5,331 Posted Topics

Member Avatar for vindy1099

I think that the Boost library handles arbitrarily large numbers for math. Have you looked at that code? It is open source so you should not have a problem accessing it.

Member Avatar for rubberman
0
307
Member Avatar for silvercats

There are a number of good text books on compilers (and building them) - I have at least 3 or 4 on my bookshelf; however, this is not a beginner-level subject. There is some good documentation on the GNU web site, especially as related to the GCC (GNU Compiler Collection) …

Member Avatar for Moschops
0
169
Member Avatar for Its.Obi

In my experience, this sort of problem is most commonly caused by anti-virus software that encorporates what is commonly called "on access scanning". IE, every file and executable (as well as DLL) is scanned on access when you start a program or read a file. This is VERY expensive in …

Member Avatar for Rik_
0
269
Member Avatar for chester1908

Visit this site - lots of helpful documents, books, etc on linux kernel programming: www.tldp.org

Member Avatar for rubberman
1
330
Member Avatar for BRUNHILLE

A lot of systems today (Windows, Linux, et al) will let you hibernate your system, saving runtime state to the hard drive. When you restart it, it only needs to restore the system runtime state from the drive, and not boot the entire OS. This is typically much faster (by …

Member Avatar for rubberman
0
239
Member Avatar for callen91

Consider school as a low-level apprenticeship where you learn just enough to be dangerous! :-) If you had good grades and your school is considered competent in turning out graduates with some capability, you can get a starting position in many organizations given the current need for IT and software …

Member Avatar for rubberman
0
78
Member Avatar for tomz6

Compiling code that can be used on various systems is not simple, but you can direct some compilers, such as GCC, to emit ELF or COFF intermediate code that can subsequently be used to generate machine/OS-specific binaries. If you just want to "protect" your code, but let people use it …

Member Avatar for rubberman
0
182
Member Avatar for tomz6

MD5 is popular because it can be implemented small and fast. Better ones are SHA256 and SHA512 hashes, which can be implemented pretty efficiently in todays' hardware. In any case, adding a salt value to permute the hash of a string is always a good idea from the security perspective. …

Member Avatar for rubberman
0
315
Member Avatar for manchurianCEO
Member Avatar for rubberman
0
170
Member Avatar for saleeou

As Senior Systems Engineer responsible for performance engineering at our numerous world-wide data centers I have a little expertise in this domain. The first thing you need to do is to determine what performance metrics are applicable for you. The next thing is to capture that performance data in a …

Member Avatar for rubberman
0
110
Member Avatar for Techno22

This is a laptop? Many laptop WiFi devices are USB connected, even when they are internal. My Dell D630 Wifi card is usb, but internally connected.

Member Avatar for Techno22
0
206
Member Avatar for varadha_sd

What do you know about compression algorithms? There are RLL (run-length limited) ones that work well with streaming data, and others, such as zip and similar ones (Lemple-Ziv) for data sets that are fixed in size. What have you tried?

Member Avatar for varadha_sd
0
202
Member Avatar for shhhhhh14

Average: total = 0; for (i = 0 i < N; i++) { total += array[i]; i++) } avg = total/N; You get to figure out the coding errors... :-)

Member Avatar for rubberman
0
103
Member Avatar for Learningvinit

Just stating that you have a compiler and/or runtime error is not too helpful. Please post code, compiler errors, and other compiler/make instructions.

Member Avatar for rubberman
0
178
Member Avatar for Daigan
Re: 8085

Is anyone still using 8085 chips? :rolleyes: I haven't since the mid-1980's! I think I still have an 8085 reference manual on my bookshelf somewhere. Let me look and I'll get back to you! :-)

Member Avatar for rubberman
0
97
Member Avatar for waqas.zafar.125

void insertAtHead(void* p) { void* ptmp = head; head = p; p->next = ptmp; } void insertAtTail(void* p) { void* ptmp = tail; ptmp->next = p; tail = p; } Of course, this is the simplified view. If you don't have a pointer to the tail member, then you need …

Member Avatar for rubberman
1
184
Member Avatar for tomz6

What the others said is true, but (with Linux/Unix at least) you can store stuff in RAM using shared memory. As vmanes said, it is volatile, in that when you reboot the system, it will be lost; however, it will be available as long as the system is running.

Member Avatar for rubberman
0
242
Member Avatar for gelmi

1. Don't use goto statements (bad, bad, bad! except in very RARE situations). 2. Using recursion (calling your own function from within your function) can be very useful. Computing a Fibbonacci sequence is a good example of this. 3. Don't list ALL of your code here (340+ LOC is counter-productive). …

Member Avatar for rubberman
0
167
Member Avatar for tanmay.majumdar2

:-) Good points Nathan! Tanmay, if you want to really understand random number generators, go visit http://www.phy.ornl.gov/csep/CSEP/RN/RN.html It is the best tutorial I have seen regarding random number generators! I have been involved with this field for 30+ years, so I think I can say that without reservation!

Member Avatar for rubberman
0
219
Member Avatar for dreday92

As per Agni - post compiler errors or what your problem is. Just posting 250 lines of code (more or less) is not usefull. Sure we could analyze it in detail - I'm paid $50USD+ per hour to do that just for my normal employment, and $200USD for consulting time …

Member Avatar for rubberman
0
268
Member Avatar for ireallyneedhelp

IE (per Eagletalon), post some code that you think will implement your requirements, and then we may be happy to critique/correct/criticize it! :-) I am paid a 6-figure (in US Dollars) income to do this - don't expect me to just give you my time if you aren't willing to …

Member Avatar for rubberman
0
189
Member Avatar for tomz6

In this case, the answer is "it depends"... Some fonts are vector fonts, and others ware bit-mapped. IE, what you want to do is trivial with bit-mapped fonts (but not necessarily pleasing to view when expanded), but not easy to do with vector fonts (they are scaled when output). I …

Member Avatar for rubberman
0
125
Member Avatar for Lightninghawk

Not a good idea! Unless you have specific permission to do so, you will likely get a visit from some unfriendly people dressed in black suits...

Member Avatar for rubberman
0
100
Member Avatar for PHIPH

I'm not sure there is such. I was trained by IBM, AT&T, and others in the hardware repair and maintenance of their systems, and received certificates of completion of their courses for such, but I am not aware of any general certificate in computer repair and maintenance - not to …

Member Avatar for bryann
0
133
Member Avatar for herbiebill

To determine the behavioral changes in Oracle Reports from 6i to 11g, try reading the manual! There have been MANY changes in the years between these releases!

Member Avatar for herbiebill
0
141
Member Avatar for wids101

Well, you are 1/2 the way there. You haven't computed the change, and just output the cost. A bit more effort and you will solve this! :-)

Member Avatar for wids101
0
225
Member Avatar for tubzz

2-dimension sort 1. for each member of first element, sort second. 2. sort each member of first element, and maintain order of second. Enjoy! And BTW, you have your rows (first element) and columns (second element) reversed! Your 3x4 array should be 3 rows of 4 columns, not the other …

Member Avatar for tubzz
0
423
Member Avatar for ranjit jadega

Well, all of your links are invalid - not found (404 errors). So, please be more specific as to what you are curious about. There are a number of answers to this "question", depending upon what you are referring to.

Member Avatar for JorgeM
0
71
Member Avatar for ingeborgdot@yah

This is not an issue about free vs. commercial tools. It is likely that your commercial tools didn't handle read errors properly. This can also happen with free (open source) tools. In any case, it is wise to have multiple tools in your chest, just for such situations! :-)

Member Avatar for caperjack
0
223
Member Avatar for manchurianCEO

If you don't have the original system password, then you need to do this: 1. Wipe disc COMPLETELY. Boot from a live CD/DVD/USB Linux system - and then from a terminal command line window, run the command: dd if=/dev/zero of=/dev/sda bs=1M 2. Create a new boot sector / partition table, …

Member Avatar for manchurianCEO
0
232
Member Avatar for owenransen

I vote with Nathan. Create a base class with the behaviors (as virtual functions) you need, and then for each subsequent standard, all you need to do is implement the deltas with a new derived class. Using a reference or pointer to the base class, it will do what you …

Member Avatar for owenransen
0
199
Member Avatar for n.cramp

At this point, if it isn't under warranty, just get a new computer. Just because the mobo is bad does NOT mean other stuff isn't also, such as the PSU, CPU, etc.

Member Avatar for rubberman
0
259
Member Avatar for Potgiesh

What deceptikon said. Writing good serialization code is not simple, and just writing an instance of a class (especially if it has pointer data, or virtual functions) will not work as you would expect. As he mentioned, you can use pre-packaged serializers such as provided by the boost library, or …

Member Avatar for rubberman
0
206
Member Avatar for Violet_82

Send the computer in for repair. It may be possible to find such a charging device, but the question is whether or not the xps ports are configured to allow that. You might want to connect with Dell Tech Support (they have a decent browser-based chat capability) and ask them …

Member Avatar for Violet_82
0
87
Member Avatar for ronnel09_1

You can set a timer to generate an interrupt. It will happily run until it expires. In your code for the quiz, if the quiz finishes without the timer triggering the interrupt, then you can cancel it. What OS are you programming this on? Some timer types are not supported …

Member Avatar for ronnel09_1
0
95
Member Avatar for triumphost

Class members are part of a class instance. Where they live depends upon where the instance lives. If you declare an instance of a class as an automatic variable, then it is on the stack. If you allocate it with operator new, then it is on the heap. See example: …

Member Avatar for mike_2000_17
0
17K
Member Avatar for Potgiesh

Both of the popular cross-platform GUI toolsets have been mentioned - Qt and WxWidgets. I've used both on Unix/Linux/Windows and while very different in flavor, they both work very well. There are other tools as well, though a bit more low-level, such as GTK and such. Myself, if I want …

Member Avatar for mike_2000_17
0
467
Member Avatar for eogunlolu

What deceptikon said! Make an effort, and we will be happy to critique it - otherwise I have a library you might be interested in! :-)

Member Avatar for rubberman
-1
198
Member Avatar for mical700

As AD said. On most modern systems, if you are running a 32-bit OS, a long int is 32-bits, and a long long int is 64. On 64-bit systems, mostly (not sure about Windoze - I run Linux) a long and long long both are 64-bits. You can tell by …

Member Avatar for mical700
0
232
Member Avatar for dustin.mcalister.58

Where do you think it should be? Note that there are 7 slots in the array for the day of the week, but you are only stuffing one day. So, what about a loop around the "Enter Day" and the test output section?

Member Avatar for nullptr
0
182
Member Avatar for Hoju213

Check the power supply. Some of these cards pull a LOT of current, and many system power supplies are unable to handle it. Also, trade the AMD card back in for an nVidia one... Since pcworld support also suggested a new PSU (power supply), did you follow that advice?

Member Avatar for Rik_
0
346
Member Avatar for coolbeanbob

You haven't declared what the Do_Command type is. You can do this in such a case by adding before the definition of the class FOO_Factory this line: class Do_Command;

Member Avatar for rubberman
0
196
Member Avatar for rudolph23

OpenLDAB for Linux will work well with AD, with some caveates. For the most part, it works. Go to http://www.openldap.org/ for more information.

Member Avatar for metalized
0
218
Member Avatar for fyra

I've used Xen, VMware, and VirtualBox. I have had the best results with VirtualBox. It may have changed, but it used to be that you could not install a native nVidia video driver on a system running Xen, so you could not get full use out of modern displays. That …

Member Avatar for metalized
0
285
Member Avatar for normanallen

What Rik said. Also, why XP mode (other than because you are more comfortable with it)?

Member Avatar for normanallen
0
278
Member Avatar for Nina203
Member Avatar for guru_iyer

As all before said. Easiest, add two more 1GB simms to the remaining slots. That will max out the system if you are running a 32-bit OS. If your CPU and hardware can handle 64-bit systems, and you install one, then you might be able to install 4x2GB or bigger …

Member Avatar for vinnit
0
248
Member Avatar for trishtren

What text book(s) are you using? There are some good ones out there that deal with this stuff. Generally, you tokenize the code, and then create a set of tree structures or finite-state-machine to represent the program. As you might infer from this, there is more than one approach that …

Member Avatar for trishtren
0
193
Member Avatar for wschamps42

At a minimum, 10xsizeof(double*). The size of a pointer depends upon whether you are running in 32-bit or 64-bit mode. The easy way to tell is to execute the function/macro `sizeof(p1)`.

Member Avatar for Banfa
0
155
Member Avatar for ganges

This may not be easily fixed. You may need to reset the computer to factor settings - losing everything on it. I have a system donated to my grandson that has a BIOS password set, and it cannot be reset wtihout contacting the manufacturer and providing a one-time secret key, …

Member Avatar for professor123
0
203

The End.