Best Practices for Using Service Controller for Entity Framework Database
I'm running into an issue in my first time creating a Web Service with a .NET backend with Azure. I designed a database in Entity Framework and had it create the models, but I couldn't create a controller for the table unless I made the model inherit from
EntityData. Here's the catch, the Database Model has int Id, but EntityData has string Id, so, of course, I'm getting errors. What is best practice for what I'm trying to do?
Michael DiLeo
hi Michael,
Thanks for you posting!
Sorry for I am not totally understanding your issue. Maybe two points need your confirm:
1. I confuse with the "Service controller"? IS your meaning MVC controller? Or ServiceController(http://www.codeproject.com/Articles/31688/Using-the-ServiceController-in-C-to-stop-and-start
2.whether The type of ID in the model is match to the database ? In other words, Is the type of IDin .edmx matched to the database?
By the way, it seems that this issue is more related to EF. You could post this issue on EF discussion for better support.
Thanks & Regards,
Will
We are trying to better understand customer views on social support experience, so your participation in this interview project would be greatly appreciated if you have time. Thanks for helping make community forums a great place.
Click
HERE to participate the survey.
Similar Messages
-
When I want to save data of the MBA13 on mountain lion (wireless) with time capsule, hois there any best practice to perform?
After that, assuming that data are back-up, can we easily differentiate data in time capsule belonging to MBP15/13 and MBA13?Unfortunately, Apple left off the Ethernet port....the most important port in networking....on the MBA, so your first backup of the entire Mac will need to be done using wireless.
That may take a day or two unless your MBA has a Thunderbolt port on it in which case you could add a Thunderbolt to Ethernet adapter and connect the MBA to the Time Capsule for the first backup using an Ethernet cable. It will probably only take 3-4 hours or less doing it this way.
Once you have the first complete backup done, other subsequent backups can be done using wireless since they will ony take a few minutes, on average.
Both Macs will backup to the Time Capsule using Time Machine automatically. Backups will be kept completely separate, so one Mac will normally only be able to "see" its own backups. -
Best Practices in use of ABAP for SRM and/or CRM Configuration
I was wondering if there is a document that defines best practices for the use of ABAP with the installation and customization of SRM and/or CRM. Such as amount of ABAP coding typically required, and best practices around the use of ABAP for customization and configuration.
Thanks.Hi, Johnson
Sorry, Please don't mind, you are not at right place to ask the Question like this
Please read "The Forum Rules of Engagement" before posting! HOT NEWS!!
Thanks and Regards,
Faisal -
What are the best practices to migrate VPN users for Inter forest mgration?
What are the best practices to migrate VPN users for Inter forest mgration?
It depends on a various factors. There is no "generic" solution or best practice recommendation. Which migration tool are you planning to use?
Quest (QMM) has a VPN migration solution/tool.
ADMT - you can develop your own service based solution if required. I believe it was mentioned in my blog post.
Santhosh Sivarajan | Houston, TX | www.sivarajan.com
ITIL,MCITP,MCTS,MCSE (W2K3/W2K/NT4),MCSA(W2K3/W2K/MSG),Network+,CCNA
Windows Server 2012 Book - Migrating from 2008 to Windows Server 2012
Blogs: Blogs
Twitter: Twitter
LinkedIn: LinkedIn
Facebook: Facebook
Microsoft Virtual Academy:
Microsoft Virtual Academy
This posting is provided AS IS with no warranties, and confers no rights. -
Best practice standard User Acess Test for WIN2012 AD
What is the Best practice standard User Acess Test for WIN2012 AD
Hello,
as before, add a computer to the domain and log on with a domain user account to the computer.
You should be able from the client machine to open the sharedfolders on the DCseither with:
\\DCName\sysvol
\\DCName\netlogonor \\NetBiosDomainName\sysvol
\\NetBiosDomainName\netlogon
Best regards
Meinolf Weber
MVP, MCP, MCTS
Microsoft MVP - Directory Services
My Blog: http://blogs.msmvps.com/MWeber
Disclaimer: This posting is provided AS IS with no warranties or guarantees and confers no rights.
Twitter: -
Quick question regarding best practice and dedicating NIC's for traffic seperation.
Hi all,
I have a quick question regarding best practice and dedicating NIC's for traffic seperation for FT, NFS, ISCSI, VM traffic etc. I get that its best practice to try and separate traffic where you can and especially for things like FT however I just wondered if there was a preferred method to achieving this. What I mean is ...
- Is it OK to have everything on one switch but set each respective portgroup to having a primary and failover NIC i.e FT, ISCSI and all the others failover (this would sort of give you a backup in situations where you have limited physical NICs.
- Or should I always aim to separate things entirely with their own respective NICs and their own respective switches?
During the VCAP exam for example (not knowing in advance how many physical NIC's will be available to me) how would I know which stuff I should segregate on its own separate switch? Is there some sort of ranking order of priority /importance? FT for example I would rather not stick on its own dedicated switch if I could only afford to give it a single NICs since this to me seems like a failover risk.I know the answer to this probably depends on however many physical NICs you have at your disposal however I wondered if there are any golden 100% rules for example FT must absolutely be on its own switch with its own NICs even at the expence of reduced resiliency should the absolute worst happen? Obviously I know its also best practice to seperate NICs by vender and hosts by chassis and switch etc
-
What is the best program to use on Mac for editing, cropping photos from my computer. Looking for a free program that is good.
If your needs are limited to those tasks then both Preview and iPhoto will fit the bill They are already on your Mac. There is a free download from Google called Picasa available here:
http://picasa.google.com/
It works much the in same manner as iPhoto. For some really heavy duty work there is GIMP available from SourceForge:
http://www.gimp.org/macintosh/ Also a free download.
Message was edited by: kennethfromtoronto -
Best practice to use MediaPlayer?
Is the best practice to use attributes of MediaPlayer (such as playing) or to request the PlayTrait and read its playState attribute?
(This question comes from a customer. Reposting here for the OSMF team to respond and for the benefit of the whole group.)
Sumner Paine
osmf product managerFor playback use cases, I'd recommend you stick with MediaPlayer, as it's simpler to use and manages all of the trait event registration.
-
Best practice when using Tangosol with an app server
Hi,
I'm wondering what is the best practice when using Tangosol with an app server (Websphere 6.1 in this case). I've been able to set it up using the resource adapter, tried using distributed transactions and it appears to work as expected - I've also been able to see cache data from another app server instance.
However, it appears that cache data vanishes after a while. I've not yet been able to put my finger on when, but garbage collection is a possibility I've come to suspect.
Data in the cache survives the removal of the EJB, but somewhere later down the line it appear to vanish. I'm not aware of any expiry settings for the cache that would explain this (to the best of my understanding the default is "no expiry"), so GC came to mind. Would this be the explanation?
If that would be the explanation, what would be a better way to keep the cache from being subject to GC - to have a "startup class" in the app server that holds on to the cache object, or would there be other ways? Currently the EJB calls getCacheAdapter, so I guess Bad Things may happen when the EJB is removed...
Best regards,
/PerHi Gene,
I found the configuration file embedded in coherence.jar. Am I supposed to replace it and re-package coherence.jar?
If I put it elsewhere (in the "classpath") - is there a way I can be sure that it has been found by Coherence (like a message in the standard output stream)? My experience with Websphere is that "classpath" is a rather ...vague concept, we use the J2CA adapter which most probably has a different class loader than the EAR that contains the EJB, and I would rather avoid to do a lot of trial/error corrections to a file just to find that it's not actually been used.
Anyway, at this stage my tests are still focused on distributed transactions/2PC/commit/rollback/recovery, and we're nowhere near 10,000 objects. As a matter of fact, we haven't had more than 1024 objects in these app servers. In the typical scenario where I've seen objects "fade away", there has been only one or two objects in the test data. And they both disappear...
Still confused,
/Per -
Best Practice regarding using and implementing the pref.txt file
Hi All,
I would like to start a post regarding what is Best Practice in using and implementing the pref.txt file. We have reached a stage where we are about to go live with Discoverer Viewer, and I am interested to know what others have encountered or done to with their pref.txt file and viewer look and feel..
Have any of you been able to add additional lines into the file, please share ;-)
Look forward to your replies.
LanceHi Lance
Wow, what a question and the simple answer is - it depends. It depends on whether you want to do the query predictor, whether you want to increase the timeouts for users and lists of values, whether you want to have the Plus available items and Selected items panes displayed by default, and so on.
Typically, most organizations go with the defaults with the exception that you might want to consider turning off the query predictor. That predictor is usually a pain in the neck and most companies turn it off, thus increasing query performance.
Do you have a copy of my Discoverer 10g Handbook? If so, take a look at pages 785 to 799 where I discuss in detail all of the preferences and their impact.
I hope this helps
Best wishes
Michael Armstrong-Smith
URL: http://learndiscoverer.com
Blog: http://learndiscoverer.blogspot.com -
Best Practice of using ERM (Role Expert) in Landscape
Hello,
Can anyone tell me what is the best practice (choice) of using ERM in the SAP landscape?
1. Creating a role in DEV system using ERM and using SAP standard transport process to transport role to QAS and PRD systems.
OR
2. Creating a role in all systems in ladscape (DEV, QAS and PRD).
Please share if you have any best practice implementation scenarios.
Appreciate for the help.
Thanks
Harry.Harry,
The best practice is to follow Option 1. You should never directly create a role in Prod system. This is what SAP recommends as well.
Alpesh -
Best practice to use PXE on 802.1X network ?
Hello,
We use Cisco ISE 1.2.0.899 on our network (we plan to upgrade to 1.3 in some months).
Our network includes Cisco models 2960S (and some 2960T) about wired and 2602I (with WISM2) about wireless.
We have to allow PXE boot on one (or many) VLAN.
Do you know what's the best practice to use PXE on a 802.1X network ?
Does ISE and/or Switch can recognize PXE request?
Do we have to use settings/rules into ISE or on Switch?
Does the easy way is to allow PXE on WebAuth VLAN?
Regards,
ChrisI am in a similar position.
We would prefer to keep all switch ports common, even those used for imaging from scratch.
For PXE as far as I can see we need to allow the port to quickly fail 802.1X and MAB to a remediation VLAN.
Using ISE we can apply an ACL that allows PXE bootp and dhcp requests and responses along with any other traffic we want in that network i.e. access to internet proxy server, anti-virus updates for posturing etc.
I haven't configured this yet so I'm not sure of what issues we'll face with timing. We currently use an auth pattern of 802.1X first, then MAB, then fail open to the static VLAN. With ISE 1.3 this is the supposed suggested method instead of a hard "closed" mode.
switchport access vlan XX
switchport mode access
network-policy VV
ip access-group ACL-ALLOW in
authentication event fail action next-method
authentication event server dead action reinitialize vlan XX
authentication event server dead action authorize voice
authentication host-mode multi-domain
authentication open
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
authentication periodic
authentication violation restrict
mab
dot1x pae authenticator
dot1x timeout tx-period 10 -
Best practice to use Tortoise SVN with LV
Can anyone recommend what is the best practice to use and structure the project using TSVN with LV? I have seen the jki tool and have also read about some issues of linkage when using TSVN with LV as posted on the forum here. I suppose these linkage issues still exists? Other than perforce is there any suggestion on source control that integrates well with LV?
TIA
CLD,CTDWe use Tortoise SVN with LV and it works very good. It's not integrated in that i cannot from within LV check in and out stuff, i have to do that in the Explorer. That's not a problem to me.
SVN is a very good source and version control regardless.
One small issue with external handling is if you want to change an already used and active filename. In LV you can save to another filename and references will update, but ofcourse SVN doesn't pick up on that automagically. There are two solutions to this:
1. When you check in, you'll get 1 added and 1 deleted file, select both, r-click and "Repair move".
2. After changing the filename in LV, change it back in explorer and r-click the file for a SVN rename and rename it to the new name.
/Y
LabVIEW 8.2 - 2014
"Only dead fish swim downstream" - "My life for Kudos!" - "Dumb people repeat old mistakes - smart ones create new ones."
G# - Free award winning reference based OOP for LV -
Best practices to use stored procedure
Just wondering about best practices of using Stored procedures in TOPLink with respect to Objects. Any thoughts on this?
I find the approach suggested at re:Coding for Stored Procedures is a lot of work! seems to be fine.
Is there any thoughts on converting results directly into Java objects?
MuraliI encountered the same problems.
See the topic I posted: Re: Mapping a Java attribute to the result of a function call
The solution I used is good, but has its restrictions.
I created a database view on the query that uses stored functions. Then, I mapped my object to the database view. Problem solved.
However, like I said, this solution has its restrictions:
1) Your database must support views
2) This only works for read-only queries
I hope this helps you any further.
Kind regards,
Erwin -
Best practices when making service requests
Best practices when making service requests
We've been working on moving our old services that were built with an different service request tool into RequestCenter and were wondering if anyone had any thoughts about best standards or practices for the new forms that they would be willing to share. For example, one such standard might be that the customer - initiator information will always be displayed at the top of the request.
Are there any other standardizations you could share that help lend consistency and provide improved readability for request forms? Maybe someone has a design framework guide they would be willing to share?
Thanks!
TimThanks for the comments and the book suggestion.
We've been placing the customer information at the top because wanted the customer to review the information before subbmitng the form. Our LDAP data is somewhat spotty and we want to make sure we have the right information when the form is submitted but I can see the advantages to placing it at the bottom as well. I'll have to think that over more.
Does anyone find tha certain fields work better than others? For example, we've not had much
Maybe you are looking for
-
My itunes wont let me purchase from my phone. idk why. i can download apps just fine. anyone know how to fix it?
-
I have an old Apple ID I have been trying to log in to retrieve permission for the songs I have bought for my iTunes. However due to it being an old ID, I have forgotten the password and from what I can remember, the email address I used for security
-
Is it possible to use USB webcam + USB mic simultaneously?
I would like to use a USB mic (Blue Snowball USB) and USB webcam (Ligoitch Quickcam) together simultaneously, because I understand the one is good sound and the other is good video for live internet broadcasting of music. can anyone tell me if this s
-
Displaying html 4 with css2 support in swing
is it possible to do (for free) jeditorpane doesnt do it properly
-
Adobe reader 5 with windows 7?
I'm told AR 5 is incompatible with windows 7 is there any fix?@