Search Results

Search found 29191 results on 1168 pages for 'joel in go'.

Page 457/1168 | < Previous Page | 453 454 455 456 457 458 459 460 461 462 463 464  | Next Page >

  • Neural Network 0 vs -1

    - by Louis
    I have seen a few times people using -1 as opposed to 0 when working with neural networks for the input data. How is this better and does it effect any of the mathematics to implement it? Edit: Using feedforward and back prop Edit 2: I gave it a go but the network stopped learning so I assume the maths would have to change somewhere?

    Read the article

  • Could you please suggest any good books for Java EE

    - by attal
    Hi people, I am comfortable with Java SE 6 and I wanted to go deeper into Java by learning Java EE 6. However, I am confused and I don't know which book(s) should I read to master Java EE 6 (I have never learned Java EE previously). Could you please suggest any appropriate book(s) to help me master Java EE completely? Thank you for reading

    Read the article

  • htaccess Rewriterule to make one query part of another

    - by Dan T
    I have a url /embed?t=X and I want to redirect it to /page/embed/X where X is any number of alpha numeric characters. I know must redirect rules go the other way but for the purpose of the applciation I need to reverse it. Any ideas? I have tried things like: RedirectRule ^embed\?t\=([a-zA-Z0-9]+)$ /page/embed/$1 but with no luck.

    Read the article

  • GDI+ on 64bit systems

    - by LaZe
    Our system uses a lot of large Bitmaps (System.Drawing.Bitmap) and sometimes we run out of memory and gets a "Parameter is not valid" error. This makes sense, since it can be difficult to allocate large continuous chunk of memory. So the question is... If we upgraded the system to 64bit, would this problem go away?

    Read the article

  • Am I supposed to store hashes for passwords?

    - by Doug
    User System and Passwords: I was looking through MD5 stuff, and I am wondering what is the normal/good practice for passwords. Right now, I think people super encrypt the passwords and store the hashes. If so, how does password checking work? I just have the input password go through the encryption process again and then check the hash with the stored one, correct? This question may contradict the above, but should my salt ever be a randomly generated value?

    Read the article

  • Listing the content of a tar file or a directory only down to some level

    - by Tim
    I wonder how to list the content of a tar file only down to some level? I understand tar tvf mytar.tar will list all files, but sometimes I would like to only see directories down to some level. Similarly, for the command ls, how do I control the level of subdirectories that will be displayed? By default, it will only show the direct subdirectories, but not go further.

    Read the article

  • Hi, i want to implement a small routing table for my learning? I know it is implemented using radix/

    - by aks
    Hi, i want to implement a small routing table for my learning? I know it is implemented using radix/patricia tree in routers? Can someone give me an idea on how to go about implementing the same? The major issue i feel is storing IP ADDRESS. For example : 10.1.1.0 network next hop 20.1.1.1 10.1.0.0 network next hop 40.1.1.1 Can someone give me a declaration of the struct from which i can have an idea?

    Read the article

  • In Vim, how to swap 2 non adjacent patterns?

    - by ThG
    I have lines of text, all with the same structure, and would like to make a permutation of 2 elements on all lines: 1257654 some text (which may be long) #Foo 1543098 some other text #Barbar 1238769 whatever #Baz 2456874 something else #Quux I want to obtain : #Foo some text (which may be long) 1257654 #Barbar some other text 1543098 #Baz whatever 1238769 #Quux something else 2456874 This is where I am stuck : :%s/\(\d\{7\}\)\(#.\{-}\)/\2\1/ Where did I go wrong ?

    Read the article

  • Handling large numbers of sockets with .NET

    - by Dreaddan
    I'm looking at writing a application that need to be able to handle in the region of 200 connections / sec and was wondering if C# and .NET will handle this or if I need to really be looking at C++ to do this? It looks like SocketAsyncEventArgs may be the way to go but thought id check before I plough in to it. Each transaction should only last less than a second but could take up to 15 seconds each if that makes any difference.

    Read the article

  • Cross Domain Authentication

    - by gnosio
    I am Curious about how cross domain authentication work? for example. To sign into Orkut.com you need to to sign in via Google.com. So the authentication happens at Google.com and it sets the cookie. So my question now is how does Orkut.com able to read this cookie or authenticate the user with no other information ? What can possibly go wrong?

    Read the article

  • VS2010 constantly searching for something

    - by alekop
    Hi, Recently my VS has started doing a search through all project assemblies after a project is reloaded, or after I close a window following a Go to Definition command. It just says Searching in the status bar, and enumerates the assembly names. It's driving me nuts, because the process can take up to a minute, and it completely locks up the whole application while it's doing this. Has anyone else experienced this? Thanks, Aleko

    Read the article

  • C++ boost thread reusing threads

    - by aaa
    hi. I am trying to accomplish something like this: thread t; // create/initialize thread t.launch(); // launch thread. t.wait(); // wait t.launch(); // relaunch the same thread How to go about implementing something like this using boost threads? in essence, I need persistent relaunch-able thread. Thanks

    Read the article

  • CSS resizable menu and content background images

    - by Hristo
    Hello, I need to have resizable menu and content background images for my site, so both of them get stretched whenever the menu entries are too many, or the contents go outside the borders of the content background. I need vertical stretching. Could you, please, give me a hint (an actual answer would work as well) or a link to a good example? Thank you very much in advance!

    Read the article

  • PHP turn off errors - in one file only

    - by Industrial
    Hi! I am well aware about error_reporting(0); & ini_set('display_errors', "Off"); to make error messages go away. What would be an appropriate way to do this - for a specific file or part of code only? Surpressing errors with @'s seems like a bad idea since it apparently slows the code down... Thanks!

    Read the article

  • PRINTER SET UP IN EXCEL VISUAL BASIC

    - by Gina
    I am trying to assign a cell in excel for the user to type the printer name where they want the print out to go and then use that value in the Application.ActivePrinter = (use the cell value) Even though I have done the programming assigning a name to the cell and using it in a variable it is giving me an error. I have set my variable as string, text, object and variant already and it's not working. Do you know what code should I use to be able to do this?

    Read the article

  • Convert &euro; -> € in XUL

    - by Michael
    I need to convert HTML special symbols to their appropriate Unicode values in my Firefox extension. I'm not dealing with HTML DOM, so can't use the trick with giving value to div and taking back. Also there are too many of them to convert manually. Thought Firefox has something to use. The converted text should go to XUL's description element on statusbar. Any idea how to accomplish this?

    Read the article

  • restoring with mysqldump, but where is the data?

    - by Ole Media
    Ok, so I'm in need to restore a table and I do: mysqldump --opt database table_name < table_name.sql I hit enter and Done! Well, not really, when I go to see if there is anything on the table it show 0 records. I have look into the table_name.sql and I see two records. What am I doing wrong?

    Read the article

  • Is there a place where I see the popular opinion of developers?

    - by User1
    I really want to know popular opinion on controversial programming topics. Questions like: Why do some people prefer vi over emacs (or vice versa)? Is Java faster than C++? Is Intel faster than AMD? It seems SO discourages such conversions because of potential flamewars. So where do people go to discuss such matters? I'm especially interested in venues where people can "up vote" good comments and good questions.

    Read the article

  • Is a string formatter that pulls variables from its calling scope bad practice?

    - by Eric
    I have some code that does an awful lot of string formatting, Often, I end up with code along the lines of: "...".format(x=x, y=y, z=z, foo=foo, ...) Where I'm trying to interpolate a large number of variables into a large string. Is there a good reason not to write a function like this that uses the inspect module to find variables to interpolate? import inspect def interpolate(s): return s.format(**inspect.currentframe().f_back.f_locals) def generateTheString(x): y = foo(x) z = x + y # more calculations go here return interpolate("{x}, {y}, {z}")

    Read the article

  • PVCS 6.0 Checkout with Folder Heirarchy

    - by ybelsare
    Hi , We are using PVCS 6.0 in our current project . I want to checkout the complete project along with the folder heirarchy into my working directory . currently if i select the project and do a checkout , it just dumps all the file into my working folder without any heirarchy . Any idea about how to go about this ? ... any help is appreciated

    Read the article

< Previous Page | 453 454 455 456 457 458 459 460 461 462 463 464  | Next Page >