5,331 Posted Topics

Member Avatar for hwoarang69

Well, I assume this is a compiler warning. Post the rest of your code.

Member Avatar for deceptikon
0
236
Member Avatar for shandow

What virtual machine manager are you using? And are you using a nat'ed or a bridged network configuration for the virtual machines?

Member Avatar for suley04
0
384
Member Avatar for silvercats

I am a performance engineer for a tier one mobile phone manufacturer in their web browser division. We run virtual mozilla browsers to fetch, process, render, and scale web pages for our users' mobile phones - millions of users all over the world. This situation (slowdown during peak hours) is …

Member Avatar for maniat123
0
169
Member Avatar for becool007

Did you say this is a LG (Lucky Goldstar) monitor? If so, they are generally of good quality. Many monitors (vs TVs) don't have HDMI interfaces, but do have DVI. As for hotkeys, what do you mean by that. I have dual DELL displays on my system, and they do …

Member Avatar for rubberman
0
358
Member Avatar for suneye

Try booting into the recovery partition, and restore missing/broken components.

Member Avatar for suneye
0
55
Member Avatar for SgtMe

The best resource I know of for Linux wireless issues (links to drivers, installation instructions, etc) is www.linuxwireless.org

Member Avatar for SgtMe
0
268
Member Avatar for asif49

What are you using for your UML modeling tool? In any case, most such tools with which I am familiar (most of them) will let you make multiple connections between two classes. After all, that is not a totally unknown requirement, such as modeling a binary tree, where you have …

Member Avatar for asif49
0
172
Member Avatar for st_infamous

I don't suppose you have tried building this debuggable, and they tried running it in a debugger?

Member Avatar for GunnerInc
0
141
Member Avatar for manchurianCEO

Your file system has been corrupted due to the hard shutdown. You need to boot with a recovery disc or partition and fix the file system before you can continue.

Member Avatar for manchurianCEO
0
382
Member Avatar for Jaymz

So, you are using a directional antenna to connect your local router/access-point to another A/P across the campus? Check out the cable run. It may have been damaged (kinked, cut into, nibbled on by rodents), which can cause a serious degradation in the signal getting to/from the antenna and transceiver. …

Member Avatar for Jaymz
0
144
Member Avatar for silvercats

Internet address numbers and top-level domains are managed by the IANA (Internet Assigned Numbers Authority). These domain controllers share their data with each other, and as a new name/number comes on line, that information (routing information, etc) is passed around the internet so that eventually everyone can find it. Your …

Member Avatar for silvercats
0
148
Member Avatar for Joey_Brown

The actual ethernet frame size is 84-1542 octets (bytes) in size. Here is a wikipedia article about it: http://en.wikipedia.org/wiki/Ethernet_frame The last 12 bytes is taken up with the interframe gap, so the actual data packet, including the CRC is 1530 bytes in length.

Member Avatar for Joey_Brown
0
97
Member Avatar for crainna motesha

What *precisely* are you looking for? What do you mean by "windows structure", etc?

Member Avatar for rubberman
0
48
Member Avatar for Ritesh_4

It may be a clock syncronization problem. Make sure all your systems are getting clock updates using NTP. You can either use an internet NTP server such as NIST, etc, or you can set up a local server on your LAN which will keep all the PC's updated locally, yet …

Member Avatar for Ritesh_4
0
195
Member Avatar for UrbanKhoja

My wife bought one this weekend, but she won't let me within a half-mile of it! She loves it, though after downloading less than 1/2 of her iTunes account to it, there is less than 1/2 of the disc space left... :lol: The resolution is phenominal, and it is incredibly …

Member Avatar for karann1986
1
181
Member Avatar for newbie1234

What distribution+version of linux, and which version of wpa_supplicant are you using? FWIW, this is a pretty new enhancement, so you may need to get current sources and build it from scratch.

Member Avatar for newbie1234
0
271
Member Avatar for khuzdaar

The simplest way is to use the C function `strchr(const char* source, char target)`. It will return the pointer to the character if found in the string, or null if not.

Member Avatar for rubberman
0
523
Member Avatar for jwill222
Member Avatar for jwill222
0
613
Member Avatar for asif49

Are you looking it up by key, or by value? Do you need to handle duplicates? Does it need to be sorted? What is the average tuple (element) size? How many elements will your collection contain? Before days of the STL (Standard Template Library) I implemented a wide variety of …

Member Avatar for mike_2000_17
0
172
Member Avatar for hay123

So, this is a 3-part problem. Solve each separately, and then see if you need to make some changes to make them all work together. Example of a possible issue to bring up with your professor is #2, "when the numbers are put into the array, are the sums of …

Member Avatar for rubberman
0
153
Member Avatar for phorce

The symbols ROW_BOUNDS and COL_BOUNDS are macros? If so, please post their definitions (in their entirety) here. Also, you are missing other code, such as where mat1rows, et al are declared and defined. IE, you need to post the function declaration that you are calling here, as well as the …

Member Avatar for rubberman
0
115
Member Avatar for Schwabie19

A bad connection, or bad wire which have excess resistance will generate the heat you felt. The cable is fubar. Contact Gateway, and if they resist replacing it free, tell them they are lucky your system didn't burst into flames, resulting in a costly lawsuit and a lot of more …

Member Avatar for rubberman
0
265
Member Avatar for jumbowat

Swap elements 1 and 3: void swap1and3(void) { char* p1 = &menu[1]; char* p2 = &menu[3]; char tmp; tmp = *p1; *p1 = *p2; *p2 = tmp; }

Member Avatar for jumbowat
0
7K
Member Avatar for ccbuilder

Don't use atoi(). Use strtol(), strtoul(), etc. The last (third) argument passed to the function is the base. It will try to convert intelligently if the base is 0, so if the string is 0xCAFEFACE, it will look at the "0x" and convert from hex, where 01234567 would be treated …

Member Avatar for ccbuilder
0
227
Member Avatar for Nimrod7676
Member Avatar for freddyk

Any uninitialized variable will contain whatever is in that chunk of system memory (automatics are on the stack, so whatever was in that stack space). If you were to run a function in a loop, since the stack when the function is run will always be at the same place, …

Member Avatar for rubberman
0
163
Member Avatar for NerdPC

Also, the way you are reading the file, you are reading each word separately. Is that what you want to do? What about duplicates? Anyway, I implemented an insertion sort for C++ years ago (about 20 years ago) that used a modified bsearch() routine to find the insertion point in …

Member Avatar for rubberman
0
224
Member Avatar for MasterHacker110

Start by studying other kernels - simple ones like FreeDOS, for which the source code is available. You need a kernel (control program), and a shell (monitor), along with some utilities to do something like look at system activity, etc. There will be drivers necessary in order to access any …

Member Avatar for AceStryker
0
252
Member Avatar for SleepAlready
Member Avatar for Agilemind
0
249
Member Avatar for hwoarang69

Most of your code is pretty bogus... :-( 1. The structure member `ar[]` has the size outside of the brackets. Wrong... 2. The rest of your code is bogus. The initialization of buff is not correct. 3. What is this while() condition? And what are the minus signs preceeing the …

Member Avatar for hwoarang69
0
226
Member Avatar for C0ding
Member Avatar for C0ding
0
232
Member Avatar for c++bob1234
Member Avatar for sm.amudhan

A reasonably full-featured router for the network should allow you to block internet access to all but the authorized systems. You can do this with a dedicated router (cheapest, and easiest method), or a computer that is acting as a router.

Member Avatar for rubberman
0
203
Member Avatar for FraidaL
Member Avatar for triumphost
0
163
Member Avatar for Kulasangar

Abstract: exists only in concept, not in reality. In C++ this would be a class with virtual member functions that have no implementation. Exampe: class abstract { public: abstract(); abstract(const abstract& cpy); ~abstract(); abstract& operator=(const abstract& rhs); virtual unsigned computeArea() = 0; }; Note the virtual method declaration that has …

Member Avatar for mrnutty
0
140
Member Avatar for Mourin @ Dell

1. Easy access to the innards of the system, including disc drives. 2. Good cooling. 3. Fully buffered ECC RAM - this is error correcting RAM which will continue to run even if one of the memory sticks fail, allowing you time to take down the system cleanly before you …

Member Avatar for CimmerianX
0
179
Member Avatar for jhamill

You basically want your circular list class to extent the linked list class, not encapsulate it as you have. Then, your circular list class will ensure that the last node is pointing to the first node in the linked list. It eliminates a lot of cruft and lets you focus …

Member Avatar for jhamill
0
266
Member Avatar for Ankit_Parmar

Yes, in theory you can have a zero-size array, but you cannot do anything with it except get its address! And, even though conformant compilers will deal with it, it may actually have no address since it uses no space! My guess is that the compiler simply eliminates it as …

Member Avatar for rubberman
0
311
Member Avatar for Gr8fultom

Well, with Linux and a bash shell, this would be trivial: find . -type f -exec chown name.group {} \; find . -type f -exec chmog ugo+rw {} \; etc. So, you can install Cygwin (free Linux/Unix environment for Windows) and have these tools available for you. I find they …

Member Avatar for Shinedevil
0
105
Member Avatar for subith86

If you can post your code that broke the compiler here, it may be illustrative. Usually something weird in the code will cause this sort of problem, although I have broken many compilers with perfectly legal code. In some of those cases I had to rattle cages at the top …

Member Avatar for mitrmkar
0
3K
Member Avatar for anmolmehtaaa

Actually, it is called Thunderbolt. It is a high-speed interconnect for audio, video, data, etc. You can connect appropriate stuff at multi-gigabit speeds, such as external displays, disc drives, etc. It is sort of a replacement for firewire, but with more capabilities.

Member Avatar for rubberman
0
67
Member Avatar for samsnov

Also, check out ffmpeg - free, fast, and converts just about anything to anything else in the video universe. Usually it is used on Linux, but there are Windows builds as well. Here is a link to those: http://ffmpeg.zeranoe.com/builds/ The main ffmpeg site is www.ffmpeg.org.

Member Avatar for cretaros
0
193
Member Avatar for silvercats

Back in the day when Ethernet was over coax cables, half-duplex was a necessity (the comment about CSMA-CD is appropriate here). That changed with ethernet over twisted pair when you could have separate channels for sending/receiving data. Back then, before ethernet could run over twisted pair, ethernet was not suitable …

Member Avatar for silvercats
1
1K
Member Avatar for Buppy

Good question. Have you run a virus scanner (or 3) on your system to determine what has infected you?

Member Avatar for Nimrod7676
0
58
Member Avatar for Kyle Willett

Whew! I haven't coded any ADA for about 7 years, so it will take me a bit of refresher time to help you on this. Be patient! :-)

Member Avatar for Kyle Willett
0
618
Member Avatar for ChaseRLewis
Member Avatar for silvercats

A VPN is the usual way, although if your bandwidth needs are great, you might be better off leasing dedicated bandwidth on the fiber optic cables between point A and B. My company (a tier-one mobile phone manufacturer) has data centers in a number of places all over the world. …

Member Avatar for silvercats
0
112
Member Avatar for ggeoff

I used to use Roxio a LONG time ago. I long since switched to Alcohol 120% for Windows disc ripping and writing. It has been 100% more reliable than Roxio's cruft. Here is a link: http://www.alcohol-soft.com/

Member Avatar for ggeoff
0
240
Member Avatar for silvercats

Most A/V products perform what is called "on access scanning" in that when you start a new program, then the A/V product will scan the program file and all loaded components (shared libraries, and other files) before allowing it to run. This can cause serious performance problems, as you have …

Member Avatar for silvercats
0
123
Member Avatar for alaa sam

Beginning with L7Sqr's comment, there are a lot of resources out there, including the source code for GCC/glibc and other compilers/libraries out there that implement malloc/free which you can study to help understand what is going on. I did a considerable amount of research back in the 1990's into memory …

Member Avatar for alaa sam
0
317

The End.