On Wed, Jan 14, 2009 at 1:22 AM, Quan Zongliang <quanzongliang@gmail.com> wrote:
>> Yeah - I don't think that one is too difficult. There's more to it
>> than you've shown of course - there's code to populate the lists and
>> to setup the columns to use them for example.
>
> I mean we should reduce redundant code, reuse existed code as possible.
> The hackers should cooperate when working on that functions with similar components.
Oh, of course. I certainly agree with that.
--
Dave Page
EnterpriseDB UK: http://www.enterprisedb.com