Search Results

Search found 14764 results on 591 pages for 'interview questions'.

Page 229/591 | < Previous Page | 225 226 227 228 229 230 231 232 233 234 235 236  | Next Page >

  • MVVM, Animations, Binding - I need a quick question answered.

    - by Peanut
    http://stackoverflow.com/questions/2455963/wpf-mvvm-dynamic-animation-using-storyboards There is a question i have found that relates directly to the issue I am having. The answer provided in that thread is a bit short, however. I did a little looking on google for 'attached properties' and i still remain a bit confused. Could someone shed a little light regarding this question? Perhaps provide a little sample code for the link stated above? Thanks in advance

    Read the article

  • Tuples vs. Anonymous Types vs. Expando object. (in regards to LINQ queries)

    - by punkouter
    I am a beginner who finally started understanding anonymous types. (see old post http://stackoverflow.com/questions/3010147/what-is-the-return-type-for-a-anonymous-linq-query-select-what-is-the-best-way-t) So in LINQ queries you form the type of return value you want within the linq query right? It seems the way to do this is anonymous type right? Can someone explain to me if and when I could use a Tuple/Expando object instead? They all seem very simliar?

    Read the article

  • what does 'legend' mean in sql?

    - by every_answer_gets_a_point
    im doing some practice sql problems one of the questions is: Prepare a shipping statement for customer 'C001' it should show the date, the legend 'Delivery' and the total value of the products shipped on each day. 'delivery' is not a table nor is it a column in any table. what does legend mean??

    Read the article

  • Batch file command PAUSE does not work

    - by Samaursa
    I am creating a simple batch file to assist in a few things, and I have some instructions that it prints out as well that I want the user to see before exit. Currently, the window closes very quickly. So I added PAUSE at the end of the file, but it does not want to work. I looked at other questions on SO and have checked to make sure the line endings are CRLF and that I have CRLF at the end of the file. Any suggestions?

    Read the article

  • Live chat rooms for learning ASP.NET?

    - by pkiyan
    I have come across a couple of sites in the past where a professional programmer would charge you 50 cents per minute or so to chat with them, one on one, and they would answer any questions you have about your choice of programming language. I've been studying ASP.NET 3.5 for a couple of months now and haven't been able to find a service like this for ASP.NET. Any help? A free live chat room for .NET would be of big help too.

    Read the article

  • What is your favorite NumPy feature?

    - by Gökhan Sever
    Share your favourite NumPy features / tips & tricks. Please try to limit one feature per line. The question is posted in parallel at ask.scipy.org We welcome you to join the conversation there -with the main idea of collecting the Scientific Python related questions under one roof. Feel free to dual-post or post at your favourite site...

    Read the article

  • c# midiInGetDevCaps Midi Device Names

    - by user330403
    HI, Iv used the following code from this link. http://stackoverflow.com/questions/1991159/getting-signals-from-a-midi-port-in-c/2024835%232024835 Im wondering what i need to add to able to get a list of device names. Iv looked the MSDN website and found i need to implement midiInGetDevCaps and its a associated Struct. But iv never really done anything with dll imports and structs before so im a bit lost

    Read the article

  • Download file is blocked using WatiN even after modifying registry settings

    - by Mstechuser1
    I'm doing an IE automation using WatiN. When a file to be downloaded is clicked, I get the following in the Internet Explorer Information bar: To help protect your security, Internet Explorer has blocked this site from downloading files to you computer. I added a registry key to, HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap\Domains\ then a REG_DWORD value named "http" with value==2 as given in http://stackoverflow.com/questions/972345/programmatically-add-trusted-sites-to-internet-explorer but still facing same issues. Can some1 advice on this....

    Read the article

  • Type mismatch: cannot convert from ArrayList<Data> to MyCollection

    - by Tommy
    I've read similar questions here but I'm still a little confused. MyCollection extends ArrayList<MyClass> MyClass implements Data yet this gives me the "cannot convert from ArrayList to MyCollection" MyCollection mycollection = somehandler.getCollection(); where getCollection looks like this public ArrayList<Data> getCollection() So my assumptions are obviously wrong. How can I make this work like I would like it to

    Read the article

  • How can I calculate a trend line in PHP?

    - by Stephen
    So I've read the two related questions for calculating a trend line for a graph, but I'm still lost. I have an array of xy coordinates, and I want to come up with another array of xy coordinates (can be fewer coordinates) that represent a logarithmic trend line using PHP. I'm passing these arrays to javascript to plot graphs on the client side.

    Read the article

  • Doctype, HTML 5

    - by MB1
    Hi, i have two questions: 1) was HTML released and if yes, when? 2) is doctype HTML 5 in use? or is it better to use one of these: - HTML 4.01 Strict, - HTML 4.01 Transitional, - HTML 4.01 Frameset, - XHTML 1.0 Strict, - XHTML 1.0 Transitional, - XHTML 1.0 Frameset, - XHTML 1.1

    Read the article

  • Django Piston - how can I create custom methods?

    - by orokusaki
    I put my questions in the code comments for clarity: from piston.handler import AnonymousBaseHandler class AnonymousAPITest(AnonymousBaseHandler): fields = ('update_subscription',) def update_subscription(self, request, months): # Do some stuff here to update a subscription based on the # number of months provided. # How the heck can I call this method? return {'msg': 'Your subscription has been updated!'} def read(self, request): return { 'msg': 'Why would I need a read() method on a fully custom API?' }

    Read the article

  • How to create a simple c# http monitor/blocker?

    - by Click Ok
    I was reading that question (http://stackoverflow.com/questions/226784/how-to-create-a-simple-proxy-in-c) that is near of my wishes. I simply want develop a c# app that, by example, monitors Firefox, IE, etc and logs all navigated pages. Depending of the visited page, I want to block the site (like a parental filter). Code snippets/samples are good, but if you can just tell me some direction of that classes to use I will be grateful. :-)

    Read the article

  • When is a cookie available?

    - by H4mm3rHead
    Hi i have a web application where i plant a cookie on my page. Then the user goes to another page, and from that page calls my page from a script, like this: <script type="text/javascript" src="http://domain.com/page.aspx?id=6" ></script> But i cant access the cookie when it calls my page, why not? and how to work around it? Please note that this question is in relation to: http://stackoverflow.com/questions/2660427/javascript-and-webshop-tracking-affiliate-across-websites-how-to-do

    Read the article

  • Heroku in real life apps

    - by Victor P
    What is your experience using Ruby on Rails on Heroku in production mode? Apart of the issue of the expensive https, do you see any drawback in the way it manages processes, memory and storage? The people at Heroku is quite nice and I'm sure they are willing to answer my questions, but I would like some opinions in the customer side.

    Read the article

  • Badge for low score?

    - by anon
    I have a question: http://stackoverflow.com/questions/2465308/code-golf-write-an-stackoverflow-clone-closed that is at -12. Can I get a badge of some sort for this?

    Read the article

  • Free tool to watch database for changes?

    - by 01
    Im looking for a tool that can watch database(mysql and oracle) for changes. When someone inserts or updates something in any table i want to get to know about it. I know that it can be done using triggers(http://stackoverflow.com/questions/167254/watching-a-table-for-change-in-mysql), but im more interested in some tool that can do it. free tool.

    Read the article

  • Is visual Studio 2010 express edition free

    - by nCdy
    Possible Dupe: http://stackoverflow.com/questions/2624589/visual-studio-express-2010-license Sorry for newbie question, but I saw there was some license file on ISO image and it tells it wont allow me to develop commercial software , but there was Free registration, and I think that after registration I can develop application on it for free . Correct me if I'm not right or Tell me if I am :) thanks.

    Read the article

  • Good Jquery Autocomplete plugin consuming JSON ...

    - by chandru_cp
    I have my customers name in json format i have to use it in a textbox such that it auto completes to give list of users ... Any good Jquery Autocomplete plugin consuming JSON.. I have gone through a similar question of stackoverflow but it didnt help me http://stackoverflow.com/questions/188442/whats-a-good-ajax-autocomplete-plugin-for-jquery

    Read the article

  • Security review of an authenticated Diffie Hellman variant

    - by mtraut
    EDIT I'm still hoping for some advice on this, i tried to clarify my intentions... When i came upon device pairing in my mobile communication framework i studied a lot of papers on this topic and and also got some input from previous questions here. But, i didn't find a ready to implement protocol solution - so i invented a derivate and as i'm no crypto geek i'm not sure about the security caveats of the final solution: The main questions are Is SHA256 sufficient as a commit function? Is the addition of the shared secret as an authentication info in the commit string safe? What is the overall security of the 1024 bit group DH I assume at most 2^-24 bit probability of succesful MITM attack (because of 24 bit challenge). Is this plausible? What may be the most promising attack (besides ripping the device out off my numb, cold hands) This is the algorithm sketch For first time pairing, a solution proposed in "Key agreement in peer-to-peer wireless networks" (DH-SC) is implemented. I based it on a commitment derived from: A fix "UUID" for the communicating entity/role (128 bit, sent at protocol start, before commitment) The public DH key (192 bit private key, based on the 1024 bit Oakley group) A 24 bit random challenge Commit is computed using SHA256 c = sha256( UUID || DH pub || Chall) Both parties exchange this commitment, open and transfer the plain content of the above values. The 24 bit random is displayed to the user for manual authentication DH session key (128 bytes, see above) is computed When the user opts for persistent pairing, the session key is stored with the remote UUID as a shared secret Next time devices connect, commit is computed by additionally hashing the previous DH session key before the random challenge. For sure it is not transfered when opening. c = sha256( UUID || DH pub || DH sess || Chall) Now the user is not bothered authenticating when the local party can derive the same commitment using his own, stored previous DH session key. After succesful connection the new DH session key becomes the new shared secret. As this does not exactly fit the protocols i found so far (and as such their security proofs), i'd be very interested to get an opinion from some more crypto enabled guys here. BTW. i did read about the "EKE" protocol, but i'm not sure what the extra security level is.

    Read the article

< Previous Page | 225 226 227 228 229 230 231 232 233 234 235 236  | Next Page >