Search Results

Search found 11640 results on 466 pages for 'share credentials'.

Page 245/466 | < Previous Page | 241 242 243 244 245 246 247 248 249 250 251 252  | Next Page >

  • MvvmCross experiences, hindsight, limitations?

    - by Jason Steele
    I am considering using the MvvmCross framework for a cross platform mobile application that will target Android, iPhone and WP7. Does anyone have any experience with this framework they would like to share, and are they aware of any constraints or limitations that it would be useful to be aware of? For example, am I still able to use native page transitions of my choosing? Are there any performance or storage (app size) implications?

    Read the article

  • WCF Cool Applications

    - by Lijo
    Hi Team, What all are the cool applications that we can create by utilizing WCF. Games, Chat …. Please list what all you feel cool. It would be great if you can mention the transport protocol needed for it. If you can mention a sample article for the application also, there is nothing like that. Please share your opinion Thanks Lijo

    Read the article

  • printing a portion of an html page

    - by tibin mathew
    Hi friends I have an html page i want to print a portion of this html page, I know a javascript function to print a page, onClick="javascript:window.print(); return false; but how can i print a portion of a page. Any one have an idea, please share it to me Thanks

    Read the article

  • How do I create and read non-global variables that aren't destroyed at end of function?

    - by Paul Reilly
    I am attempting to code some plugins to use with MIDI sequencers but have hit a stumbling block. I can't use global-scope variables to store information because multiple instances of the .dll can exist which share memory. How do I create a class (for re-usability purposes in other plugins) containing 2 dimensional array and other variables the content of which is to be shared between functions? If that is possible, how would I read and write the data from the function in the framework where I do the processing?

    Read the article

  • Implementing a "flag as spam/offensive" system

    - by UltraVi01
    I am looking for a community moderated way of managing/eliminating spam and offensive content. Functionality similar to StackOverflow and many other sites seems like a good way to go. Although I'm sure this could greatly vary based on specific needs, I am curious about the backend mechanism/algorithm --that is, has anyone had success using something like "3 strikes and you're out" -- the flagged post is automatically closed/deleted after 3 reports by users with the required credentials. Would something like this likely be effective or would it require a more complex solution to ensure honesty and effectiveness. Any thoughts / experiences would be great

    Read the article

  • deep or shallow copying?

    - by Dervin Thunk
    Dear all. I was wondering if there are examples of situations where you would purposefully pass an argument by value (deep copy) in C. For instance, passing a char to a function is usually cheaper in space than passing a char* (if there's no need to share the value), since char is 1 byte and pointers are, well, whatever they are in the architecture (4 in my 32 bit machine). ?(When) do you want to pass (big) deep copies to functions? if so, why?

    Read the article

  • pattern to transfer search model to dao

    - by zeroed
    We have a dao as a project (jar file). Clients use its interfaces and factories to operate with database. Using standard CRUD operations, dao allows you to search an entity by some search criteria. What is the best way to represent this criteria? Is transfer object appropriate pattern in this situation? How should client create SearchModel instance? Please, share. Regards.

    Read the article

  • How to apply formula to cell based on IF condition in Excel

    - by Captain Comic
    Hi I have an Excel spreadsheed like the one shown below A B 10.02.2007 10 10.03.2007 12 Column A is date and B is price of share Now in another sreadsheet I need to create a new column called return In this column i need to place formula like = ln(B2/B1) but on condition that this formula is only applied date in column A is in range StartDate < currentDate < EndDate. So I want to apply my formula only to specific period say only to 2007 year have new column placed in another spreadsheet starting from given location say A1 Please suggest

    Read the article

  • Is there a network diagram standard for illustrating web services?

    - by Phil.Wheeler
    I'm putting together a Solution Architecture document for an enhancement we're adding to our site and it occurs to me that I've never formally illustrated a web service call before. Is there a convention for how web service calls are illustrated on your garden-variety network diagram? Can anyone point me to examples or share something on Create.ly (or similar service)?

    Read the article

  • Jquery - Hide specific div

    - by Jova
    I have several divs that share a common class. If one of these divs do not have a child div, I want to hide the div. I can find the right div but I'm unable to hide it. This is my code, $(function() { if ($(".adRight.childen('div')").length == 0) { $(this).hide(); } }); What should I use instead of (this)? this refers to the document and not the div the if-statement found.

    Read the article

  • How do I remotely obtain a system's network shares and connections?

    - by Mick
    I'm looking for a way to obtain information similar to the following console applications, remotely: net use net share netstat -ano However, I need to be able to do this without running a 3rd party application on the system. This effectively rules out using psexec to execute the command remotely, because psexec would then be installed as a service. I should add that I have administrative credentials on the remote system. I've considered using WMI's remote execution ability, but that requires me to write output to a file and then retrieve it. It's possible, but I'd like to know if anyone has a better way. I am using Delphi 2010.

    Read the article

  • Twitter search c#

    - by Lily
    Hi, I have implemented a method which manually scrapes the Search Twitter page and gets the tweets on different pages. But since there is a fast refresh rate, the method triggers an exception. Therefore I have decided to use TweetSharp API instead var search = FluentTwitter.CreateRequest() .AuthenticateAs(TWITTER_USERNAME, TWITTER_PASSWORD) .Users().SearchFor("dumbledore"); var result = search.Request(); var users = result.AsUsers(); this code was on the site. Does anyone know how I can avoid giving my credentials and retrieve from all users and not just the ones I have as friends? Thanks!

    Read the article

  • How to get online or offline state of a WCF Service with a WP7 Application

    - by Arjuna Wenzel
    im working on a Windows Phone 7 Application that communicates with a Azure hosted WCF service. Everything works fine in communication and so on. But i want to handle the situation when the Service is not online. Now the WP7 App has a main screen with a login. After clicking the "Login" button the Application sends the credentials to the WCF Service which communicates with a Database. And now my question is, is there a way to get the online/offline state of the WCF Service? So i could give feedback to the user and the application wouldnt crash (: Thx alot for any answer!

    Read the article

  • I'm trying to implement 2 factor authentication on the cheap. How would I do that?

    - by Biff MaGriff
    Ok so I need 2 of the 3. Something the user knows. Something the user has. Something the user is. I have a system that is exposed to the internet and we need clients to connect in a secure manner to satisfy our security standards. I'm thinking when a user registers to use our system we send them an application that they install on their home system. The application generates a key based on a timed randomness algorithm. Our application server has the same algorithm so when the user submits their credentials with the key we know that they are a legitimate user. Is this a valid method of 2 factor authentication? What is another way of doing this? Are there any pitfalls that I should be aware of? Thanks for your help!

    Read the article

  • sequential minimal optimization C++

    - by Anton
    Hello. I want to implement the method of SVM. But the problem appeared in his training. It was originally planned to use SMO, but did not find ready-made libraries for C++. If there is a ready, then share it. Thank you in advance. The problem of finding an object in the picture (probably human)

    Read the article

  • Pitfalls when switching to .NET for Windows CE?

    - by Presidenten
    Hi! I have been developing in .NET for quite some time now. But now I have customer who wants me to develop an application for them in .NET for Windows CE. I have done some embedded system programming in C before, but never in .NET. Please share any tips or tricks that would make my life easier when taking this assignment, or perhaps knowledge about any pitfalls to watch out for.

    Read the article

  • howto Debugging on PHP

    - by justjoe
    how we do basic debugging in PHP ? Can anybody share true horror story on debugging PHP application (or (even better) on PHP framework such Codeigniter and Wordpress) ? i love to hear real experience in case i have to encounter similar situation on my journey to learn PHP.

    Read the article

  • Sinatra/Rails: Persisting custom class instances during app lifetime

    - by knoopx
    Can I assert rails/sinatra apps are initialized only once and all requests share the same app instance? or do new requests spawn new app instances? Is it possible to instance custom classes and persist them during app lifetime without using sessions, database storages or third party services? If so, what are the implications from a thread-safeness point of view? I'm trying to figure how to implement a web-based download manager and I'm currently evaluating ruby-based frameworks.

    Read the article

  • WSAT Security tab error for Custom Role provider

    - by shesb
    I have created custome Membership Role and Profile provider using INGRES db. Now I can see my IngresMembership and IngresRole provider in the Provider tab(Select a different provider for each feature (advanced) ) of WSAT but when I clik on security tab I get this error: "There is a problem with your selected data store. This can be caused by an invalid server name or credentials, or by insufficient permission. It can also be caused by the role manager feature not being enabled. Click the button below to be redirected to a page where you can choose a new data store. The following message may help in diagnosing the problem: Object reference not set to an instance of an object." What am I missing? Do I need to add code for all override methods for Role provider? I have just written code for the Initialize and GetRolesForUser functions. Thanks

    Read the article

  • How to use Google Drive api in Android?

    - by Sajid Shaikh
    I Want to implement Google Drive api in my application but how to implement it in Android, I searched lot for sample code or way to implement in android & finally i came back with question on Stackoverflow. I am hoping that developer who implemented Google drive api in their application they will share there knowledge with us. So please android developer help me with step by step process & sample code. Thanks for reading my question patiently.

    Read the article

< Previous Page | 241 242 243 244 245 246 247 248 249 250 251 252  | Next Page >