rproffitt 2,701 https://5calls.org Moderator

Is this Mint or Windows? Also, if you want the real deal, go get a French keyboard. It is different.
https://www.amazon.com/French-European-Language-Keyboard-Windows/dp/B0002JP05Y for example shows the AZERTY keyboard.

Doing this with just layouts would be annoying to most French. Look at that keyboard. It has the characters you were asking about.
There are also stickers for those that have a laptop.

There are also a lot of priors about adding and switching layouts. Example: https://stackoverflow.com/questions/22384513/how-does-one-add-keyboard-languages-and-switch-between-them-in-linux-mint-16

rproffitt 2,701 https://5calls.org Moderator

I think I see why. In program1 line 6 calls out an element "demo" and there is no such element.

Answer? "Bum code does nothing."

rproffitt 2,701 https://5calls.org Moderator

Just a thought. Microsoft has their API all over the map but looking at https://msdn.microsoft.com/en-us/library/system.xml.linq.xnode_methods(v=vs.110).aspx

I see the XNode.AddBeforeSelf Method (Object) method which looks interesting. That is, since no insert, maybe this to the first object?

rproffitt 2,701 https://5calls.org Moderator

I worry about deleting a thing before I move a thing. Since your oject lastNode is removed in line 4, I worry what line 5 would do.
Also check out the answer at https://stackoverflow.com/questions/2437158/whats-the-best-way-to-move-a-child-up-in-a-net-xmldocument where an insert method is used and remove is not used at all.

rproffitt 2,701 https://5calls.org Moderator

Why do you reference tab[14] in line 19?
I see you initialized the array tab[] in line 7 with 14 values but that only filled the tab[] array from tab[0] to tab[13].

Since tab[14] is not initialized, you can't be sure what will happen.

rproffitt 2,701 https://5calls.org Moderator

This area can upset folk. That is, if we break the VPN like this, it's not really a VPN but more of a proxy. That out of the way, some routers let you setup your LAN to VPN to where you wish. But breaking the VPN is well, another thing altogether.

To date I've kept the VPN true and don't accept such breakage to be acceptable and call it a VPN.

But as we see when reading priors at https://www.google.com/search?q=local+lan+access+when+using+VPN to break this (or some may calling fixing it) what you use for VPN matters as each system varies.

lilamls commented: nice +0
rproffitt 2,701 https://5calls.org Moderator

Nothing stood out in that log. Time to read priors and see how others solved this at https://www.google.com/search?q=printscreen+freezes+windows

rproffitt 2,701 https://5calls.org Moderator

That makes sense. I'm surprised Visual Studio didn't balk at using variables before they were declared.
(Dim is where such is declared in VB)

rproffitt 2,701 https://5calls.org Moderator

I thought a broblem is a problem with your bro?

But the only thing I think I see, and I'm not sure because I can't do the same in VB here, is that I always want to set the text AFTER I have created or moved my object.

Try that.

rproffitt 2,701 https://5calls.org Moderator

The last time I used a streaming plotter, yes, you can only feed it values along the y that match since the chart scrolls along and y must be same or the next value and then match until it's time for the chart to scroll. Nothing seems odd about that.

rproffitt 2,701 https://5calls.org Moderator

The reply below is about an exit and "To avoid the infinity loop simply use a WaitHandle. To let the process be exited from the outer world use a EventWaitHandle with a unique string. Below is an example."

If you simply had a loop, then CPU should go to 100%. Sticking Sleep() in that loop would only limit what amount of work the loop could dispatch. This is why we choose to go simple at first (get it done!) and later refine to event driven designs.

rproffitt 2,701 https://5calls.org Moderator

About 100% CPU use in a loop. That's not unusual at all. You do need to move to an event driven system to get rid of an infinite loop.

Example at https://stackoverflow.com/questions/7402146/cpu-friendly-infinite-loop

rproffitt 2,701 https://5calls.org Moderator

About replicate what IIS does. Think about the years IIS and other systems with hundreds of programmers have been working on this.

Now, for your first expedition I don't think it's bad to need more cores and RAM. You'll get better with time.

That is, you don't come in 1st or even place well in your first races.

Again, I see nothing wrong with high CPU use with so little resources.

ryantroop commented: thanks for the kind words. +9
rproffitt 2,701 https://5calls.org Moderator

At the office we don't have a single single core machine left. The last lowly machine we had and someone stole it was a 2006 Dell E1505 Core Duo with 1GB RAM and 120GB SSD. You must have something even older.

On such a machine I see nothing wrong with 100% CPU and 100% everything. It's what it is. Since it's just a single core, all those threads would be dragging it down even more.

I can't guess what the goal here with a server that looks to cost less than Windows Server 2012. Tell your story. Sounds interesting.

rproffitt 2,701 https://5calls.org Moderator

Hi, I'm an old hand at old school RS232 links. The most common reason for jibberish is the terminal speed doesn't match what the sender is using.

Example: If the sender is sending 19200 Baud, 8 bits and your terminal app is set to 9600, you get jibber. Not an encoding issue at all.

rproffitt 2,701 https://5calls.org Moderator

I admit I won't answer this directly but let's figure out first what happens with and without the forward slash. I'll defer to
https://www.thoughtco.com/urls-ending-with-slash-3466509

OK, that's a good clue how you might handle this. Since no slash forces a redirect, that's my clue to see how Django redirects. For that you have to scour your Django docs. Like this one: https://docs.djangoproject.com/en/2.0/ref/contrib/redirects/
Read until it sinks in. To me that's where your magic has to happen.

rproffitt 2,701 https://5calls.org Moderator

When I have to track this problem done I focus on one resulting value at a time. So take the result, just one and add printf's as needed to see what the values are going along and then the result. I see a lot more data than would be required. That is, one failure is enough. Fix the one failure then the next.

rproffitt 2,701 https://5calls.org Moderator

@AssertNull, I think the concept Mr.M is working on smells like a bad thing because either they didn't present it well or it is just someone trying to be underhanded and scrape data.

For example, read https://freedom-to-tinker.com/2017/12/27/no-boundaries-for-user-identities-web-trackers-exploit-browser-login-managers/ and just sending the content without post etc could be an attempt to thwart privacy managers.

Most folk here won't help when it comes to such work.

rproffitt 2,701 https://5calls.org Moderator

Sadly if the PC is void of make and model you likely have some clone. Something made of parts from many vendors.

So it's time to get out the Volt meter and measure each leg of the PSU. Remember I take it you are into PC repairs and would have the required gear and would know how to measure said voltages as well as use Google to see where to measure.

From the story the power supply looks dead. The CD-ROM is not a test of the PSU you can use as it won't tell you if all the PSU legs are good.
Also, I haven't seen a CDROM drive in about 2 decades. All seem to be DVDRW and a few BDRWs.

rproffitt 2,701 https://5calls.org Moderator

Did you inspect the insides for all the fans coming on at power up?

Did you get out a Volt meter (remember this is a basic item when you repair computers and more) to measure each power supply leg?
What were the readings?

Also, why not find out what PC model this is? It's going to matter soon enough.

rproffitt 2,701 https://5calls.org Moderator

To find this on my own I reduce the lines by half and see if the error is still there. If still there, I halve again until no errors. This finds the bad line in about 4 or less steps then I can focus on that line.

rproffitt 2,701 https://5calls.org Moderator

Need a little more. In a switched network if machine a and b are on the same switch the traffic is direct between a and b and no other network device sees a thing. Kind of like Master Sergeant Schultz,

I see nothing! I hear nothing! I know nothing!

rproffitt 2,701 https://5calls.org Moderator
rproffitt 2,701 https://5calls.org Moderator

As to the file output, that's something basic I feel. There are folk that want every line of code needed for their app. Also, what is that additional record?

I see you are new here so if you are looking for a complete app that hits all the marks without you writing code, just go ahead and add that detail.

rproffitt 2,701 https://5calls.org Moderator
rproffitt 2,701 https://5calls.org Moderator

Glad it was a repeat of the same old thing. At least you didn't have to get out the chainsaw.

rproffitt 2,701 https://5calls.org Moderator

Your command doesn't seem to have any log commands.

rproffitt 2,701 https://5calls.org Moderator

I think you've battled this before. My encounters with this has always been problems with filenames that are OK on the server but not allowed on FAT32. To sort this out I have to find a title that didn't sync and then see if some FAT32 rule was broken.

Also, it's possible that sync stops on the first failure. Nod to logs and MAX VERBOSITY at https://download.samba.org/pub/rsync/rsyncd.conf.html

Repeat, nod to all options about logging. Chain saws must be sharp, oiled and gassed up. You know what happened to Ash Williams.

rproffitt 2,701 https://5calls.org Moderator

Blatent copy from link below:

TL;DR The line PermitRootLogin yes does not belong in the ssh_config file, only in the sshd_config file.

The file ssh_config describes the configuration options for the client. As the error logs say, there is no such option PermitRootLogin for the client. The sshd_config file however, describes the options for the daemon. (You can recognise this because of sshd) The server/daemon does have a PermitRootLogin option, so it belongs there.
From https://superuser.com/questions/908179/ubuntu-plesk-ssh-issues-permitrootlogin

Probably same issue for line 2.

rproffitt 2,701 https://5calls.org Moderator

I didn't downvote this since you might be new to boards in general.

Take time to read how this place works at https://www.daniweb.com/programming/threads/435023/read-this-before-posting-a-question

rproffitt 2,701 https://5calls.org Moderator

Now it's starting to sound like the overreaching antivirus suite. I can't fix that. You or the antivirus folk have to tell you.

Again, no mention of the mail server so I can't check if the telnet check should work. I have to leave you to know this.

The final error message on your reply could be correct on both machines (as in fail) if the email server is imap or the DNS didn't resolve the server to an IP address.

Did you ping the server to see if the name resolved? Does the ping work the same on both machines?

rproffitt 2,701 https://5calls.org Moderator

So this fails on both?

Anyhow, since you didn't share the email server or host I can't doublecheck or supply how it should work or if there might be a DNS issue.

DNS? Did you try it with the DNS you use? Or the Google DNS of 8.8.8.8?

Remember I might assume you know that telnet test is for SMTP and not IMAP servers. That was noted in the articles I read from my link.

rproffitt 2,701 https://5calls.org Moderator

I just ran into this and it turned out to be the owner's choice of AntiVirus Suite. Some are overreaching IMO.

Other reasons are trojans, DNS hijackers and such.

That aside, try the old telnet test. Example: https://www.google.com/search?q=test+email+with+telnet

rproffitt 2,701 https://5calls.org Moderator

@stultuske, good point. Just recently our office picked up on a development project and they were worrying about decompilers so they were expending time (which is money) on that area. They were taken aback that we don't bother with obfuscation at all. Our focus and energy is strictly applied to the app's problems and resolution. If they want obfuscation, we were pretty blunt that their intern could handle that but we don't bother at all.

Mind you we deal with apps that are specialized and of no interest to hackers or just about anyone else.

rproffitt 2,701 https://5calls.org Moderator

PS. I forget at times folks don't know the words to do research with. Here's the search I used showing it's all been done many times in many different ways.

https://www.google.com/search?q=integrating+payment+systems+in+Windows+application

rproffitt 2,701 https://5calls.org Moderator

You wrote what you want, so now it's time for you to add the button, code and use any of the methods kicked around before.

In other words, take your wants and start coding, using what folk have written about in the past.

rproffitt 2,701 https://5calls.org Moderator

Now you make me worry that Ionic has blown their installer up. Get to the authors there and ask what's going on.

rproffitt 2,701 https://5calls.org Moderator

To me, after reading your post twice I get the feeling this is the following question.

How do I sell my Java app?

It appears that's been kicked around for over a decade so the answer is up to you. You can do this however you want today.

rproffitt 2,701 https://5calls.org Moderator

Read https://www.daniweb.com/programming/threads/435023/read-this-before-posting-a-question next. The problem is that this is your homework and what is covered in this class and prerequisites lead up to this assignment. As in that link, it's rare to find folk do your homework.

As it stands maybe a loop and adding up the values is next but there is no clear link to your homework assignment or what we call the requirements. Maybe coding in python wasn't a good start if you were going to try to write in assembler.

Think of the python code as your translation from the requirements. Something possibly lost in translation.

rproffitt 2,701 https://5calls.org Moderator

Can you reveal why that's not helpful? You didn't call out this is some homework or such. I deal with embedded computers all the time and we are always cross compiling. While I did write a lot of assembler code, for many reasons we move to cross compilers to make the systems maintainable.

rproffitt 2,701 https://5calls.org Moderator

It sounds like you need to get back to Ionic support. Also the install command you shared doesn't match what I read at
https://www.npmjs.com/package/@ionic-native/core

rproffitt 2,701 https://5calls.org Moderator

That's what we use Cross Compilers for. I don't know of many that will hand code from what you supplied but I did see students try that. But in a commercial setting the Cross Compilers are called on.

And yes, there are such for your project. Read from https://www.google.com/search?q=python+compiler+for+mips

AssertNull commented: Rep here because I somehow couldn't give you rep elsewhere. +8
rproffitt 2,701 https://5calls.org Moderator

Put debug lines prior to 38 and 60 to output this.file.documentsDirectory so you can see what's there. Then go back line by line to see what your code did to fill in the variable.

rproffitt 2,701 https://5calls.org Moderator

PS. This works too.

    public class Chapter4 {
        static int n = 0;
        static int i = 0;
        public static void main(String[] args) {
            for (i = 1; Math.pow(i, 3) <= 1000; i++) {
                n = i;
            }
            System.out.println(i);
        }
    }

Why? The loop stops at the value which was equal but due to how for() works, your answer is i.

rproffitt 2,701 https://5calls.org Moderator

I got the number 10 at https://www.jdoodle.com/online-java-compiler

As to the next integer that would be 11. Noted at https://www.youtube.com/watch?v=KOO5S4vxi0o

rproffitt 2,701 https://5calls.org Moderator

This looks to be similar to the discussion at https://stackoverflow.com/questions/6472123/why-session-destroy-not-working
Short version, clear those variables.

rproffitt 2,701 https://5calls.org Moderator

From your last link, a fine example this may not work on all machines.

Some hints if you are using iOS and recording doesn't work: 1.) Try to use a absolute file path but remove beginning "file://".

So it appears that Raymond's article is spot on. The library has potholes and not plug and play. That out of the way, did Raymond's example fail too?

rproffitt 2,701 https://5calls.org Moderator

I meant I went looking for examples and found it's not a simple thing to implement and have work on many clients. I get the feeling you are looking for a plugin and not to write your own. If the link supplied and the code there can't be used, keep searching.

rproffitt 2,701 https://5calls.org Moderator

You said this looked easy? I read https://www.raymondcamden.com/2015/07/27/recording-and-saving-audio-in-cordova-applications/ and came away with "Yeah, right."

rproffitt 2,701 https://5calls.org Moderator

Above I commented about Divisibility Rules. Just that on google gets you articles like https://en.wikipedia.org/wiki/Divisibility_rule

These rules were handy when you were coding in assembler or ₛₘₐₗₗ machine or language.