Jaa


CacheManagerSetting Members

Include Protected Members
Include Inherited Members

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.

The CacheManagerSetting type exposes the following members.

Methods

  Name Description
Public method Equals (Inherited from Object.)
Protected method Finalize (Inherited from Object.)
Public method GetHashCode (Inherited from Object.)
Public method GetType (Inherited from Object.)
Protected method MemberwiseClone (Inherited from Object.)
Public method ToString (Inherited from Object.)

Properties

  Name Description
Public property ApplicationName
Gets the name of the application to which the ConfigurationSetting instance represents configuration information.
(Inherited from ConfigurationSetting.)
Public property CacheStorage
Gets the name of the cache storage for the represented configuration object.
Public property ExpirationPollFrequencyInSeconds
Gets the expiration poll frequency for the represented configuration object.
Public property MaximumElementsInCacheBeforeScavenging
Gets the maximum number of elements in cache before scavenging for the represented configuration object.
Public property Name
Gets the name that identifies the represented configuration information.
(Inherited from NamedConfigurationSetting.)
Public property NumberToRemoveWhenScavenging
Gets the number of elements to remove when scavenging for the represented configuration object.
Public property SectionName
Gets the name of the section where the ConfigurationSetting instance represented configuration information resides.
(Inherited from ConfigurationSetting.)

See Also

CacheManagerSetting Class

Microsoft.Practices.EnterpriseLibrary.Caching.Configuration.Manageability Namespace

Retired Content

This content is outdated and is no longer being maintained. It is provided as a courtesy for individuals who are still using these technologies. This page may contain URLs that were valid when originally published, but now link to sites or pages that no longer exist.