Search Results

Search found 17731 results on 710 pages for 'programming practices'.

Page 483/710 | < Previous Page | 479 480 481 482 483 484 485 486 487 488 489 490  | Next Page >

  • librrd link problem

    - by farka
    i use rrd (graphic programming ) under rrdtool, i have installed; and i rund gcc gcc -I/usr/include -I/usr/local/include -L/usr/lib -L/usr/local/lib -lrrd -o myprog test.c myprog is execute file and test.c ist testprogram who i use function rrd_create from libary but gcc put out error like this: /usr/bin/ld: cannot find -lrrd why!!!!

    Read the article

  • Where are run the Opengl commands?

    - by Lucas
    Hi, i'm programming a simple OpenGL program on a multi-core computer that has a GPU. The GPU is a simple GeForce with PhysX, CUDA and OpenGL 2.1 support. When i run this program, is the host CPU that executes OpenGL specific commands or the ones are directly transferred to the GPU ???

    Read the article

  • Why Emacs/Vim/Textmate? Isn't Xcode good enough?

    - by ivanTheTerrible
    Hi I mostly do C++, Objective-C programming. And I found Xcode plus an auto completion/macro plugin (Completion Dictionary) quite adequate. However, all people seem to praise over their pure text editors. I tried Textmate for a bit; liked its simplicity but dislike its files/framework handling. Am I missing something here? Or, do Vim or Emacs have auto-completion as good as Xcode?

    Read the article

  • Using OpenGL Without X-Window System

    - by user366250
    Hell every body , i am newbie in linux programming ( Not Windows ) . i want to know how i can using OpenGL on Linux Platform Without X-Window System , can i send OpenGL Graphics Directly to Framebuffer Device ?! There Is Project Named DirectFB ( Direct FrameBuffer ) . with DirectFB We can do this but DirectFB needs for driver for each hardware and i want to user a graphic card that only have linux driver . what is your suggestion to Me . Thanku.

    Read the article

  • Top ten security tips for non-technical users

    - by Justin
    I'm giving a presentation later this week to the staff at the company where I work. The goal of the presentation is to serve as a refresher/remidner of good practices that can help keep our network secure. The audience is made up of both programmers and non-technical staff, so the presentation is geared for non-technical users. I want part of this presentation to be a top list of "tips". The list needs to be short (to encourage memory) and be specific and relevant to the user. I have the following five items so far: Never open an attachment you didn't expect Only download software from a trusted source, like download.com Do not distribute passwords when requested via phone or email Be wary of social engineering Do not store sensitive data on an FTP server I have two questions: Do you suggest any additional items? Do you suggest any changes to existing items?

    Read the article

  • The difference between triangulation and mesh

    - by xiao
    I have done some computer graphical programming recently, and I have no experience before. I used the library call CGAL(computer geometry algorithm library). Also, I noticed that there is class for triangulation and also class for mesh. Is mesh just a kind of triangle net? Do they have any differences? Thanks!

    Read the article

  • How Linux programmers create GUI application without using IDE?

    - by CMW
    Hi, I have read some comments in some forums saying that Linux programmers usually do not use any IDE. They prefer to use Vim and Emacs to do their programming. If I'm not mistaken, Vim and Emacs are just text editors, similar to notepad, but with syntax highlighting. I just want to know how Linux programmers create complicated GUI application without using any IDE. Thanks.

    Read the article

  • flip a 1bpp .bmp image horizontally

    - by user576844
    I am trying to write a program containing two source files: main program written in C and assembly(x86 32 and 64) module callable from C. The C declaration for the assembly routine looks like this: void mirrorbmp1(void *img, int width, int height) The task involves Mirror/flipping a 1 bpp .BMP image horizontally while Handling any image width properly, not only multiples of 8. I am new to assembly programming and have very little idea about how i should do the ask. Any help would be appreciated.

    Read the article

  • Maintaining a secure database of user logins and info?

    - by Rafe Kettler
    I want to have a login form on a charity website I am building (it's for a friend, and I'm learning on the go), and I want to know what languages/software should I learn to build databases for user logins and info? Note: it HAS to be secure and relatively simple to learn for someone with moderate programming experience. Update: I understand that CMSs offer good tools for logins etc. but I want to do this all by myself.

    Read the article

  • How to detect if a doc document password protected

    - by StuffHappens
    Hello. I have a folder with lots of doc-documents and I need to upload their context into database. The problem is that some of them are password protected and I don't know the password. I would like to skip them but I don't know how to detect if password protection presents. If someone helps I'll appriciate it greatly. P.S. Programming language is C#.

    Read the article

  • Sanitizing MySQL user parameters.

    - by Tom
    What are the dangerous characters that should be replaced in user input when the users' input will be inserted in a MySQL query? I know about quotes, double quotes, \r and \n. Are there others?(I don't have the option of using a smart connector that accepts parameters so I have to build the query myself and this will be implemented in multiple programming languages, including some obscure ones so solutions such as mysql_real_escape_string in PHP are not valid)

    Read the article

  • Optimal Disk Setup for OLTP SQL Server

    - by Chris
    We have a high transaction (lots of reads and writes) database server (running SQL 2005) that is currently set up with a RAID 1 OS partition (C:) and a RAID 5 data/log/tempdb partition (D:). The C: has 2 drives and the D: has 4 drives. The server has around 300 databases ranging from 10MB to 2GB in size. I have been reading up on best practices for partioning the disks, but would like some opinions on our setup since we are so limited in the number of disks. It seems like RAID 10 is popular, but I dont think we could use it with only 6 total disks to work with. Thanks. Update I went with 3 RAID 1 Partitions (2 disks each) Partition 1: OS, TempDB, Backups Partition 2: Logs Partition 3: Data

    Read the article

  • C++: GUI libraries for embedding into an interpreter

    - by sub
    I've got my interpreter up and running - quite bug-free and stable for now - now I want to add some visual options to my language to play around. What is a good GUI library easy to use and mainly easy to embed and "link" to my programming language? What general rules do I have to follow? I'm currently on XP with Microsoft Visual Studio 2010.

    Read the article

  • Outline to teach VB6

    - by sinDizzy
    I am in need of an outline on teaching VB6/VBA to some co-workers. The material I am pretty confident I can fill in, just need a sense of how to order the class material. Its not going to be hard core programming [nix the VB6 jokes please :) ] but do want to touch the basics. Any free outlines or even entire presentations out there that I can use? I've been looking but nothing concrete so far. thanks

    Read the article

  • Permissions to run a SharePoint 2010 Application Pool?

    - by Michael Stum
    I'm currently in the process of setting up a SharePoint 2010 farm. In my Dev Environments, I have one account that is Local Admin, Farm Administrator and runs all Application Pools. For Production Environment, I would like to go with best Security Practices and run the Web Applications (At least 2: Main Portal and My Sites) with separate Domain Accounts. It's been some time that I worked with IIS, and I remember that there were issues with accessing files in c:\inetpub by non-Admin users. On the other hand, SharePoint "automagically" sets most permissions anyway. Does anyone have some experience with which permissions I need to give to the domain account at minimum in order to work?

    Read the article

  • k-combinations of a set of integers in ascending size order

    - by Adamski
    Programming challenge: Given a set of integers [1, 2, 3, 4, 5] I would like to generate all possible k-combinations in ascending size order in Java; e.g. [1], [2], [3], [4], [5], [1, 2], [1, 3] ... [1, 2, 3, 4, 5] It is fairly easy to produce a recursive solution that generates all combinations and then sort them afterwards but I imagine there's a more efficient way that removes the need for the additional sort.

    Read the article

  • Inheritance from static classes? why not?

    - by Sorush Rabiee
    Hi Why inheritance is not provided for static classes in C#? I know C# has a good reason for everything he implements or doesn't implement. I just wondered, what’s that “good reason” here? semantically, what would be happened if I was able to write a static class that inheritances from another static one? is this an ODD issue? or just programming?

    Read the article

  • SSL encrpytion, SHA1 and SHA2

    - by Hellnar
    Hello, I am trying to implement SHA2 encryption instead SHA1. For this, I know that bit number between these two hash algorithms are different and it confuses me. How can this be achieved and at what parts do I need to make required changes. I can use any open source library from Java, Python and any other major programming language. Regards

    Read the article

  • similar programs like Sofa Framework?

    - by TopTierTracker
    http://www.sofa-framework.org/ looking for other similar medical simulation software that have easier API for programming, better documentation and more active user interactive help forum. the goal is to do virtual design. I want to design something that can simulate a pipe pumping with haptic devices, but I couldn't get Sofa to work with my phantom device in their UI, and I can't use their API to build my stuff either. it's hard to get things going with slow support. thx for the help

    Read the article

  • How To Store Files In An EXE C#

    - by S3THST4
    Alright, so I'm working on programming my own installer in C#, and what I'd like to do is something along the lines of put the files in the .exe, so I can do File.Copy(file, filedir); Or, if this isn't possible, is there another way of doing what I am attempting to do? Thank you in advance. ~Seth

    Read the article

< Previous Page | 479 480 481 482 483 484 485 486 487 488 489 490  | Next Page >