5,331 Posted Topics
Re: Well, I assume this is a compiler warning. Post the rest of your code. | |
Re: What virtual machine manager are you using? And are you using a nat'ed or a bridged network configuration for the virtual machines? | |
Re: I am a performance engineer for a tier one mobile phone manufacturer in their web browser division. We run virtual mozilla browsers to fetch, process, render, and scale web pages for our users' mobile phones - millions of users all over the world. This situation (slowdown during peak hours) is … | |
Re: Did you say this is a LG (Lucky Goldstar) monitor? If so, they are generally of good quality. Many monitors (vs TVs) don't have HDMI interfaces, but do have DVI. As for hotkeys, what do you mean by that. I have dual DELL displays on my system, and they do … | |
Re: Try booting into the recovery partition, and restore missing/broken components. | |
Re: The best resource I know of for Linux wireless issues (links to drivers, installation instructions, etc) is www.linuxwireless.org | |
Re: What are you using for your UML modeling tool? In any case, most such tools with which I am familiar (most of them) will let you make multiple connections between two classes. After all, that is not a totally unknown requirement, such as modeling a binary tree, where you have … | |
Re: I don't suppose you have tried building this debuggable, and they tried running it in a debugger? | |
Re: Your file system has been corrupted due to the hard shutdown. You need to boot with a recovery disc or partition and fix the file system before you can continue. | |
Re: So, you are using a directional antenna to connect your local router/access-point to another A/P across the campus? Check out the cable run. It may have been damaged (kinked, cut into, nibbled on by rodents), which can cause a serious degradation in the signal getting to/from the antenna and transceiver. … | |
Re: Internet address numbers and top-level domains are managed by the IANA (Internet Assigned Numbers Authority). These domain controllers share their data with each other, and as a new name/number comes on line, that information (routing information, etc) is passed around the internet so that eventually everyone can find it. Your … | |
Re: The actual ethernet frame size is 84-1542 octets (bytes) in size. Here is a wikipedia article about it: http://en.wikipedia.org/wiki/Ethernet_frame The last 12 bytes is taken up with the interframe gap, so the actual data packet, including the CRC is 1530 bytes in length. | |
Re: What *precisely* are you looking for? What do you mean by "windows structure", etc? | |
Re: It may be a clock syncronization problem. Make sure all your systems are getting clock updates using NTP. You can either use an internet NTP server such as NIST, etc, or you can set up a local server on your LAN which will keep all the PC's updated locally, yet … | |
Re: My wife bought one this weekend, but she won't let me within a half-mile of it! She loves it, though after downloading less than 1/2 of her iTunes account to it, there is less than 1/2 of the disc space left... :lol: The resolution is phenominal, and it is incredibly … | |
Re: What distribution+version of linux, and which version of wpa_supplicant are you using? FWIW, this is a pretty new enhancement, so you may need to get current sources and build it from scratch. | |
Re: The simplest way is to use the C function `strchr(const char* source, char target)`. It will return the pointer to the character if found in the string, or null if not. | |
Re: See Knuth, Volume 3, Sorting and Searching, Addison-Wesley Pub. | |
Re: Are you looking it up by key, or by value? Do you need to handle duplicates? Does it need to be sorted? What is the average tuple (element) size? How many elements will your collection contain? Before days of the STL (Standard Template Library) I implemented a wide variety of … | |
Re: So, this is a 3-part problem. Solve each separately, and then see if you need to make some changes to make them all work together. Example of a possible issue to bring up with your professor is #2, "when the numbers are put into the array, are the sums of … | |
Re: The symbols ROW_BOUNDS and COL_BOUNDS are macros? If so, please post their definitions (in their entirety) here. Also, you are missing other code, such as where mat1rows, et al are declared and defined. IE, you need to post the function declaration that you are calling here, as well as the … | |
Re: A bad connection, or bad wire which have excess resistance will generate the heat you felt. The cable is fubar. Contact Gateway, and if they resist replacing it free, tell them they are lucky your system didn't burst into flames, resulting in a costly lawsuit and a lot of more … | |
Re: Swap elements 1 and 3: void swap1and3(void) { char* p1 = &menu[1]; char* p2 = &menu[3]; char tmp; tmp = *p1; *p1 = *p2; *p2 = tmp; } | |
Re: Don't use atoi(). Use strtol(), strtoul(), etc. The last (third) argument passed to the function is the base. It will try to convert intelligently if the base is 0, so if the string is 0xCAFEFACE, it will look at the "0x" and convert from hex, where 01234567 would be treated … | |
Re: The most common x86 assembler for Linux is yasm. | |
Re: Any uninitialized variable will contain whatever is in that chunk of system memory (automatics are on the stack, so whatever was in that stack space). If you were to run a function in a loop, since the stack when the function is run will always be at the same place, … | |
Re: Also, the way you are reading the file, you are reading each word separately. Is that what you want to do? What about duplicates? Anyway, I implemented an insertion sort for C++ years ago (about 20 years ago) that used a modified bsearch() routine to find the insertion point in … | |
Re: Start by studying other kernels - simple ones like FreeDOS, for which the source code is available. You need a kernel (control program), and a shell (monitor), along with some utilities to do something like look at system activity, etc. There will be drivers necessary in order to access any … | |
Re: :lol: Good one! And just how many billion$ do you have available for this exercise? | |
Re: Most of your code is pretty bogus... :-( 1. The structure member `ar[]` has the size outside of the brackets. Wrong... 2. The rest of your code is bogus. The initialization of buff is not correct. 3. What is this while() condition? And what are the minus signs preceeing the … | |
Re: Can you boot into safe mode and run a virus scanner on your system? | |
Re: Do we also get your degree when you graduate? | |
Re: A reasonably full-featured router for the network should allow you to block internet access to all but the authorized systems. You can do this with a dedicated router (cheapest, and easiest method), or a computer that is acting as a router. | |
Re: By "go the other way" you mean you use `s.at(i) = tolower(s.at(i))`? | |
Re: Abstract: exists only in concept, not in reality. In C++ this would be a class with virtual member functions that have no implementation. Exampe: class abstract { public: abstract(); abstract(const abstract& cpy); ~abstract(); abstract& operator=(const abstract& rhs); virtual unsigned computeArea() = 0; }; Note the virtual method declaration that has … | |
Re: 1. Easy access to the innards of the system, including disc drives. 2. Good cooling. 3. Fully buffered ECC RAM - this is error correcting RAM which will continue to run even if one of the memory sticks fail, allowing you time to take down the system cleanly before you … | |
Re: You basically want your circular list class to extent the linked list class, not encapsulate it as you have. Then, your circular list class will ensure that the last node is pointing to the first node in the linked list. It eliminates a lot of cruft and lets you focus … | |
Re: Yes, in theory you can have a zero-size array, but you cannot do anything with it except get its address! And, even though conformant compilers will deal with it, it may actually have no address since it uses no space! My guess is that the compiler simply eliminates it as … | |
Re: Well, with Linux and a bash shell, this would be trivial: find . -type f -exec chown name.group {} \; find . -type f -exec chmog ugo+rw {} \; etc. So, you can install Cygwin (free Linux/Unix environment for Windows) and have these tools available for you. I find they … | |
Re: If you can post your code that broke the compiler here, it may be illustrative. Usually something weird in the code will cause this sort of problem, although I have broken many compilers with perfectly legal code. In some of those cases I had to rattle cages at the top … | |
Re: Actually, it is called Thunderbolt. It is a high-speed interconnect for audio, video, data, etc. You can connect appropriate stuff at multi-gigabit speeds, such as external displays, disc drives, etc. It is sort of a replacement for firewire, but with more capabilities. | |
Re: Also, check out ffmpeg - free, fast, and converts just about anything to anything else in the video universe. Usually it is used on Linux, but there are Windows builds as well. Here is a link to those: http://ffmpeg.zeranoe.com/builds/ The main ffmpeg site is www.ffmpeg.org. | |
Re: Back in the day when Ethernet was over coax cables, half-duplex was a necessity (the comment about CSMA-CD is appropriate here). That changed with ethernet over twisted pair when you could have separate channels for sending/receiving data. Back then, before ethernet could run over twisted pair, ethernet was not suitable … | |
Re: Good question. Have you run a virus scanner (or 3) on your system to determine what has infected you? | |
Re: Whew! I haven't coded any ADA for about 7 years, so it will take me a bit of refresher time to help you on this. Be patient! :-) | |
Re: Where is the declaration/definition of stuff[]? | |
Re: A VPN is the usual way, although if your bandwidth needs are great, you might be better off leasing dedicated bandwidth on the fiber optic cables between point A and B. My company (a tier-one mobile phone manufacturer) has data centers in a number of places all over the world. … | |
Re: I used to use Roxio a LONG time ago. I long since switched to Alcohol 120% for Windows disc ripping and writing. It has been 100% more reliable than Roxio's cruft. Here is a link: http://www.alcohol-soft.com/ | |
Re: Most A/V products perform what is called "on access scanning" in that when you start a new program, then the A/V product will scan the program file and all loaded components (shared libraries, and other files) before allowing it to run. This can cause serious performance problems, as you have … | |
Re: Beginning with L7Sqr's comment, there are a lot of resources out there, including the source code for GCC/glibc and other compilers/libraries out there that implement malloc/free which you can study to help understand what is going on. I did a considerable amount of research back in the 1990's into memory … |
The End.