotnet.com [mailto:ozdotnet-boun...@ozdotnet.com]
On Behalf Of Wallace Turner
Sent: Thursday, 3 June 2010 8:26 PM
To: 'ozDotNet'
Subject: RE: Dictionary thread-safe-ness
Hi Mitch,
In my specific example are
http://www.babelfor.net
*Protect software components realized with Microsoft .NET Framework in order
to protect intellectual property and makes reverse engineering difficult.*
* *
*Supports .NET Framework 4.0 and Visual Studio 2010*
I have never used it, just saved the link for a rainy day :)
Eazfuscator is OKaccording to the reverse-engineering forums pretty much
all the .NET obfuscators can be broken, but they seemed to rate
SmartAssembly (not free) the highest.
Joseph
On Fri, Jun 4, 2010 at 12:53 AM, .net noobie dotnetnoo...@gmail.com wrote:
http://www.babelfor.net
Interesting position. Your situation is obviously different to ours, but
when we write code for clients we always hand over the source code either at
the end of the job, or upon request. This is understood from the start. I
can't imagine doing it any other way.
On 3 June 2010 20:11, Anthony
Hi Anthony,
Please forgive my ignorance but my question is what is normal
practice? What is meant by work? When quoting hourly rate, I assume
that at the end they would get everything and since I have been paid
for the time to produce it, it belongs to them.
Kind Regards
Arjang
On 3 June 2010
We use Smart Assembly and it seems to work pretty well, haven't run into any
problems so far.
Also now that Red Gate have acquired both Reflector and Smart Assembly
they're in a unique position in the obfuscation market.
Paul.
From: ozdotnet-boun...@ozdotnet.com
Hi Folks,
ADWS (Active Directory Web Services) is available in 2008 R2.
I am wondering whether it can be used as a means to interrogate/update AD
from a .Net application (i.e. by adding a web reference to the service)?
I can't find any examples of using it other than with Powershell.
Cheers,
Thank you Dylan,
Simon, I don't understand the code for the work done for a specific
customer(s), can be a gold mine. I am not sure what owning the code
means, anyone and everyone (competent programmer) can reproduce the
same effect with some variation.
Kind Regards
Arjang
On 4 June 2010
On 4 June 2010 09:18, Arjang Assadi arjang.ass...@gmail.com wrote:
Thank you Dylan,
Simon, I don't understand the code for the work done for a specific
customer(s), can be a gold mine. I am not sure what owning the code
means, anyone and everyone (competent programmer) can reproduce the
Hi Iain,
Curious what you are classing as exorbitant. Are we talking $200?
On Fri, Jun 4, 2010 at 10:07 AM, Iain Carlin cut...@gmail.com wrote:
On 4 June 2010 09:18, Arjang Assadi arjang.ass...@gmail.com wrote:
Thank you Dylan,
Simon, I don't understand the code for the work done for a
Yes, it's around the $200 per hour.
I guess it's all relative. I know that, given the source code, I could make
the changes just as quickly as the contractor.
My hourly rate is nothing like the $ he charges, and we wouldn't have to
wait for his availablility to make the changes. So in terms of
Also now that Red Gate have acquired both Reflector and Smart Assembly
they’re in a unique position in the obfuscation market.
It's fair to say they have both ends of the market covered.
Craig.
Different approach,
Don't obfuscate your code, give them the entire source code.
Then attach a restrictive usage license.
Then hope that they ignore the license and intergrate your code into their
critical systems.
Then audit their site a few years on, determine if your license has been
breached
I don't know if you can do that already, though my guess is you could
probably write a Visual Studio add in to parse the content in the output
window.
A quick search finds these links:
- How to: Create an addin -
http://msdn.microsoft.com/en-us/library/80493a3w%28VS.80%29.aspx
- How to: Control
Can't you just double-click on the error in the output window to go to the
class?
Or am I missing something obvious...
Dylan.
From: ozdotnet-boun...@ozdotnet.com [mailto:ozdotnet-boun...@ozdotnet.com] On
Behalf Of William Luu
Sent: Friday, 4 June 2010 11:52
It can parse the output. Put it in the same format as what the compiler splits
out. It won't parse Exception stacks though.
From: ozdotnet-boun...@ozdotnet.com [mailto:ozdotnet-boun...@ozdotnet.com] On
Behalf Of Wallace Turner
Sent: Thursday, June 03, 2010 5:16 AM
To: 'ozDotNet'
Subject: Visual
Where can i post a job requirement for students..is there a student bulletin
board or similar or do i just contact a RMNIT etc?
http://www.intellixperience.com/signup.aspx Is your website being
IntelliXperienced?
regards
Anthony (*12QWERNB*)
Is your website being IntelliXperienced?
I'd get in contact with Andrew Parsons
http://blogs.msdn.com/b/andrewparsons/ as he's the Academic DPE guy in
Australia. Plus he was looking a while back to connect students with
workplaces.
On Fri, Jun 4, 2010 at 10:09 AM, Anthony asale...@tpg.com.au wrote:
Where can i post a job requirement
On 4 June 2010 11:19, Jason Finch jason.fi...@gmail.com wrote:
Different approach,
Don't obfuscate your code, give them the entire source code.
Then attach a restrictive usage license.
Then hope that they ignore the license and intergrate your code into their
critical systems.
Then audit
genius! :)
On 4 June 2010 11:19, Jason Finch jason.fi...@gmail.com wrote:
Different approach,
Don't obfuscate your code, give them the entire source code.
Then attach a restrictive usage license.
Then hope that they ignore the license and intergrate your code into their
critical systems.
Well, I specifically didn't mention Contractors, as this is generally a work
for hire situation, but it can be a grey area.
It seems one of the delineating issues (apart from whatever may be written into
your contract) is whether you use your client's tools and equipment, or whether
you work
Well i treat software like a car. When you buy a car they don't give you
the blueprints...
Client always gets what they pay for..which is usually a function piece of
software(code not always included) that helps them run their business...
-Original Message-
From:
On Fri, Jun 4, 2010 at 1:25 PM, Anthony asale...@tpg.com.au wrote:
Well i treat software like a car. When you buy a car they don't give you
the blueprints...
That is true for software too - sometimes. A car is one of thousands of
identical vehicles on sale. Each purchaser owns the car but
If I buy a car that was built by a couple of guys at the local garage I'd
like to know I could take it to a different mechanic when they go out of
business or raise their prices.
On Fri, Jun 4, 2010 at 11:25 AM, Anthony asale...@tpg.com.au wrote:
Well i treat software like a car. When you buy
Which is where escrow agreements come in in the software world.
In my previous job as a contractor, we had an escrow agreement with our
customers. Source code was held in escrow by a third party. If we went out
of business they handed over the source.
That protected both the customer and the
Thanks.
Dylan, I look at the Error Window to navigate to compile errors (hitherto I
didn't realise you could click on warnings/errors in the output window)
From: ozdotnet-boun...@ozdotnet.com [mailto:ozdotnet-boun...@ozdotnet.com]
On Behalf Of David Kean
Sent: Friday, 4 June 2010 11:55 AM
On 4 June 2010 13:47, Iain Carlin cut...@gmail.com wrote:
Which is where escrow agreements come in in the software world.
In my previous job as a contractor, we had an escrow agreement with our
customers. Source code was held in escrow by a third party. If we went out
of business they handed
On 4 June 2010 14:37, Dylan Tusler
dylan.tus...@sunshinecoast.qld.gov.au wrote:
Dylan, I look at the Error Window to navigate to compile errors (hitherto I
didn’t realise you could click on warnings/errors in the output window)
Naturally, I don't get any warnings or errors in my output window,
31 matches
Mail list logo