Thursday, April 27, 2006

\\\\ + c# + regexp >> \

Persze nyilvanvalo, mint ahogy itt le is van irva, de azert idemasolom nehogy megint elfelejtsem:

In literal C# strings, as well as in C++ and many other .NET languages, the backslash is an escape character. The literal string “\\” is a single backslash. In regular expressions, the backslash is also an escape character. The regular expression \\ matches a single backslash. This regular expression as a C# string, becomes “\\\\”. That’s right: 4 backslashes to match a single one.

Wednesday, January 25, 2006

helyesirasi teszt

Schrodingeren keresztul talaltam meg a tesztet, amin nagyon leszerepeltem.

Az meg a kommentekbol derult ki, hogy ez a konyv kell.

Tuesday, January 24, 2006

Firefox 1.5-ben html height-ja fejbe vagja a body background-position-jet

A Firefox 1.5-ben ha a html height attributuma be van allitva, akkor az fejbe vagja a body background-position-jet. Itt van egy pelda html, amit ha IE-bol vagy vagy 1.5-nel regebbi Firefox-bol nezunk, akkor a kep az oldal jobb also sarkaban van es le kell tekernunk hozza. Ha ugyanezt Firefox 1.5-bol nezzuk, akkor a kep az oldal lathato reszenek a jobb also sarkaban van, akarhova is tekergetunk. (Ha a height attributumot 100%-rol 50%-ra valtoztatjuk, akkor meg a lathato resz jobb oldalanak kozepen.)

Mit ir errol a w3c:
"If a background image has been specified, the value of 'background-position' specifies its initial position." ... "A value pair of '100% 100%' places the lower right corner of the image in the lower right corner of the element." es "'bottom right' and 'right bottom' mean the same as '100% 100%'" Az element pedig itt a body. Ebbol nekem ugy tunik hogy az 1.5-os viselkedik hibasan es nem a tobbiek.

Tehat a pelda:

<html>
<head>
<style type="text/css">
html {height: 100%}
body {
background-image: url(http://www.google.com/images/logo.gif);
background-position: bottom right;
background-repeat: no-repeat;
}
</style>
</head>

<body>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
<h1>Hello</h1>
</body>
</html>

Friday, January 13, 2006

Paul Graham: Never make users register

Itt van a teljes iras, de a lenyeg:

At Y Combinator we advise all the startups we fund never to lord it over users. Never make users register, unless you need to in order to store something for them. If you do make users register, never make them wait for a confirmation link in an email; in fact, don't even ask for their email address unless you need it for some reason. Don't ask them any unnecessary questions. Never send them email unless they explicitly ask for it. Never frame pages you link to, or open them in new windows. If you have a free version and a pay version, don't make the free version too restricted. And if you find yourself asking "should we allow users to do x?" just answer "yes" whenever you

Thursday, January 12, 2006

amikor csak akarja, ameddig csak akarja

Tegnap ezt kaptam a google helyett indulasnal:


Az telefonszamot felhivva pedig ezt hallottam: "A hivott szamon elofizeto illetve szolgaltatas nem kapcsolhato."

Wednesday, December 07, 2005

[bball] Kevin Pelton a Pick-and-Roll-rol

Itt van az egesz, de a lenyeg:

Basically, there are four main ways NBA teams defend the pick-and-roll:

Switch it - The players defending the ballhandler and the picker switch, usually creating a mismatch. Barkley and Smith do not believe this is a successful defense (at least against Nash and the Suns).

Trap - Both defenders go towards the ballhandler and aggressively trap him while the other three defenders zone against the four remaining offensive players.

"Show" or "Hedge" - The player defending the picker briefly steps out into the ballhandler's path, slowing him up enough that the player defending the ballhandler has time to recover. Then the player defending the picker recovers to his original man. It's worth noting that this is how the Spurs usually defend the pick-and-roll.

Go under the pick - Done only against weak shooters, the player defending the picker steps back to allow the player defending the ballhandler to go between him and the screen and get to his man. This leaves an open jumpshot for the ballhandler.

There are also two main locations for pick-and-rolls -- at the top of the key and at the elbow (the free-throw line extended to approximately where it would intersect the 3-point line).

Thursday, October 27, 2005

Position Is Everything - CSS bugs in modern browsers

We're Big John and Holly Bergevin, and together we built this site to explain some obtuse CSS bugs in modern browsers, provide demo examples of interesting CSS behaviors, and show how to "make it work" without using tables for layout purposes.

5 css tutorial

A css.maxdesign.com.au oldalon ez az 5 css tutorial olvashato:

Listamatic - one list, many options: Can you take a simple list and use CSS to create radically different list options? The Listamatic shows the power of CSS when applied to a simple list.

Listamatic 2 - nested list options: Well, you asked for them. Nested lists! Choose from one of the growing number of samples or submit a list of your own.

Listutorial - tutorial on CSS based lists: Step by step tutorials on using CSS to create background image lists, rollover lists, nested lists and horizontal lists.

Floattutorial - tutorial on CSS floats: Step by step tutorials on using CSS to create floating images, images with captions, next and back buttons, drop caps, inline lists and more.

Selecttutorial - CSS selectors: The structure of rules, the document tree, types of selectors and their uses. Plus a step by step tutorial using selectors to build a 3-column layout.

Thursday, October 20, 2005

MIME Encapsulation of Aggregate Documents, such as HTML (MHTML)

HTML [RFC 1866] defines a powerful means of specifying multimedia documents. These multimedia documents consist of a text/html root resource (object) and other subsidiary resources (image, video clip, applet, etc. objects) referenced by Uniform Resource Identifiers (URIs) within the text/html root resource. When an HTML multimedia document is retrieved by a browser, each of these component resources is individually retrieved in real time from a location, and using a protocol, specified by each URI.

In order to transfer a complete HTML multimedia document in a single e-mail message, it is necessary to: a) aggregate a text/html root resource and all of the subsidiary resources it references into a single composite message structure, and b) define a means by which URIs in the text/html root can reference subsidiary resources within that composite message structure.

This document a) defines the use of a MIME multipart/related structure to aggregate a text/html root resource and the subsidiary resources it references, and b) specifies a MIME content-header (Content-Location) that allow URIs in a multipart/related text/html root body part to reference subsidiary resources in other body parts of the same multipart/related structure.

Sunday, October 09, 2005

Treehouse pdf magazin ingyenes elso szam

A Particletree oldalarol letoltheto az elso (ingyenes) szam.

Tartalom:
Code:
- Jeremy Keith: A Brief History of Javascript
- Shaun Inman Interview
- DOM Scripting (Book Review)
- Code Links

Design:
- John Zeratsky: Inheriting Expectations
- Jason Santa Maria Interview
- Bulletproof Web Design (Book Review)
- Design Links

Friday, October 07, 2005

Typetester - Compare fonts for the screen

What is Typetester?

The Typetester is an online application for comparison of the fonts for the screen. Its’ primary role is to make web designer’s life easier. As the new fonts are bundled into operating systems, the list of the common fonts will be updated.
Technical details

Scott Herron: The many names of @ [zavinac, apestaartje, klammeraffe, shabloo, chiocciola, ...]

All over the world, people are logging on the 'net in countries that never heard of "eggs @ $1.50 a dozen," and whose keyboards never had such a key before. Find out how they are coping here.

Tuesday, October 04, 2005

K. Scott Allen: If All Movies Ever Made Were Really About Software...

Itt van az eredeti, de azert bemasolom:

A Few Good Objects
Col. Jessup: You want destructors?
Kaffe: I think I’m entitled.
Col. Jessup: You want destructors?
Kaffe: I want deterministic finalization.
Col Jessup: You can’t handle deterministic finalization!

Pulp Compilers
Vincent: You know what they call a switch statement in VB?
Jules: They don’t call it a switch statement?
Vincent: No man, this is the same language that has an AndAlso operator.
Jules: Then what do they call it?
Vincent: They call it a Select Case.

Full Metal Packet
Gunnery Sargent Hartman: My orders are to weed out all non-hackers who do not pack the chops to serve on my beloved accounting package software project. Do you maggots understand that?

Star Warez
[R2-D2 and Chewbacca are pair programming aboard the Millennium Falcon]
Chewbacca: Wurgleaaaaaaaghooooo!
C-3PO: It’s legal syntax. Screaming about it won’t help you.
Han Solo: Delete it. It’s not wise to upset a wookie.
C-3PO: But sir, nobody worries about upsetting a droid.
Han Solo: That’s because droids don’t pull people’s arms out of their sockets over bad code. Wookies are known to do that.
Chewbacca: Rrrrroo.
C-3PO: I see your point, sir. I suggest a new strategy , R2. Let the wookie take the keyboard.

Lord Of The Token Rings
Aragorn: Are you frightened?
Frodo: Yes.
Aragorn: Not nearly frightened enough. I know your bug count.

Null Terminator 2
Terminator: I need your source code, your compiler, and your static code analysis tools.
Biker: You forgot to say please…

Bridge Pattern Over The River Kwai
Colnel Saito: Do not speak to me of rules! This is software programming! This is not a game of cricket!

2001: The Speech Recognition Odyssey
Dave: Open the pod bay doors, HAL.
HAL: What did you say about Bombay, Dave?
Dave: I said open the pod bay doors, HAL.
HAL: I don’t know anyone named Doris, Dave.
Dave: Give me a freakin’ keyboard!

Sunday, August 28, 2005

Saturday, August 27, 2005

Szomszedos szamok kihuzasanak valoszinusege

A MathForge-on van egy hir Konstantinos Drakakis irasarol, amiben leirja hogyan lehet kiszamolni annak a valoszinuseget, hogy m szambol n-et kihuzva lesz koztuk 2 szomszedos.
Az elso megoldas szerint: p(n,m)=1-[C(n-m+1, m)]/[C(n,m)], ahol C(n,m) n elem m-edosztalyu kombinacioja, azaz n!/((m!*(n-m)!)

Az otoslottonal ezek szerint annak az eselye, hogy szomszedos szamokat is kihuznak 21%, a hatoslottonal 53%.
A szerencsejatek rt. oldalan talalhato tobbeves statisztikat megvizsgalva az jott ki, hogy valoban az otoslottonal az elmult 2529 huzasbol 572-szer szerepeltek szomszedos szamok, ami 23%. A hatoslottonal 694 huzasbol 381-szer fordult elo, ami 55%.

Mivel itt eleg nagy szamok faktorialisait kene kiszamolni nem maradhat el az egyszerusites, aminel pedig ezt kapjuk:
p(n,m) = 1 - [(k-1)*(k-2)*...(k-m+1)]/[n*(n-1)*...*(k+1)], ahol k=n-m+1
peldaul:
p(90,5) = 1 - [82*83*84*85]/[87*88*89*90]
p(45,6) = 1 - [35*36*37*38*39]/[41*42*43*44*45]

Friday, August 26, 2005

Wednesday, August 10, 2005

Atsushi Eno: the "true" Checklists: XML Performance

While I knew that there are some documents named "Patterns and Practices" from Microsoft, I didn't know that there is a section for XML Performance. Sadly, I was scarcely satisfied by that document. The checklist is so insufficient, and some of them are missing the points (and some are even worse for performance). So here I put the "true" checklists to save misinformed .NET XML developers.

Friday, July 29, 2005

ECMA

Ecma International is an industry association founded in 1961 and dedicated to the standardization of Information and Communication Technology (ICT) and Consumer Electronics (CE).

Itt van az lista

nehany pelda:
ECMA-334 C# Language Specification, 3rd edition (June 2005) [pdf]

ECMA-335 Common Language Infrastructure (CLI), 3rd edition (June 2005) [pdf]

ECMA-367 Eiffel analysis, design and programming Language (June 2005) [pdf]

Sunday, July 24, 2005

The Puzzlet Page

Enjoy mental workouts?
Use maths occasionally?
Like numerical brainteasers?
Revel in intellectual challenges?
Dabble in computer programming?

Answer "yes" to any of the above, and you've come to the right place!

What is a Puzzlet?

A mathematical problem which will almost always require the use of a simple computer program to solve.

You will need at least a rudimentary knowledge of maths to solve it, and occasionally more. You can use this skill to understand the problem, derive a formula to resolve it if necessary, and define the range within which the answer should fall.

At this stage, you will usually be unable to derive an exact answer, and will have to resort to a simple computer program to go further. You'll have to develop an algorithm, write the code, debug it, and get it to run.

Finally, you need to test your answer for accuracy and completeness. Many Puzzlets have several answers, and part of the challenge is to be sure you've found them all. That, then, is the complete Puzzlet experience!

Itt van peldaul a 151-es:
Look at the prime number 3137. If one digit at a time is deleted, we generate the "sub-numbers" 137, 337, 317, 313. All four new of the sub-numbers are also prime,or sub-primes. Are there any more 4-digit primes which behave in exactly the same way?

Friday, July 22, 2005

Paul J. Leach: UUIDs and GUIDs (February 4, 1998)

This specification defines the format of UUIDs (Universally Unique IDentifier), also known as GUIDs (Globally Unique IDentifier).

Raymond Chen: Computing the size of a directory is more than just adding file sizes

One might think that computing the size of a directory would be a simple matter of adding up the sizes of all the files in it.

Oh if it were only that simple.

There are many things that make computing the size of a directory difficult, some of which even throw into doubt the even existence of the concept "size of a directory".

Itt van a listaja.

Tuesday, July 19, 2005

Scott Mitchell: What Are .NET Web Services?

Itt van a ppt file es itt a blog bejegyezese.

This talk will examine the fundamentals of Web services from a beginner's perspective, focusing on the goals of Web services and common uses of Web services in industry today. It Includes a high-level look at the core Web service standards, along with live demos illustrating how to create a Web service and client application using Visual Studio .NET.

Windows File System Tunneling

Windows NT Contains File System Tunneling Capabilities:

When a name is removed from a directory (rename or delete), its short/long name pair and creation time are saved in a cache, keyed by the name that was removed. When a name is added to a directory (rename or create), the cache is searched to see if there is information to restore. The cache is effective per instance of a directory. If a directory is deleted, the cache for it is removed.

These paired operations can cause tunneling on "name".
- delete(name)/create(name)
- delete(name)/rename(source, name)
- rename(name, newname)/create(name)
- rename(name, newname)/rename(source, name)

The idea is to mimic the behavior MS-DOS programs expect when they use the safe save method. They copy the modified data to a temporary file, delete the original and rename the temporary to the original. This should seem to be the original file when complete. Windows performs tunneling on both FAT and NTFS file systems to ensure long/short file names are retained when 16-bit applications perform this safe save operation.
...
Tunneling cache time can be adjusted from the default time of 15 seconds, or if tunneling capabilities are undesirable, it can be disabled by adding a value in the Windows Registry.

A fenti cikk innen van:
Raymond Chen: The apocryphal history of file system tunnelling

O ezt irja meg:

As another example of the importance of tunneling, consider that file "File with long name.txt", whose short name is say "FILEWI~1.TXT". You load this file into a program that is not long-filename-aware and save it. It deletes the old "FILEWI~1.TXT" and creates a new one with the same name. Without tunnelling, the associated long name of the file would be lost. Instead of a friendly long name, the file name got corrupted into this thing with squiggly marks. Not good.

Illetve leirja, hogy a tunneling kifejezes a quantum mechanikabol lett atveve.

Monday, July 18, 2005

Andrew D. Birrell: An Introduction to Programming with C# Threads

Itt van a pdf (41 oldal).

CONTENTS
1. Introduction
2. Why use concurrency?
3. The design of a thread facility
4. Using Locks: accessing shared data
5. Using Wait and Pulse: scheduling shared resources
6. Using Threads: working in parallel
7. Using Interrupt: diverting the flow of control
8. Additional techniques
9. Advanced C# Features
10. Building your program
11. Concluding remarks

Wednesday, July 13, 2005

hpirate - konyvek magyarul

Van itt egy halom konyv, de nem tunik tul legalisnak.

Saturday, July 09, 2005

Mérő László: A játékelmélet és a racionalitás pszichológiája (Élet és Tudomány - Sulinet)

Amikor egy hosszú sorozat végére pontot tesz a szerkesztő, természetesen egy kicsit büszke: a lap történelme ismét gazdagabb lett egy fejezettel. De némi szomorúságot is érez, még ha közben a mindenki másképp egyforma könyv alakban is megjelent, s olvasónknak igy bőségesen módjában áll kalandozni a játékelmélet és a racionalitás pszichológiája világában. Mérő László lapunkban nem művének zanzáját közölte, hanem alkalmasan kiválasztott részleteiből egy önálló ívet épített.

1. A Dollárárverés ördögi spirálja
2. A pózolás
3. Marsbéli etikák
4. A főszereplő megjelenik
5. A fogoly dilemmája
6. A közlegelők problémája
7. Fogolydilemmák az életben
8. Az aranyszabály és a szeretet csapdái
9. „Az értelemig és tovább...”
10. Jobb ma egy veréb?
11. Kollektív racionalitás
12. Nem mind fénylik, ami arany
13. Sok út vezet a nirvánába

Wednesday, July 06, 2005

[ingyen konyv] Andrew Troelsen: COM and .NET Interoperability

Apress Publishing has provided TheServerSide.NET with COM and .NET Interoperability for free download.

"COM and .NET Interoperability" covers working with COM components in .NET and .NET components in COM from basic topics like Runtime Callable Wrappers to advanced topics such as manual marshaling of data types between .NET and COM. This book is available in its entirety as a download to registered TSS.NET readers.


Download the FREE Book

Contents:

Chapter 1 Understanding Platform Invocation Services
Chapter 2 The Anatomy of a COM Server
Chapter 3 A Primer on COM Programming Frameworks
Chapter 4 COM Type Information
Chapter 5 The Anatomy of a .NET Server
Chapter 6 .NET Types
Chapter 7 .NET-to-COM Interoperability — The Basics
Chapter 8 .NET-to-COM Interoperability — Intermediate Topics
Chapter 9 .NET-to-COM Interoperability — Advanced Topics
Chapter 10 COM-to-.NET Interoperability — The Basics
Chapter 11 COM-to-.NET Interoperability — Intermediate Topics
Chapter 12 COM-to-.NET Interoperability — Advanced Topics
Chapter 13 Building Serviced Components (COM+ Interop)