Search Results

Search found 11141 results on 446 pages for 'base conversion'.

Page 207/446 | < Previous Page | 203 204 205 206 207 208 209 210 211 212 213 214  | Next Page >

  • Can software company claim the intellectual property rights on my paintings?

    - by maksymko
    This is somewhat related to this question. I'm about to sign a contract with a company that this sort of "all your base are belong to us" clause in it: it says that all programs, designs, sketches, drawings I create in relation to my job belong to the company. More or less usual stuff (unfortunately). What worries me, however, is this "drawings, sketches" thing, because I'm a hobby-artist and I paint and draw at my spare time. Can the company somehow claim ownership of intellectual rights on this work? Should I ask them to explicitly state that this clause does not extend to work of art or is this "in relation to the job" part is good enough?

    Read the article

  • Grouping IP Addresses based on ranges [on hold]

    - by mustard
    Say I have 5 different categories based on IP Address ranges for monitoring user base. What is the best way to categorize a list of input IP addresses into one of the 5 categories depending on which range it falls into? Would sorting using a segment tree structure be efficient? Specifically - I'm looking to see if there are more efficient ways to sort IP addresses into groups or ranges than using a segment sort. Example: I have a list of IP address ranges per country from http://dev.maxmind.com/geoip/legacy/geolite/ I am trying to group incoming user requests on a website per country for demographic analysis. My current approach is to use a segment tree structure for the IP address ranges and use lookups based on the structure to identify which range a given ip address belongs to. I would like to know if there is a better way of accomplishing this.

    Read the article

  • How can I rewrite a subdomain to go to a specific file in a specific folder?

    - by FasterHorses
    I've done searching for my answer and have tested a few solutions, but nothing has worked so far. I'm trying to get a URL like this: http://baseball.sports.com to rewrite to... http://pro.sports.com/baseball-index.php However, I still need to keep the domain the same (http://baseball.sports.com). The reason being I have about 5 subdomains (baseball, football, soccer, etc) that I want to run off the same code base (pro.sports.com). Everything is on the same server. I'd be happy to answer any other questions that would help me get a resolution. I truly appreciate any direction that can be given to me to solve this. Thanks! --Nick

    Read the article

  • Laptop Regret

    - by Richard Jones
    Just a casual observation. To base line this. I've discussed this one terrible horror in the past, 'hot bag syndrome'. This is when you realise that you've just travelled home with your laptop enclosed in its carry case without it properly powering down. So new one today, 'Laptop Regret' You pull out your laptop and power it up connected to (boss in room) projector demo to reveal your previous nights Spotify dance music party mix / stroke / eclectic mix of website surfing (make what you will) collection. Its a social phenomena, it happens (not to me obviously), but I'd just like to benchmark my findings. (OK, it did happen to me)

    Read the article

  • Multiple vulnerabilities in Thunderbird

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-0451 Improper Control of Generation of Code ('Code Injection') vulnerability 4.3 Thunderbird Solaris 11 11/11 SRU 8.5 CVE-2012-0455 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability 4.3 CVE-2012-0456 Information Exposure vulnerability 5.0 CVE-2012-0457 Resource Management Errors vulnerability 9.3 CVE-2012-0458 Permissions, Privileges, and Access Controls vulnerability 6.8 CVE-2012-0459 Permissions, Privileges, and Access Controls vulnerability 7.5 CVE-2012-0460 Permissions, Privileges, and Access Controls vulnerability 6.4 CVE-2012-0461 Denial of Service (DoS) vulnerability 7.5 CVE-2012-0462 Denial of Service (DoS) vulnerability 7.5 CVE-2012-0464 Resource Management Errors vulnerability 7.5 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Why Android for new (micro) consoles?

    - by Klaim
    There are a lot of new (micro) consoles with Android inside coming soon or already there (OUYA for example). My question is: why use Android and not another OS as base for these consoles? I assume that there are pragmatic answers to this but I can't see any clear killer feature. For example, one can assume that any stable Linux distribution would work (like Valve seem to think). Android is primarily targetted at mobile platforms which mean it is built around the idea of being interrupted which goes against a lot of what console devs needs in new hardware - but is not killing Android as a platform for gamedev either as it's just a constraint. Why not another OS? What's the Android killer features that make micro-console builder using it instead of Linux or anything else?

    Read the article

  • Adobe Air apps on the Mac App Store?

    - by coneybeare
    Before you chastise me for asking this, I have an Adobe Air app that has a lot of investment in it, and if there is a way to utilize the existing code-base in any way, it is worth considering. I have heard news reports in passing about Adobe creating some kind of tool to allow flash or air apps to be ported to native objective-c code, but the information found in google is mostly commentary on the one-time Apple blockade. My question(s) is/are this: Is it even possible, at any level, to use an existing Air app to create a Mac Store app? If possible, what are the resources I can use to accomplish this?

    Read the article

  • Multiple vulnerabilities in Firefox web browser

    - by chandan
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-0451 Improper Control of Generation of Code ('Code Injection') vulnerability 4.3 Firefox web browser Solaris 11 11/11 SRU 8.5 CVE-2012-0455 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability 4.3 CVE-2012-0456 Information Exposure vulnerability 5.0 CVE-2012-0457 Resource Management Errors vulnerability 9.3 CVE-2012-0458 Permissions, Privileges, and Access Controls vulnerability 6.8 CVE-2012-0459 Permissions, Privileges, and Access Controls vulnerability 7.5 CVE-2012-0460 Permissions, Privileges, and Access Controls vulnerability 6.4 CVE-2012-0461 Denial of Service (DoS) vulnerability 7.5 CVE-2012-0462 Denial of Service (DoS) vulnerability 7.5 CVE-2012-0464 Resource Management Errors vulnerability 7.5 This notification describes vulnerabilities fixed in third-party components that are included in Sun's product distribution.Information about vulnerabilities affecting Oracle Sun products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Can all code be represented as a series of Map / Filter / Reduce operations?

    - by Mongus Pong
    I have recently been refactoring large chunks of code and replacing them with Linq queries. Removing the language bias - Linq is essentially a set of Map / Filter and Reduce operations that operate on a sequence of data. This got me thinking, how far would I theoretically be able to take this. Would I be able to rewrite the whole code base into a series (or even a single) of Map / Filter and Reduce operations. Unfortunately I get paid to do useful stuff, so I haven't been able to experiment much further, but I can't think of any code structure that couldn't be re structured as such. Side effected code can be dealt with via monads.. Even output is essentially mapping memory addresses to screen addresses. Is there anything that couldn't be (theoretically) rewritten as a Linq query?

    Read the article

  • Vers des serveurs embarquant des puces ARM basses consommations ? Crédible, souhaitable ou irréalist

    Vers des serveurs embarquant des puces ARM basses consommations ? Crédible, souhaitable ou irréaliste ? ARM est connu pour ses puces basses consommations qui équipent bons nombres de terminaux mobiles allant des téléphones portables aux netbooks. Mais le consortium, basé à Cambridge, aurait d'autres projets dans ses cartons. C'est en tout cas ce que laisse entendre son directeur Marketing, Ian Drew, qui vient de révéler qu'un site test (le Linux Internet Platform) utilisait un serveur embarquant une puce ARM depuis environ un an. Ce test ferait suite à plusieurs demandes de la part de clients particulièrement intéressés par des les économies d'énergie que pou...

    Read the article

  • Simplicity-effecincy tradeoff

    - by sarepta
    The CTO called to inform me of a new project and in the process told me that my code is weird. He explained that my colleagues find it difficult to understand due to the overly complex, often new concepts and technologies used, which they are not familiar with. He asked me to maintain a simple code base and to think of the others that will inherit my changes. I've put considerable time into mastering LINQ and thread-safe coding. However, others don't seem to care nor are impressed by anything other than their paycheck. Do I have to keep it simple (stupid), just because others are not familiar with best practices and efficient coding? Or should I continue to do what I find best and write code my way?

    Read the article

  • Drive By Download Issue

    - by mprototype
    I'm getting a drive by download issue reported on www.cottonsandwichquiltshop.com/catalog/index.php?manufacturers_id=19&sort=2a&filterid=61 reported from safeweb.norton.com when I scan the root url. I have dug through the entire site architecture, and code base and removed a few files that were malicious, i upgraded the site's framework and fixed the security holes (mostly sql injection concerns)..... However this one threat still exists and I can't locate it for the life of me, or find any valid research or information on removing this type of threat at the server level, mostly just a bunch of anti-virus software wanting to sell you on their ability to manage it on the client end. PLEASE HELP Thanks.

    Read the article

  • Setting Up Audio on a Server Install

    - by tdcrenshaw
    I'm running on a clean install of 10.10 Server edition and have alsa-base, alsa-tools, alsa-utils, alsaplayer, and alsa-firmware-loader installed. At one point I installed pulseaudio, but I have since removed it. I've tried the following lspci | grep audio 00:1f.5 Multimedia audio controller: Intel Corporation 82801DB/DBL/DBM (ICH4/ICH4-L/ICH4-M) AC'97 Audio Controller (rev 01) 01:06.0 Multimedia audio controller: Creative Labs [SB Live! Value] EMU10k1X aplay -l aplay: device_list:235: no soundcards found... alsamixer can not open mixer: No such file or directory When I search for modules with find /lib/modules/`uname -r` | grep snd I do get a list of modules I'm not very experienced with alsa setup, so I'm not sure where to go from here

    Read the article

  • UBUNTU 11.10 will not boot after succesfully installed on 8GB usb 3.0 pendrive

    - by Oldrifle
    UBUNTU 11.10 on 8GB USB 3.0 pendrive. Drive Partitioned using gparted. 4GB BASE 3GB Home 600MB swap Installation Ok. Restart blinking cursor. Installed another distro on another USB 3.0 stick. It boots OK. --------------- DEBUG -------------------------------------- Boot Other distro and check: I compare boot file with another linux. grub of ubuntu is 1.4mb contend is different. Taken photo with mobile camera but can not add here. Files has note(music) sign on it. Downloaded 11.10 desktop and Installed. Same result. Will download 12.x when ready and try. Ready to try any suggestion.

    Read the article

  • Is it viable to become a contract programmer straight out of college?

    - by M G
    I have a Bachelor of Science in Computer Science and four months research experience designing and implementing a research project. I realize this is highly dependent on my skill set - which includes C, C++, Java, Python, and SQL. I feel I have an advantage in two ways: I am young and am not afraid to work overtime. I am willing to take lower pay to gather a client base/experience, and work nights/weekends to get a few projects under my belt. This may be cliche, but I feel that I can learn new technologies quicker than most. At the very least, I am not a slow study. With this being said, is it viable for me to become a contract programmer? Or do I need the 10+ year skill set that most contractors bring to the table?

    Read the article

  • Perl fête ses 25 ans, que pensez-vous de l'évolution du langage de programmation ?

    Perl fête ses 25 ans que pensez-vous de l'évolution du langage ? Perl (Practical Extraction and Report Language) a un quart de siècle cette semaine. Le langage de programmation dérivé des langages de scripts shell, sed, awk et du langage C avait été lancé en version 1.0 le 18 décembre 1987 par Larry Wall. Le langage avait été présenté comme une alternative aux utilitaires de traitement de texte Unix Sed et Awk. C'est un an plus tard après la sortie de la version 2.0 que Perl va réellement décoller. En 2000, Perl sort en version 6 et est entièrement réécrit à partir de zéro, tout en concevant ses principes de base. Le langage interprété est surtout apprécié...

    Read the article

  • Kernel Linux : la version stable 2.6.38 est disponible, elle optimise la fonction de résolution de la couche VSF

    Kernel Linux : la version stable 2.6.38 est disponible Elle optimise la fonction de résolution de la couche VSF La version stable 2.6.38 du noyau Linux vient d'être rendue disponible et annoncée officiellement par Linus Torvalds. Cette version apporte des améliorations importantes au niveau des performances. Le Kernel intègre désormais le support transparent des « huge pages » (TPH) qui permet d'obtenir de meilleures performances sur des charges de travail qui nécessitent beaucoup de mémoire (on pense aux serveurs JVM et serveurs de base de données). TPH utilise des pages mémoires de grandes tailles (2 Mb) par opposition aux pages traditionnels de 4 Ko. Une autre nouveauté est l...

    Read the article

  • Multiple vulnerabilities fixed in Java 7U9

    - by RitwikGhoshal
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-5086 10.0 Java 7 Solaris 11.1 10/12 SRU 2.5 CVE-2012-5083 10.0 CVE-2012-5087 10.0 CVE-2012-1533 10.0 CVE-2012-1532 10.0 CVE-2012-1531 10.0 CVE-2012-5076 10.0 CVE-2012-3143 10.0 CVE-2012-5088 10.0 CVE-2012-5089 7.6 CVE-2012-5084 7.6 CVE-2012-3159 7.5 CVE-2012-5068 7.5 CVE-2012-4416 6.4 CVE-2012-5074 6.4 CVE-2012-5071 6.4 CVE-2012-5069 5.8 CVE-2012-5067 5.0 CVE-2012-5070 5.0 CVE-2012-5075 5.0 CVE-2012-5073 5.0 CVE-2012-5079 5.0 CVE-2012-5072 5.0 CVE-2012-5081 5.0 CVE-2012-3216 2.6 CVE-2012-5077 2.6 CVE-2012-5085 0.0 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions. Information about each CVE can be found on Java SE Critical Patch Update - October 2012 Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • Sortie officielle de WebMatrix, le nouvel outil de développement Web de Microsoft pour les débutants ou les petites entreprises

    Sortie officielle de WebMatrix Nouvel outil de développement web de Microsoft pour les débutants ou les petites entreprises Mise à jour du 14/01/11 Comme nous l'avions prévu hier (lire ci-dessous) WebMatrix, le nouvel IDE de Microsoft est sorti. WebMatrix est un outil tout-en-un destiné à tous les développeurs mais particulièrement aux étudiants, ou ou aux personnes cherchant un moyen simple et rapide de créer un site Web. Il comprend IIS Express (serveur de développement web), ASP.NET Web Pages (technologie de développement web), et SQL Server Compact (base de données embarquée). « WebMatrix démocratise la plateforme web en...

    Read the article

  • Programming Language Family Tree?

    - by user134353
    As a man interested in programming, I must ask if there is a cataloged hierarchy of languages. I'd like to learn to actually understand what's happening- that is to say, I don't want to use a compiler until I understand what a compiler does and how to make my own. I really do want to start from total scratch. I'm told that means "machine code"? I don't know. What I do know is that "C++" is not the start. I'm not interested in learning that until I can actually break software down to its very base and see how the pieces go together.

    Read the article

  • Google migre AdWords de MySQL vers F1, son nouveau SGBDR distribué, développé en interne qui combine le meilleur de NoSQL et SQL

    Google migre AdWords de MySQL vers F1 son nouveau SGBDR distribué développé en interne qui combine le meilleur de NoSQL et SQL Google a développé en catimini son propre gestionnaire de base de données relationnelle. La société a déplacé récemment plusieurs de ses services de publicité de MySQL vers F1, un nouveau SGDBR « Fault-Tolerant Distributed » développé en interne. Présenté lors du forum SIGMOD 2012 de Scottsdale en Arizona sur les bases de données, F1 combine les meilleures approches des SGBDR et des bases de données NoSQL, selon la division Google Research, à l'origine du projet. F1 est essentiellement centré autour de l'évolutivité, la tolérance aux pann...

    Read the article

  • Handling (many) multiple projects in Git in an enterprise environment

    - by Michael K
    One of the advantages of older version control systems such as CVS and SVN in enterprise development is that anyone can connect to source control and see all the projects that the company has. This can make it easier to get a high level view of what kid of development is happening outside your sprint and also keeps everything in one place and easy to find. However, distributed version control systems (Git, specifically) use the repository as their base unit. They work best with one project (or several closely related projects) per repository. This makes repository management more difficult in most enterprise environments where it is not unusual to have more than 25-50 projects to support. As far as I have been able to determine, you have to keep a list somewhere else of all the repos you have. There is software available, like GitHub, that help, but that still is an extra step beyond a single connection string and listing the contents of the repository. What is the best way to deal with the complexity of multiple repositories?

    Read the article

  • Le HTML 5 sera publié en 2014, le HTML 5.1 en 2016, le W3C sortira une nouvelle norme tous les 2 ans

    Le HTML 5 sera publié en 2014, le HTML 5.1 en 2016 le W3C adopte un cycle de développement continu avec la sortie tous les deux ans d'une nouvelle norme Le W3C, l'organisme de normalisation du Web vient de publier une feuille de route détaillée pour la spécification HTML5. Né en 2004, le langage est vu comme la future norme basée sur les technologies Web natives et standardisées qui mettra fin à l'utilisation de nombreux plugins et ouvrira la voie au développement multiplateforme sur une base de code unique. Le langage avait atteint en février 2011 le stade du "dernier appel" (Last Call) correspondant à la satisfaction des exigences techniques et le début d'un vaste exa...

    Read the article

  • Is there a canonical source for learning C# and .NET internals?

    - by ta269uec
    I have been a C++ programmer for last several years with a bit of C# here and there. In my latest job, I work heavily on C#. I picked most of my C# by following the code-base or random google searches on what I wanted to do at that point (like threading in C#). I feel a time has come to invest some time into understanding the language internals and also understanding the .NET framework from an architectural point of view. Can someone recommend the "gold standard" text/resource for accomplishing these? What about that resource makes it the best? What were your experiences with it?

    Read the article

  • Facebook rend open source Ringmark, sa suite de tests pour applications Web mobiles, plus de 400 tests disponibles

    Facebook rend open source Ringmark sa suite de tests pour applications Web mobiles, plus de 400 tests disponibles Facebook a publié sous une licence open source le code de Ringmark, une suite de tests pour les navigateurs mobiles pour la création d'applications mobiles Web. Ringmark avait été présenté pour la première fois il y a quelques semaines lors de l'événement Mobile World Congres de Barcelone. L'outil est conçu pour fournir aux développeurs des fonctionnalités de tests de base qu'ils ont besoin pour construire des applications Web mobiles conformes aux standards. La suite de tests va aider ceux-ci à mieux comprendre comment les navigateurs mobiles prennent en charge...

    Read the article

< Previous Page | 203 204 205 206 207 208 209 210 211 212 213 214  | Next Page >