5,331 Posted Topics
Re: Let's see. Over 30+ years, the computer languages I have used professionally to earn a living have included Fortran, Assembler (of various sorts), Basic, dBase (II, III, and IV), SQL, Quel, Cobol, Dibol, C, C++, Java, Lisp, SmallTalk, Prolog, Snobol, sh, csh, bash, ksh, Ada and PL/SQL (a derivative of … | |
Re: There are any number of books and online articles that will help you understand object-oriented programming and methods. Anyway, which of these concepts don't you understand, and what do you think you know about them? | |
Re: You can create a sed script that will loop/process all the data in a file. I do this for processing script output into CSV format data. Here is an example from my bash script: cat >$SEDFILE <<EOF s/^/"/ # Convert space delimiters to "," { : dospc s/ /","/ t … | |
Re: fscanf() -> cin fprintf() -> cout void main(...) -> int main(...) IE, what Ancient Dragon said. :-) | |
Re: Each bit of hardware cruft has its own peculiarities - so there is no "one size fits all" book for this stuff. The hardware manufacturer's data sheets and programming guidelines will help. I use embedded ARM processor boards for a lot of projects, and the ones I use support Linux … | |
Re: C# is not particulary portable, even if you use Mono on *nix systems. Convert your code to C++ and it will become much more portable... Or at least compilable. | |
Re: There are a number of problems with your class. One is a lack of initializers in your constructors. Two is that you are using non-const arguments for many functions (copy constructor, assignment operator, and other operators). Not delving into the guts of your method functions, this is a better approach: … | |
Re: So, this is connected directly to the xp box? Did you "share" the printer so it can be seen on the local network? Also, as RIK asked, how are you trying to connect to it from the Win7 box? | |
![]() | Re: Unimportant's links are good places to start, but you need to think about the process/protocols to communicate from client->server->client. 1. Server starts and "listens" on a port for connection requests. 2. Client attempts to "connect" to server on that port. 3. Server "accepts" the connection request, getting a socket associated … ![]() |
Re: You may need to build from source for that. I do know that my Linux version of ffmpeg (binary installation) has the x264 lib installed by default. Don't know about the Windows version though. | |
Re: What is the user.group ownership and flag settings on the stunnel.pem file and the directory it is in? It is likely that either the flags/ownership on the .pem file or the directory containing it are wrong. | |
Re: Mike2K points out a common coding issue - proper scoping of loops. My personal process says "scope everything" - loops, conditionals (if/then/else), etc. IE, place proper brackets around all loops and conditional blocks of code. Then, when you need to add a line to them, they will still be properly … | |
Re: Myself, I prefer to use an insertion sort that uses a modified binary search (bsearch) algorithm to determine where in the output array to place a candidate key/object. It has the advantages of qsort and bsearch and the only downside (performance wise) is how you grow the target array. If … | |
Re: You may need to reset the router to factory settings - there should be a reset button (possibly recessed - needing a small device such as a pin to depress) on the back of the router that when held in for 10 seconds or so will reset it to factory … | |
Re: Did you configure your VirtualBox network interface to use a NAT address, or a bridged address? | |
Re: As Mike2K said (but not in so many words), how you install software depends upon the Linux distribution you are using - YUM/RPM for Red Hat derived systems, apt-get/aptitude/synaptics for debian/ubuntu ones, emerge for Gentoo, etc. Every distribution has its favorite! IE, one size fits none... Then, there is installation … | |
Re: Try by temporarily disabling McAfee. If you can install it, then you can re-enable McAfee security. | |
Re: I assume you mean Fedora? All Red Hat distributions (RHEL and Fedora) use the YUM package manager. Yes, you can use rpm directly, but it won't deal with missiing dependencies, which yum will do. IE: yum install package-name | |
Re: If you change the cluster size on an hdd, then you will need to reinstall the os and everything else! Not a good idea if you want to keep your system intact! I think you are fubar until you re-install the OS and all of your data and applications (have … | |
Re: As mat1998x said. However, BlackBox (the company) has a lot of really neat adapters that may work for you, to use your laptop as a video output device. Ok, looked at their web site and found nothing (after a quick search) that will suit your needs. :-( You can look … | |
Re: "can't find it" -> "can find it" online... :-) Danged keyboards! Never type what we intended! | |
Re: You can do that with either hardware, or software RAID tools. If the system has hardware RAID capabilities (accessible via the bios usually - enable verbose boot so you can get into the RAID bios) then you can set it up to use 2 drives as a single disc image, … | |
Re: One final option, is that Ubuntu has a Windows installer, and will install it as a dual-boot system, but the Ubuntu/Linux partition is a virtual disc that resides in the Windows file system. IE, it won't require any physical partitions, but it WILL alter the boot sector of the drive … | |
Re: Normally, USB devices such as flash drives should auto-mount, though I don't use the Chrome OS per se (my normal operating systems are Red Hat Linux clones). In cases where they don't auto-mount, you can do this. 1. Before inserting the device in a USB port, look at the drives … | |
Re: What about an analog clock? That will help you get familiar with a lot of Java constructs, including timers and timer tasks, threading, graphical display, window management, and a lot of other cruft that you need to know when writing Java code. | |
Re: We don't solve school work problems for you. Make an effort to solve them yourself, and we may decide to help you correct/fix them. | |
Re: One of the main reasons to use references rather than pointers is that you don't need to check for a null pointer. The object must exist to get a reference to it. A pointer may or may not point to a real object (null if not). | |
Re: Have experience and domain knowledge in-house? Use open source. Don't? Use commercial. There is a REAL learning curve here, and having the (hopefully) hand-holding provided by a decent commercial organization can be a real help in getting started. Just remember the caveates about vendor lock-in (difficult to change down-stream when … | |
Re: What JorgeM says, plus this: Explanation of TCP/IP takes BOOKS, not just chapters of same... I have several linear feet of books on my shelf that are all required to really understand the protocols. I should know, since in the past I have implemented an entire TCP/IP stack for a … | |
Re: You missed the "then" clause in this block: `if [ ${i} == "Screenshot*png" ]` | |
Re: CimmerianX and nuwan4u are mostly correct. There are a number of factors that limit the length of a single ethernet link, and the default max (IEEE standards) for a cat-5 to cat-7 cable is 100 meters. The main issue is not only signal attenuation at distances beyond that, but the … | |
Re: It is unfortunately that this has happened to Opera. They are our biggest competitor in the mobile browser arena and we have a LOT of respect for them. The fact is that this can happen to anybody. Let your guards down in any small area for just a minute and … ![]() | |
Re: So, your question is... what? | |
Re: Here are some links. http://www.unixy.pl/forum/art/pdf/Linux_newbie_Guide.pdf http://www.ulozto.net/xG375LT/linux-for-dummies-8th-ed-pdf http://it-ebooks.info/book/784/ | |
Re: + 10% of his income for life... :-) | |
Re: Please elaborate. The term "data representation" can mean a number of things. So, let's be sure we are speaking the same language! :-) As an aside, if you are inferring "data-driven development", that is a subject I do know something about. However, a fuller explanation of what problem you are … | |
Re: There are a number of well-known methods of generating a GUID (Globally Unique IDentifier) which can be used as account numbers. Here is a link to a Wikipedia article about that subject: http://en.wikipedia.org/wiki/GUID | |
Re: You did ask one question - what are nested classes? So, I will answer that. The other issues I assume are class problems, and we don't do homework... Nested (inner) classes are classes declared/defined in the context of another (outer) class. They can be public or private to the outer … | |
Re: If you want 100% control over your software build process, then the only option is (IMO) make w/ appropriate Makefiles, standard compiler, and a command line debugger. I've used many IDE tools such as Visual Studio, Eclipse, Code-Blocks, and others. I always revert to make+Makefile for my serious work. | |
Re: Why do you want to switch it off? If you need to keep an object in memory, then assign it to a global variable that can keep it in reference. Disabling reference counting is a sure fire way to have serious memory leaks... FWIW, I designed and built a reference … | |
Re: Try this: #include <iostream> #include <conio.h> using namespace std; int main() { int maxArray[10]; int maxValue=0; for(int j=0; j<4; j++) { cout<<"Enter a number: "; cin>>maxArray[j]; } for (int j = 0; j < 4; j++) { if(maxArray[j]>maxValue) { maxValue=maxArray[j]; } } cout << "The highest value is: " << … | |
Re: It sounds like you want to convert a text-based / command-line program to run in a GUI. Correct? Then there will be a lot of cruft to deal with to make it work that way, coding wise. Not difficult - just tedious. The functional logic won't change, but include files … | |
Re: Your question is? If this is homework, please make an effort to solve the problem. We aren't here to help you cheat! | |
Re: First rule for Dell computers - always send it in to Dell for repair. Do that now, and demand your $$ back from Fry's. If what they did causes additional costs from Dell, demand them back also. Dell's repair/replacement policies are usually quite reasonable, and you are guaranteed to have … | |
Re: It is likely that the attributes on the directory in question don't allow this. You need to enable the read, write, and execute permissions accordingly, assuming that the directory is not owned by the writing process(es). | |
Re: What browser+version are you running? | |
Re: Please provide the code, both header and source files, otherwise it will be very difficult to help you. |
The End.