rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

This is not enough information. Please show what you have done.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Some of us are professional software engineers. For long term contracts I get $70-100USD per hour. For short term ones, $200. So you can see that the time I spend here and on the Linux Forums is valuable to me. Happygeek and Armand_2 have it just right.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Symantec's certs were serious hacked recently which is why this happened.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Show your work where you try to deal with this and then we can help you. FWIW, it isn't difficult and you may want to read the manual (they are online at google.com).

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Posting 200+ lines of code for a simple problem is disrespectul of the time we spend to help you. Please show the relevant code for review.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

We don't do your homework for you. Make an effort and code it as you think it should be, and then we may be able to help you.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Why I don't use BluRay. When you buy it, you don't own it. You are only renting it!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Books by Niklaus Wirth and Donald Knuth are good for this. Not cheap, but worth having on hand - they all have places of honor on my book shelf.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

RTFM! This is a simple system configuration setting, to instruct the system to restart on power-on. If you can't figure it out by yourself, you should not be doing what you are trying to do! Google will help...

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Please read the terms of service for these forums. We don't do your homework for you. Make an effort to solve this on your own, post your code and issues/errors you are getting, and then we can help.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You need an encrypt method that takes a list or array of files argument so it can encrypt each and put the output into the output file.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

OOP - classes + member variables + methods. Look at your code. What things could be expressed in classes? Zombies are one. There may be others.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Show your work such as what you are proposing for a database structure, how the tables are related, what are the primary and foreign keys, etc. We don't do your homework for you but will help once you have made some effort.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Do you know any C++ or other object oriented languages such as Java or C#? If so, consider PHP to be C++ for the web: classes, methods, member and global/static variables as well as just-plain-functions. Most people make a hash of PHP, but if they program it like they would C++ then all of a sudden it becomes a lot simpler to deal with.

ddanbe commented: Nice explanation! +15
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

This is a good academic paper on function programming in C++: https://people.cs.umass.edu/~yannis/fc++/fc++.main.pdf

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

You aren't making much sense. Please be more precise and complete in what you are trying to do, and how you are trying to do it.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Generally, the timestamp field will not be updated unless the row has changed, update statement notwithstanding. IE, it is indicating when the row was physically updated.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

What does "repeat" symbolize (lines 6 and 7)?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

I see the return value, but nowhere do I see where you define the other servelet and from that call controller::processUser.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Try using a live DVD instead of USB drive. That way, any faulty software on the live image can't break the media. Also, I am guessing that the ISO you built your live image from is faulty. Have you run a checksum on it and compared that to what is on the system you got it from? Also, did you get it from the Ubuntu web site, or somewhere else?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

The PHP web site, www.php.net, has plenty of good tutorials. Check there first.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Here's an alternative post:

How plan for gobbledegook (hacker) network blank word?
Ans: Ask Scoobydoo?

rproffitt commented: I had to ask Shaggy at http://www.cartoonnetwork.com/games/scooby/askswami/ +12
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

What rproffitt is politely trying to say is that we do not do your homework for you. Make an effort. Show your code and where you are having problems. At that point, we may help you. Also, do read the terms of use of this site. It covers this.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

The software restriction policy is probably from Amazon. You should check with them. As a side note, NEVER buy music, videos, or software that encorporate DRM (Digital Restrictions Management). When you do that, you aren't purchasing it. You are simply renting it. They can remove your access to your content at their will and you will be SOL.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Do you have a primary key or any unique keys defined for this table? If so, that is how you would do this deleting by primary key (unique) or another unique key.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Sorry. You do the coding. Then we can look at it and critique it. We don't give you the answers to your schoolwork.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

It depends is the correct answer I think. For systems with Intel processors, there is a built-in Intel GPU that these days is pretty good from the performance perspective. If you don't need the highest performance graphics (top-end gaming, video processing, etc) then a dedicated GPU such as an nVidia card is overkill.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

This is a bad mixture of C and C++. Also, your main() function does nothing. First question is whether you are are supposed to be writing C or C++ code? If C++, then your structs for Graph and Edge should be classes and not structures. Yes, structs in C++ are classes where all members are public. If that is what you want, then ok. Another issue is that you are not properly encompassing expressions such as using while (e < V - 1) instead of while (e < (V - 1)) - it could possibly be evaluated as while ((e < V) - 1). Always be explicit in what you mean when writing code like this. This sort of code may work 99% of the time. That other 1% will bite you right on the ass! Oops. Sorry but I didn't mean for the rocket to fly into the sun! Doh! Also, if this is supposed to be C++ use operator new instead of malloc(). If you have to, use calloc() instead - at least that way the memory allocated will be cleared to null values.

One final issue (but not the last) is that you don't validate your array boundaries such as in your find() and Union() functions.

So, review all of your code and decide what you are trying to do.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

I think that you can consider the ? to be the same as 'then'. IE, 1.45, then E+1, ... Remember, E is the power of 10 that is applied to the number. So, 1.45E+1 == 14.5. Clear as mud yet?

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Data caps? After you download so much data, they either start to charge you extra, or throttle your connection speed. Comcast is one of the worst for this. AT&T does the same, which is why I have a business connection - no caps and no throttling. If I were to have a consumer connection, then there are caps and throttling.

IE, read the fine print on your service agreement, with a magnifying glass!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Anyway, Marilyn and her daughters are tall (over 6') blond valkeries. They have been there since the 1970's - I was engaged to M before I met my wife. I lived with them when my wife was doing her post-doctoral work at Cornell, working as a consulting engineer. M was a teacher at the local elementary school and I would teach some computer classes to the kids. I would also babysit her kids when I was working from home. They are all grown up now, and are amazing women! That's why it is the House of Bigger Girls! :-)

So, here is her public FB page: https://www.facebook.com/marilyn.scott.79

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Re. EPA - not as bad as it was back 20-30 years ago when I lived there full time. Still, it's reputation lives on! Myself, never had a problem. It is right on the wetland preserves - great for hiking and general getting out into nature. Anyway, that's where I stay when I am out in the Bay Area. Interesting side-note. When I lived there in the 1980's, I was "adopted" into the local black biker gang as their "honorary" honky member! We drank a lot of beer, and nobody around would mess with me! :-)

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Assuming your system still sees the SSID of the WiFi accesspoint, then you will need to change your network (WiFi) configuration to use DHCP to get a network address from the local router.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

What tinstaafl said. Compilers turn all variable names into symbols anyway. So using X vs. Games doesn't make any difference to the size or performance of your code, but it DOES make it a lot easier to debug!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Well, we don't call it Comcrap for nothing! :-) Good speed though, but I hate their data caps and such. Let us know how it works out for you. I don't know when I'll be out in PA again, though I have family in Sacramento and PA/East PA. If you like jazz then check out the FB page for Marilyn Scott and The House of Bigger Girls. They put on jazz house concerts on a fairly regular basis - really great musicians. Joan Baez helps Marilyn organize some of them. Where else can you hang out under the redwood trees, eating, drinking, and enjoying great music?!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Never have had TWC. Verizon I had in the Boston Area about 10-12 years ago. I was one of their first FIOS subscribers. Here in Chicago we use AT&T, but only for phone and Internet.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

I assume your boys have some of their own $$? If they need more RAM, let them buy it. However, for the CPU, go as high as you can afford. As pty said, an i7 isn't that much over the top. Also, forget about SSD drives. Too expensive and in the long term, not as reliable as spinning rust. Get bigger rotating rust buckets instead. That's what I have in my new laptop - 4GHz i7, 16GB RAM, 1TB hard drive.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

As I have said to others, use logrotate. See the man page for logrotate and logrotate.conf usage. That will let you do exactly what you want.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Re floating point elements. I think you are correct, but just like integers, you may need multiple buckets such as [0,1], [2,3], etc to cover the range of elements. I haven't used a bucket sort since the 1980's so my recollection is a bit misty at the moment. :-) Insertion sorts, binary tree sorts, etc. not such a problem. Anyway, if you have Knuth's volume 3, "Sorting and Searching", then the answers are there. When I have to go back to "the source", that's where I go. :-)

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

I don't suppose there is a "neither up nor down vote" option for comments like mine? :-)

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

@JameCherrill - sorry, I woud not have down-voted your post if I was able to figure out a way to comment without doing that. Apologies. If you could advise me how to do that, I would appreciate it. That said, there are a number of reasons why simply closing and renaming the file and moving it elsewhere is not a (in my opinion) valid option as there could easily be more logs coming it that would still be going to the original filel Logrotate deals with all of that cruft. Having to deal with thousands of log files at Nokia in real time, I quickly discovered the "joys" of the tool! No lost data was one of the bigger benefits. We were collecting 10 billion data points per day from SAR, SNMP, and application log files from 5000+ servers world-wide. I looked at other options and realized that using a proven tool for this was much more efficacious. 10 billion data points and nothing lost!

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Look into the logrotate command and options. This is how we do it in enterprise systems. After the log file is rotated, you can copy it to backup media, to analyze at your leasure. Here is the relevant part of the logrotate man page:

DESCRIPTION
       logrotate  is  designed  to ease administration of systems that generate large numbers of log files.  It allows automatic
       rotation, compression, removal, and mailing of log files.  Each log file may be handled daily, weekly, monthly,  or  when
       it grows too large.

       Normally,  logrotate is run as a daily cron job.  It will not modify a log more than once in one day unless the criterion
       for that log is based on the log's size and logrotate is being run more than once each day, or unless the -f  or  --force
       option is used.

       Any number of config files may be given on the command line. Later config files may override the options given in earlier
       files, so the order in which the logrotate config files are listed is important.  Normally, a single  config  file  which
       includes  any  other  config  files  which  are  needed should be used.  See below for more information on how to use the
       include directive to accomplish this.  If a directory is given on the command line, every file in that directory is  used
       as a config file.
rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

The main problem, from the engineering perspective regarding the S7 battery problem, was that they wanted a really long runtime between charges on the battery, so they designed it to barely fit in the case (made as big as possible), and as it heated up and expanded, it would short circuit, causing the fires and explosions we have seen. The smaller battery will likely not have that problem, assuming that they allow adequate expansion room inside the case.

All that aside, I love my S5. Removable/replaceable battery, plenty of room for heat expansion, a back cover that can easily pop off if this problem were to occur.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Samsung S7? They have bricked all of those phones because of the danger of the batteries exploding.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

To continue: these same issues are relevant to SSDs (solid-state discs). They are really fast, but they should ONLY be used for read-mostly operations, such as operating system boot, system libraries and configuration files, etc. For your working data, use a standard disc, or risk losing everything very unexpectedly. This also applies to log files which are very much write-only data.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

What rproffitt said. In addition, FYI, pen/thumb drives (and sd cards) have a limited number of write cycles for each sector (512+ bytes). As that number is approached, the write time slows down, and then that sector is no longer accessible. There is more recent software that will attemp to wear-balance these behaviors so that the drive lasts longer, but unlike "spinning rust" (standard hard drives) when these solid state devices fail, they are done - period. This is why they are called "write once, read mostly" devices. They can be read pretty much forever, but only written to a limited number of times.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Ask Microsoft? If they are going to send you a text message with a code to verify your account, it could take awhile. I have seen such things take up to a couple of hours.

rubberman 1,355 Nearly a Posting Virtuoso Featured Poster

Have you forwarded port 5566 for the IP camera address (192.168.4.44)?