5,331 Posted Topics

Member Avatar for Mike Lomax

Looking at the documentation for these units, your problem has likely been using (or not using) the "Manually Configuring your Internet Connection" setup option. Did you try to use the DHCP (No data is required) option? That should keep your router from trying to overrule the modem. It's either that, …

Member Avatar for rubberman
0
144
Member Avatar for kitkat123

To integrate multiple existing applications, you need someway to connect the output of each to the input of the others. This is called "middleware" - it sits in the middle between a bunch of applications and intelligently routes data from one to another. So, Google on the terms "application middleware". …

Member Avatar for marwaaaa
0
127
Member Avatar for ravanan

You can get source code from download mirrors for all distributions. You need to get the source that is used in your system for best compatibility. What distribution+version of Linux are you running, and on what platform?

Member Avatar for ravanan
0
268
Member Avatar for rkruz

The bus expanders I found have DVI-I (29 pin) wired connectors. You can probably find optical adapters for that, but why bother? Anyway, here is a link to a 4-slot expansion bus: [url]http://www.startech.com/product/PEX2PCIE4L-PCI-Express-to-2-PCI-Full-Length-2-PCIe-Single-lane-Expansion-Box[/url]

Member Avatar for rubberman
0
104
Member Avatar for fuzebox40

But be careful that you don't touch any other components on the mobo! Otherwise, you may let the magic smoke out! :-(

Member Avatar for fuzebox40
0
155
Member Avatar for shyla

stdafx.h is a Windows Visual Studio compiler header. Are you building this in a Windows environment?

Member Avatar for Narue
0
969
Member Avatar for Tellalca

You have to wait when posting requests over a weekend. People are out doing stuff. I'll reply soon...

Member Avatar for rubberman
0
2K
Member Avatar for gamemaster13

If you do a cold shutdown of a system with applications running that have files opened, it can scramble the hard drive. Try running the disc check utility. If it doesn't see the drive at all, then it probably scrambled the partition table / boot sector. It may be recoverable …

Member Avatar for gamemaster13
0
187
Member Avatar for spudly1987

I will make the assumption that you have purchased these videos and just want to burn a CD/DVD for your personal use? :-) Assuming that, the message about missing video filters/codecs is probably the correct hint, that you need to install additional software so that these files can be played …

Member Avatar for Ken Peterson
0
226
Member Avatar for thekashyap

You can generate a unique ID with 48 hex characters or less, effectively. There is no way to generate a guaranteed non-colliding hash value mathematically. It is one of those NP-Hard problems. So, generate a GUID, and forget hash values if a collision will indeed be "fatal".

Member Avatar for thekashyap
0
386
Member Avatar for idk

Well, in thread_routine(), you have declared it to return a void*, but it returns nothing. However, since that is not the error you are getting, it problem is likely, as Ancient Dragon noted, that there is an issue with the include files. However, you state that your error is a …

Member Avatar for idk
0
256
Member Avatar for khsheehan

There is likely a default vector size, and 123 is smaller than the default, hence the error. Just a guess.

Member Avatar for arkoenig
0
157
Member Avatar for lucklou2

I doubt that it is the video hardware that is going tits-up. Have you tried reinstalling/recovering the operating system? Scanned for viruses? Run in safe mode?

Member Avatar for lucklou2
0
100
Member Avatar for whocares21

It's a weekend. Folks are out doing other stuff, like taking in movies, going to concerts, out to dinner, playing with kids... Be patient. If this project is due Monday, you may have to resort to your own abilities... :rolleyes:

Member Avatar for rubberman
0
87
Member Avatar for maxx83

From the Wikipedia: [quote] This attribute is a part of HP's SMART IV technology and it means that after transferring through the cache RAM data buffer the parity data between the host and the hard drive did not match. [/quote] This seems to indicate that the cache memory of the …

Member Avatar for rubberman
0
586
Member Avatar for predator78

Overclocking systems or graphics boards is an exercise fraught with danger - overheating, power consumption, fried circuits. Some folks who feel a real need for speed will purchase special gear that is designed to take this, but then all the components, CPU, RAM, power supply, video board, motherboard, all have …

Member Avatar for predator78
0
229
Member Avatar for sonya-g

If, as others noted, your system is adequate to run Win7, then you can install it. However, you cannot directly upgrade from Win2K to Win7. The best advice is to backup your data to an external drive, and then install Win7 from scratch, and updated versions of your applications if …

Member Avatar for jingda
0
193
Member Avatar for gretty
Member Avatar for rubberman
-1
165
Member Avatar for goocreations

With Linux, when you allocate memory, the application requests heap memory from the OS using the sbrk() function (deep inside the allocator). When you delete the memory, the heap allocated to the application is not returned (normally) to the operating system. It will be reused on subsequent allocations. In Windows, …

Member Avatar for rubberman
0
143
Member Avatar for CrazyMisho

[QUOTE=arkoenig;1559497]Two things as starting points: 1) In your second code fragment, you have two members named next. You can't do that. 2) This is really a C program, not a C++ program, so you would be better off asking your question in the C forum.[/QUOTE] Indeed. If this is supposed …

Member Avatar for rubberman
0
141
Member Avatar for jason316

First, your constructor and destructor are bogus. This is how it should be: [code] SimpleLinkedList ::SimpleLinkedList() { first = new Node; first -> next = NULL; // Don't forget to initialize node's member fields. Unless // Node has a default constructor that initializes them for // you, they will contain …

Member Avatar for rubberman
0
264
Member Avatar for FujiFilm

Also, use [icode]const char*[/icode] for the make and model. Most compilers will give you an error using string literals for a non-const char pointer.

Member Avatar for rubberman
0
142
Member Avatar for scrapple

RAID just protects from drive failure. Not controller failure, unless you also have redundant controllers! In any case, RAID-1 is just mirroring - no redundancy. You have two drives with the same data. If one failes, the other contains the data. However, some other types of problems can corrupt both …

Member Avatar for rubberman
0
180
Member Avatar for eadrtwist

My question is, what caused this damage? Perhaps your system is misbehaving? Since you lost the install disc, until you get a new one, you are pretty much SOL (Sorry/Sh!t, Out of Luck). If there is a computer store that handles Apples anywhere you can reach, they may be able …

Member Avatar for jingda
0
227
Member Avatar for jackmaverick1

For something like this you would need a global map object that maps names with data, so your function could create the new object and add it with its name to the map which is the real global container of these objects. Then, create a function that allows you to …

Member Avatar for jackmaverick1
0
223
Member Avatar for gogreen1

Even if the BIOS doesn't support booting from USB, I just read today about a tool for Windows that will let you boot from USB even if the BIOS doesn't let you. In any case, most any system purchased in the past 5 years or more will boot from USB …

Member Avatar for rubberman
0
118
Member Avatar for CrowdedMill

Here is a link to an express card (the new laptop ports) to a PCMCIA/CardBus port adapter: [url]http://www.google.com/products/catalog?hl=en&q=expresscard+to+pcmcia&um=1&ie=UTF-8&tbm=shop&cid=1159910499529702816&sa=X&ei=tH3NTerhIs-3twfYlej9DQ&ved=0CDQQ8wIwAA&biw=1068&bih=1014#[/url] This should let you use newer (cheaper) laptops with your old SRAM cards.

Member Avatar for rubberman
0
188
Member Avatar for cwhizz123

Linus Torvalds started hacking on minix, and then started his own OS - it was at least 2-3 years before it was released into the wild, and is now the most widely used OS in the world! :-) If you really want to do this, then I suggest tackling a …

Member Avatar for rubberman
0
107
Member Avatar for jimmymack

Since Person is a virtual base class for both Teacher and Student, there is only one implementation in the TeachingStudent class, so even though Student and Teacher constructors are calling the Person constructor, they really are just setting the same name member in Person with the same data. Effectively, writing …

Member Avatar for jimmymack
0
133
Member Avatar for shuhana84

It depends upon what you mean by "verify". You can create post-insert/pre-commit triggers on each field that needs verification so that your own code (rules) will "verify" that each field is valid before it will commit the record to disc. You can also apply these rules for updates as well. …

Member Avatar for Pgmer
0
158
Member Avatar for schrope

Be careful of your math. This expression [icode]change * 1.85 + 2.50[/icode] will be interpreted as (change * 1.85) + 2.50. If you intended this [icode]change * (1.85 + 2.50)[/icode] then that is NOT what you will get. So, make sure to properly bracket your math expressions, or you may …

Member Avatar for Saith
0
103
Member Avatar for ssdeep

Well, the paper addresses the problem symbolically and algorithmically, so the language it is implemented is up to you, the implementer. However, network routing is done in the system kernel, and access to kernel structures from a user-space Java application may be difficult. Not necessarily impossible, or even necessary, but …

Member Avatar for rubberman
0
106
Member Avatar for Farao69

A stuck key can do this. Try booting with everything external (including keyboard and mouse) disconnected, except the monitor.

Member Avatar for rubberman
0
283
Member Avatar for GuyClapperton

[QUOTE=sergent;1537437]What is a floppy?[/QUOTE] A hat with a big brim? :-) I still have a couple of systems (rarely used/booted) that have floppies, and I have a bunch of data (programs - some major R&D work) on floppies I REALLY need to extract before they become landfill...

Member Avatar for darrylpatterson
0
412
Member Avatar for mkzamanopu

Intel processor? Intel motherboards are best. AMD processor? Asus are good, as are others.

Member Avatar for gogreen1
0
139
Member Avatar for batchprogram

Bitwise operations: multiply by 2 == <<1 divide by 2 == >>1 add == + subtract = - So, if what I understand you to mean by "saturated" arithmetic, with limits of +-21474, then the problem becomes much more comprehensible. In any case, please clarify if I am making the …

Member Avatar for rubberman
0
2K
Member Avatar for shadowscape

By seed string and/or seed file, do you mean that you generate a hash from that and then use the hash to encrypt/decrypt the plain-text data?

Member Avatar for rubberman
0
201
Member Avatar for shadowscape

It sounds like you are trying to generate a hash function - take arbitrary string (of any length), and convert it into a numerical (hexadecimal) value. Is that the case? If so, there are a number of hash functions that you can use as examples, such as md5, sha1, etc.

Member Avatar for rubberman
0
155
Member Avatar for zillah

What jingda said, but you might also want to run a diagnostic on the system to see whether or not the lan adapter has died.

Member Avatar for ComputerNetwork
0
330
Member Avatar for fuzebox40

What slots does your motherboard have? Usually they have 1 PCIe x16, 1 x4 (or an x16 that also supports x4), and some PCIe x1 slots, at least newer ones do. I'm not sure if you can use an x1 board in an x4 or x16 slot - probably not, …

Member Avatar for fuzebox40
0
156
Member Avatar for raephel
Member Avatar for shootersix66

Have you verified that fopen() actually gives you a FILE*, and not NULL? If it cannot open the file, then the fscanf() function will cause a segfault. This is a good example why you REALLY want to test the results of functions such as fopen(), to verify that they were …

Member Avatar for rubberman
0
129
Member Avatar for TechySafi

This is probably a TS issue (Touch Sh!t)... As mah300274 suggested, you might be able to convince the vendor to replace the part under warranty, but you will have to be convincing that you "took proper precautions".

Member Avatar for theExpert
0
153
Member Avatar for cppgangster

For software engineering, these are required reading 1. Niklaus Wirth: Algorithms + Data Structures = Programs, published by Prentice-Hall 2. Donald Knuth: The Art of Computer Programming, 4 volumes, published by Addison-Wesley As for fundamentals of computer hardware, I don't know off hand what would be equivalent in depth to …

Member Avatar for cppgangster
0
106
Member Avatar for n1csaf3

Your code to clear the contents of the hdrContent variable is wrong, and won't clear the entire allocated space. This is a case where calloc() is a better option than malloc(), as it allocates and clears the memory at the same time. The calloc() function takes two arguments: the first …

Member Avatar for n1csaf3
0
320
Member Avatar for Nikhar

Roshki made some good points. As for controlling your bandwidth usage, most torrent clients have the ability to limit the number of uplinks that you will provide, reducing upload overhead by some factor. The entire idea of bittorrents is to distribute the load and bandwidth needed by many downloaders trying …

Member Avatar for orwell84
0
234
Member Avatar for yashsaxena

These are all definitions. A declaration would be an extern, such as [code] #include <stdio.h> /* Declaration of foo being an integer */ extern int foo; /* Definition of bar as an integer. It is still a definition * even if it hasn't been initialized. */ int bar; int main(void) …

Member Avatar for nezachem
0
131
Member Avatar for bangor_boy

One often ignored synchronization method is a message send/receive/reply. The receiver is the gatekeeper. One who wants access to the resource sends a message asking permission, if there are no others who have asked, the receiver replies, unblocking the sender who knows he has exclusive access to the resource. When …

Member Avatar for Old Doctor Ed
0
193
Member Avatar for WigglesMcMuffin

Gnome, and I think Compiz, use the GTK+ toolkit to build GUI apps and applets. You need to read the developer's documentation, available online from the gnome foundation.

Member Avatar for WigglesMcMuffin
0
118
Member Avatar for michaelzip

So, show how you solve this on paper. Then we can probably help you reflect that algorithm as pseudo code that you can fairly easily implement in a number of programming languages.

Member Avatar for michaelzip
0
261

The End.